-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ 00000000:0da46cec
2024-11-11 15:37:15The Content Authenticity Initiative (CAI) is a collaborative effort launched by Adobe in 2019 in partnership with technology companies and media organizations like Twitter and The New York Times. Its goal is to combat misinformation and ensure that digital content can be trusted. By creating a system for global adoption, CAI aims to provide a standard for traceability and verification of digital content in a secure and accessible manner. This article dives into the technical underpinnings of this initiative, detailing the use of metadata, cryptography, and blockchain. We also reference official repositories and open-source resources available for implementing these technologies.
Content Authenticity Initiative Architecture
The architecture of CAI relies on a set of techniques and tools based on standardized metadata, cryptographic integrity mechanisms, and decentralized solutions to ensure content verifiability throughout its lifecycle. Below is an in-depth look at each core element of this architecture.
1. Generation of Authenticity Metadata
Content creation within CAI begins at the capture stage, whether through a camera or smartphone, where authenticity metadata is generated. This metadata records important details such as the author's information, timestamp, geolocation, and device used for content capture. The data is stored using standardized schemes like XMP (Extensible Metadata Platform), ensuring consistency for later verification. Developers can access the reference source code for XMP via Adobe's GitHub: XMP Toolkit SDK.
The metadata not only describes the creation context but also maintains an immutable history of modifications. Whenever content is edited, the changes are documented, ensuring a complete and traceable history of the content lifecycle.
2. Digital Content Signing
A key component of CAI is the use of digital signatures to certify the authenticity and integrity of the content. Each file (image, video, document) is signed with asymmetric cryptographic algorithms like ECDSA (Elliptic Curve Digital Signature Algorithm) or RSA, depending on the desired level of security and computational resources.
These digital signatures generate a unique hash for each piece of content, linking it to the creator's private key. If even a single bit of the content is altered, the hash will change, which invalidates the original signature. This mechanism guarantees that unauthorized alterations are easily detected. Reference implementations for these cryptographic methods are available in the OpenSSL repository and the Bouncy Castle library for Java and C#: Bouncy Castle GitHub.
3. Timestamping and Blockchain
To further validate content authenticity, CAI also employs timestamping and, in some implementations, blockchain technology. Timestamping is handled by a Timestamp Authority (TSA), which certifies that the content existed in a particular state at a specific moment in time. TSAs utilize digital signatures to provide a secure record of when the content was created.
Blockchain technology provides an additional layer of transparency and security. By storing the hashes of metadata and digital signatures on a public blockchain (like Ethereum), an immutable, decentralized record is created, allowing any user to verify the content's authenticity. Structures like Merkle trees are commonly used for recording efficiently, ensuring that changes are tracked without bloating the blockchain. Examples of blockchain-based implementations can be explored in the Merkle Tree JavaScript Library and the official Ethereum repository: Ethereum GitHub.
4. Secure Metadata Storage
The metadata generated during content creation is embedded directly within the content file, using steganographic techniques or as readable attachments. This ensures that the metadata remains tied to the content and is resistant to malicious alteration.
To maintain metadata integrity during transfer, Transport Layer Security (TLS) is used, ensuring that content is securely exchanged without interference. Moreover, distributed storage systems such as IPFS (InterPlanetary File System) can be leveraged to provide redundant and long-term availability of metadata. The IPFS implementation is available on GitHub: IPFS GitHub.
Authentic Content Verification
One of CAI's primary goals is to enable anyone to easily verify the origin and edit history of content. To achieve this, open-source verification tools such as "Verify with CAI" have been developed, allowing users to inspect the content and access all associated metadata. These tools are available in the official CAI repository: Content Authenticity Initiative GitHub.
These verification tools leverage hashes and digital signatures embedded in the content, providing an easy way to determine if unauthorized changes have occurred. They also provide links to blockchain records, allowing third-party verification for an added level of security.
Guide for Photographers and Content Creators
The CAI's technology is particularly beneficial for photographers and content creators seeking to protect their work from misuse. Below is a practical guide to utilizing this technology effectively:
-
Compatible Equipment: Use a camera or device that supports the generation of authenticity metadata using XMP standards. Many modern devices and editing tools allow users to embed this metadata during capture.
-
Editing Software: Choose editing software that maintains authenticity metadata. Adobe Photoshop and similar tools now include features that preserve metadata throughout the editing process, ensuring the content remains verifiable.
-
Digital Signing: Use a digital signing tool like OpenSSL or libraries such as Bouncy Castle to digitally sign your files. This is critical for asserting the integrity and authenticity of your content. Tutorials and examples are available in the repositories mentioned.
-
Timestamping: Utilize a Timestamp Authority (TSA) to certify that the content existed at a specific point in time. This adds a temporal validation layer that proves when your content was created and that it hasn’t been altered since.
-
Blockchain Registration: To further reinforce content authenticity, consider recording metadata on a public blockchain. Services and smart contracts are available to help you register data without requiring deep blockchain expertise. Refer to repositories like Ethereum GitHub for guidance.
-
Content Verification: Use Verify with CAI to verify that your content is correctly registered and ensure that all metadata and digital signatures are intact. This tool is open source, allowing anyone to verify the content's authenticity.
-
Publishing Platforms: Share your content on platforms that support CAI standards. Platforms like Behance are starting to integrate these standards, helping distribute content while retaining its verified authenticity.
Technical Challenges and Barriers
CAI implementation faces several technical challenges. The most significant are:
-
Adoption: For CAI to succeed, stakeholders across the digital content ecosystem—camera manufacturers, software platforms, social networks, etc.—must adopt its standards.
-
Privacy Concerns: Providing detailed metadata about authorship may raise privacy issues. To address this, CAI offers options to encrypt sensitive metadata, ensuring it is only accessible when required.
-
Costs: The tools needed for digital signatures, blockchain registration, and timestamping can require significant resources, which may be a barrier for smaller creators or platforms.
-
Sophisticated Threats: While CAI improves digital security, sophisticated actors may still attempt to bypass authenticity checks or falsify metadata. Continuous improvement of cryptographic techniques and verification methods is required to counter these evolving threats.
Conclusion
The Content Authenticity Initiative provides a solid framework for protecting the integrity of digital content. By utilizing metadata standards, digital signatures, blockchain records, and open-source verification tools, CAI aims to establish a global standard for content transparency and authenticity. Despite some technical and logistical challenges, CAI represents a crucial step towards a trustworthy digital ecosystem. Developers and creators can access official repositories to implement these tools and contribute to a safer, more reliable environment for digital media.
References
- Adobe. (n.d.). XMP Toolkit SDK. Retrieved from https://github.com/adobe/XMP-Toolkit-SDK
- OpenSSL. (n.d.). OpenSSL Cryptography and SSL/TLS Toolkit. Retrieved from https://github.com/openssl/openssl
- Bouncy Castle. (n.d.). Bouncy Castle Libraries. Retrieved from https://github.com/bcgit
- Miguel Mota. (n.d.). Merkle Tree JavaScript Library. Retrieved from https://github.com/miguelmota/merkletreejs
- Ethereum Foundation. (n.d.). Ethereum. Retrieved from https://github.com/ethereum
- IPFS. (n.d.). InterPlanetary File System. Retrieved from https://github.com/ipfs
- Content Authenticity Initiative. (n.d.). Verify with CAI. Retrieved from https://github.com/contentauth/
-
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 81dfd044:f1737ef9
2024-11-11 13:08:51Looking to invest in solar energy for your business? Aurora Energy offers high-quality commercial solar panels for sale, built to meet the energy needs of businesses both large and small. Our solar panels provide reliable, renewable energy that reduces operating costs and minimizes environmental impact. Let us help you choose the perfect system to power your business with clean energy and long-term financial benefits.
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 00000000:0da46cec
2024-11-11 12:44:46Resumen
La Content Authenticity Initiative (CAI) es una colaboración global iniciada por Adobe en 2019, junto con empresas tecnológicas y medios de comunicación, cuyo objetivo es combatir la desinformación digital mediante la creación de un sistema de autenticidad para contenidos digitales. Este artículo analiza en detalle los aspectos tecnológicos avanzados de la CAI, como el uso de metadatos, criptografía, blockchain y la verificación distribuida, además de incluir una guía para fotógrafos y creadores de contenido. Se ofrecen referencias a repositorios de código abierto para implementar estas tecnologías, proporcionando una base técnica robusta para proteger la autenticidad del contenido digital.
Palabras clave: Content Authenticity Initiative, CAI, autenticidad del contenido, metadatos, criptografía, blockchain, integridad digital, firma digital, sellado de tiempo.
La Content Authenticity Initiative (CAI), traducida al español como Iniciativa de Autenticidad del Contenido, es un esfuerzo colaborativo iniciado por Adobe en 2019 en conjunto con empresas tecnológicas y medios de comunicación como Twitter y The New York Times. Su principal objetivo es combatir la desinformación digital mediante la creación de un sistema de autenticidad de contenidos que pueda ser adoptado globalmente, proporcionando trazabilidad y verificación de los contenidos digitales de una manera confiable y accesible. Este artículo detalla los aspectos tecnológicos más avanzados de esta iniciativa, que incluye el uso de metadatos, criptografía y blockchain. Además, se hace referencia a algunos de los repositorios oficiales y recursos de código fuente disponibles para implementar estas tecnologías.
Arquitectura de la Content Authenticity Initiative
La arquitectura de la CAI está compuesta por un conjunto de técnicas y herramientas basadas en metadatos estandarizados, mecanismos de integridad criptográfica, y soluciones descentralizadas para asegurar la verificabilidad del contenido en cada etapa de su ciclo de vida. A continuación se describe en detalle cada uno de los elementos clave de esta arquitectura.
1. Generación de Metadatos de Autenticidad
El proceso de generación de contenido dentro de la CAI comienza en el dispositivo de captura, como una cámara o un smartphone, donde se crean los metadatos de autenticidad. Estos metadatos incluyen información relevante sobre el autor del contenido, la fecha y hora de captura, la geolocalización y el dispositivo utilizado. Estos elementos se guardan utilizando esquemas estandarizados como XMP (Extensible Metadata Platform), que asegura una estructura coherente y legible para las aplicaciones de verificación posteriores. El código fuente de referencia para la implementación de XMP está disponible en el repositorio oficial de Adobe en GitHub: XMP Toolkit SDK.
Los metadatos de autenticidad no solo proporcionan datos sobre la creación, sino que también mantienen un registro inmutable de modificaciones del archivo. Cada vez que se realiza una edición, se documenta el cambio mediante un proceso de versionado, asegurando la trazabilidad completa de cualquier alteración.
2. Firma Criptográfica del Contenido
El siguiente nivel de protección que ofrece la CAI es el uso de firmas digitales para garantizar la autenticidad e integridad del contenido. Cada archivo multimedia (imagen, video, documento) se firma utilizando algoritmos de criptografía asimétrica como ECDSA (Elliptic Curve Digital Signature Algorithm) o RSA, dependiendo del nivel de seguridad requerido y la capacidad de cálculo del dispositivo.
Estas firmas digitales generan un hash único para el contenido y lo vinculan con la clave privada del creador. Si el contenido es modificado de alguna manera, incluso un cambio de un solo bit, el hash cambiará, invalidando la firma digital original. De esta forma, cualquier alteración que no esté registrada y autorizada se puede detectar fácilmente, proporcionando garantía de que el archivo no ha sido comprometido desde su creación. Implementaciones de referencia para la generación y verificación de firmas digitales están disponibles en el repositorio OpenSSL y en la biblioteca Bouncy Castle para Java y C#: Bouncy Castle GitHub.
3. Sellado de Tiempo y Blockchain
Para reforzar la veracidad del contenido, la CAI también puede emplear sellado de tiempo (timestamping) y, en algunas implementaciones, blockchain para descentralizar y proteger el registro de autenticidad. El sellado de tiempo se realiza mediante una autoridad de sellado (“Timestamp Authority” o TSA), que certifica que el contenido existía en un estado particular a una fecha y hora específica. Las TSA utilizan firmas digitales para proporcionar un valor criptográficamente seguro que confirma la temporalidad del contenido.
La incorporación de blockchain aporta un nivel adicional de transparencia. Al registrar hashes de los metadatos y las firmas de autenticidad en una blockchain pública (como Ethereum o cualquier blockchain dedicada), se crea un registro inmutable y descentralizado que permite a cualquier usuario verificar la autenticidad del contenido. La estructura basada en árboles Merkle se usa comúnmente para optimizar el proceso de registro, asegurando que cada cambio en el contenido se documente con eficiencia y sin necesidad de almacenar grandes volúmenes de datos en la blockchain. Los desarrolladores pueden explorar ejemplos de implementación en el repositorio Merkle Tree JavaScript Library y consultar el repositorio oficial de Ethereum para interacciones con contratos inteligentes: Ethereum GitHub.
4. Almacenamiento Seguro de Metadatos
Los metadatos generados durante el proceso de creación se incrustan en el contenido utilizando técnicas de esteganografía o como datos adjuntos legibles por las herramientas de edición y verificación. Para evitar la eliminación o alteración maliciosa de estos metadatos, se emplean mecanismos de incrustación segura que vinculan los metadatos al contenido de manera criptográfica.
Para garantizar la integridad de los metadatos durante la transferencia, se emplean protocolos TLS (Transport Layer Security), que aseguran que cualquier intercambio de archivos mantenga la confidencialidad y la integridad. Además, se pueden usar sistemas de almacenamiento distribuido como IPFS (InterPlanetary File System) para replicar y almacenar estos metadatos de forma redundante, asegurando su disponibilidad a largo plazo. El código fuente para IPFS está disponible en el repositorio oficial: IPFS GitHub.
Verificación del Contenido Auténtico
Uno de los objetivos fundamentales de la CAI es que cualquier usuario pueda verificar la procedencia y el historial de ediciones de un contenido de manera sencilla y eficiente. Para ello, se han desarrollado herramientas de verificación basadas en código abierto, como “Verify with CAI”, que permiten al espectador analizar el contenido y ver todos los metadatos asociados. Estas herramientas se pueden encontrar en el repositorio oficial de la CAI: Content Authenticity Initiative GitHub.
Estas herramientas usan los hashes incrustados y las firmas digitales para comparar la información disponible y determinar si el contenido ha sido alterado sin autorización. Asimismo, permiten al usuario acceder a los registros de blockchain, si es aplicable, para confirmar la autenticidad desde una fuente independiente y descentralizada.
Guía para Fotógrafos y Creadores de Contenido
La adopción de la tecnología de la Content Authenticity Initiative puede ser extremadamente beneficiosa para los fotógrafos y creadores de contenido que deseen garantizar la autenticidad y proteger su trabajo contra el uso indebido. A continuación se presenta una guía paso a paso sobre cómo utilizar esta tecnología:
-
Equipamiento Compatible: Asegúrate de que utilizas una cámara o dispositivo que soporte la generación de metadatos de autenticidad según los estándares XMP. Muchas cámaras y aplicaciones de edición modernas permiten incluir estos metadatos durante la captura y la edición del contenido.
-
Software de Edición Compatible: Utiliza software de edición que mantenga los metadatos de autenticidad intactos. Adobe Photoshop y otras herramientas de edición avanzadas han comenzado a integrar estas funcionalidades para garantizar que cada cambio quede registrado. Al editar, asegúrate de mantener los registros de metadatos, de modo que se pueda trazar la autenticidad del contenido.
-
Firmado Digital del Contenido: Usa una herramienta de firma digital, como OpenSSL o bibliotecas como Bouncy Castle para generar firmas digitales de tus archivos. Esto proporciona una garantía de autenticidad. Estas herramientas se pueden usar para firmar imágenes y documentos multimedia y protegerlos contra cualquier alteración. Puedes encontrar tutoriales y ejemplos de uso en los repositorios mencionados previamente.
-
Sellado de Tiempo del Contenido: Implementa el sellado de tiempo utilizando una Timestamp Authority (TSA) reconocida. Esto permite certificar que el contenido existía en un estado específico en una fecha y hora determinadas, lo cual es esencial para demostrar la integridad temporal del contenido. Algunas plataformas ofrecen servicios de sellado de tiempo gratuitos o a bajo costo.
-
Uso de Blockchain para Registrar Metadatos: Si deseas una protección adicional y más transparencia, considera registrar los hashes de los metadatos en una blockchain pública. Existen servicios y contratos inteligentes que pueden ayudarte a registrar estos datos sin necesidad de un conocimiento profundo en programación blockchain. Puedes consultar repositorios como Ethereum GitHub para aprender cómo interactuar con contratos inteligentes.
-
Verificación del Contenido: Utiliza herramientas como Verify with CAI para asegurarte de que tus contenidos están adecuadamente registrados y que los metadatos y firmas digitales se mantienen intactos. Estas herramientas son de código abierto y están disponibles en GitHub, lo que permite a cualquier usuario comprobar la integridad y procedencia del contenido.
-
Publicación en Plataformas Compatibles: Publica tu contenido en plataformas que soporten la CAI y mantengan los metadatos intactos. Redes sociales y sitios web como Behance están comenzando a adoptar estos estándares, lo que te permitirá que tu contenido se distribuya con la verificación de autenticidad.
Desafíos Técnicos y Barreras
La implementación de la CAI no está exenta de desafíos. Algunos de los principales son:
-
Adopción Masiva: Para que la CAI sea efectiva, es necesario que todos los actores involucrados en la creación y distribución de contenido adopten sus estándares. Esto incluye a los fabricantes de cámaras, plataformas de edición, redes sociales y sitios web.
-
Privacidad de los Creadores: Al proporcionar información detallada sobre el autor y el origen del contenido, surgen preocupaciones relacionadas con la privacidad. Para mitigar esto, la CAI permite que algunos metadatos se almacenen de forma encriptada, y solo se revelen si es necesario.
-
Costos de Implementación: Las herramientas para firmar digitalmente, registrar en blockchain, y mantener el sellado de tiempo requieren recursos que podrían ser prohibitivos para algunos creadores o plataformas pequeñas.
-
Atacantes Sofisticados: Aunque la CAI mejora significativamente la seguridad, atacantes avanzados podrían intentar falsificar metadatos o burlar los procesos de firma digital. La combinación de técnicas criptográficas y blockchain mitiga este riesgo, pero siempre existirá la necesidad de evolucionar con las amenazas emergentes.
Conclusión
La Content Authenticity Initiative ofrece una arquitectura tecnológica sólida para proteger la autenticidad del contenido digital. A través del uso combinado de metadatos estandarizados, firmas digitales, blockchain y herramientas de verificación, la CAI busca establecer un estándar global para la transparencia y verificabilidad del contenido. Si bien existen desafíos técnicos y logísticos, la CAI representa un paso significativo hacia un ecosistema digital donde la confianza y la autenticidad sean la norma y no la excepción. Los interesados en profundizar más pueden acceder al código fuente disponible en los repositorios oficiales, como se ha indicado a lo largo del artículo, para implementar estas soluciones y contribuir al desarrollo de un entorno digital más seguro y confiable.
Bibliografía
- Adobe. (n.d.). XMP Toolkit SDK. Recuperado de https://github.com/adobe/XMP-Toolkit-SDK
- OpenSSL. (n.d.). OpenSSL Cryptography and SSL/TLS Toolkit. Recuperado de https://github.com/openssl/openssl
- Bouncy Castle. (n.d.). Bouncy Castle Libraries. Recuperado de https://github.com/bcgit
- Miguel Mota. (n.d.). Merkle Tree JavaScript Library. Recuperado de https://github.com/miguelmota/merkletreejs
- Ethereum Foundation. (n.d.). Ethereum. Recuperado de https://github.com/ethereum
- IPFS. (n.d.). InterPlanetary File System. Recuperado de https://github.com/ipfs
- Content Authenticity Initiative. (n.d.). Verify with CAI. Recuperado de https://github.com/contentauth/
-
-
@ a012dc82:6458a70d
2024-11-11 12:35:40Table Of Content
-
Understanding Bitcoin Halving and its Significance
-
JPMorgan Analysis Reveals Positive Indicators
-
Increased Retail Investment: Driving Factors
-
Anticipated Impact on Bitcoin Market
-
Tips for Retail Investors to Leverage the Opportunity
-
Conclusion
-
FAQ
In recent years, Bitcoin has become a buzzword in the financial world, captivating both institutional and retail investors. As the cryptocurrency market continues to evolve, experts at JPMorgan have conducted a comprehensive analysis, revealing strong indications of increased retail interest in Bitcoin leading up to the next halving event. This blog post will explore the insights from JPMorgan's analysis and shed light on the potential impact of this anticipated surge in retail interest.
Understanding Bitcoin Halving and its Significance
The concept of Bitcoin halving is pivotal to understanding the potential surge in retail interest. Bitcoin operates on a controlled supply system, with a predetermined issuance rate. Approximately every four years, the number of new Bitcoins generated per block gets halved, reducing the rate at which new Bitcoins enter circulation. This scarcity mechanism has significant implications for the cryptocurrency's value and investor sentiment.
JPMorgan Analysis Reveals Positive Indicators
According to JPMorgan's analysis, there are several positive indicators suggesting a strong influx of retail investors in the period leading up to the next Bitcoin halving. The analysis takes into account various factors such as historical data, market trends, and investor behavior. JPMorgan's experts have identified patterns that align with previous halving events, indicating a potential surge in retail interest in Bitcoin.
Increased Retail Investment: Driving Factors
JPMorgan's analysis highlights key driving factors behind the expected increase in retail investment. One significant factor is the growing awareness and acceptance of Bitcoin among the general public. As more individuals recognize the potential of cryptocurrencies as an investment asset, they are likely to be drawn towards Bitcoin, especially during periods of heightened market activity like halving events.
Moreover, the influence of social media and digital platforms cannot be overlooked. The rise of social media communities, investment forums, and influencers has played a crucial role in amplifying discussions around Bitcoin. These platforms facilitate the spread of information, enabling retail investors to gain insights and make informed investment decisions.
Anticipated Impact on Bitcoin Market
The surge in retail interest preceding the halving event is expected to have a significant impact on the Bitcoin market. As more retail investors enter the market, the demand for Bitcoin is likely to increase, potentially driving up its price. This increased demand could lead to a period of heightened market volatility, offering both opportunities and risks for investors.
JPMorgan's analysis suggests that the impact of retail interest will extend beyond the halving event itself. Historically, Bitcoin has experienced price rallies following halvings, indicating the potential for substantial gains. However, it is important to note that the cryptocurrency market is highly unpredictable, and investors should exercise caution and conduct thorough research before making investment decisions.
Tips for Retail Investors to Leverage the Opportunity
For retail investors considering Bitcoin as an investment, it is essential to approach the market with a strategic mindset. Here are a few tips to help leverage the anticipated surge in retail interest:
-
Educate Yourself: Gain a deep understanding of Bitcoin, its underlying technology, and the factors that influence its price.
-
Diversify Your Portfolio: Consider allocating a portion of your investment portfolio to Bitcoin while maintaining a diverse range of assets.
-
Set Realistic Goals: Define your investment objectives and set realistic expectations, considering the volatility and risks associated with cryptocurrencies.
-
Stay Informed: Stay updated with the latest news, market trends, and regulatory developments that could impact the cryptocurrency market.
-
Seek Professional Advice: Consult with financial advisors or experts who specialize in cryptocurrencies to gain valuable insights and guidance.
Conclusion
JPMorgan's analysis reveals strong indications of increased retail interest in Bitcoin prior to the halving event. Retail investors, driven by factors such as growing awareness and the influence of digital platforms, are likely to play a significant role in shaping the cryptocurrency market. As retail interest surges, it is crucial for investors to approach the market with caution, conduct thorough research, and leverage the opportunities while managing the risks associated with cryptocurrencies.
FAQ
What is Bitcoin halving? Bitcoin halving is an event that occurs approximately every four years, where the number of new Bitcoins generated per block gets halved. It is a mechanism designed to control the supply of Bitcoin and has significant implications for its value and investor sentiment.
Why is there expected strong retail interest in Bitcoin prior to halving? JPMorgan's analysis indicates increased retail interest in Bitcoin before halving due to growing awareness, acceptance, and the influence of social media platforms. Retail investors are drawn towards Bitcoin during periods of heightened market activity like halving events.
What impact does retail interest have on the Bitcoin market? Retail interest can drive up the demand for Bitcoin, potentially impacting its price. The surge in retail interest preceding the halving event could lead to increased market volatility, offering opportunities and risks for investors.
How can retail investors leverage the anticipated surge in retail interest? Retail investors can leverage the opportunity by educating themselves about Bitcoin, diversifying their investment portfolio, setting realistic goals, staying informed about market trends, and seeking professional advice.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 05fcdfd8:fd31299f
2024-11-11 10:49:36Die Auswirkungen von Störsendern auf Reisen und wie Sie Ihre Privatsphäre und Sicherheit schützen können
In der modernen Gesellschaft ist Reisen zu einem integralen Bestandteil des Lebens der Menschen geworden. Mit zunehmender Reisehäufigkeit sind Informationssicherheit und Privatsphäre jedoch nach und nach zu wichtigen Themen geworden, die den Menschen Sorgen bereiten. An verschiedenen öffentlichen Orten, insbesondere in Flughäfen, Hotels und Touristenattraktionen, kann das Vorhandensein von Signal störsender eine potenzielle Bedrohung für die Sicherheit unserer persönlichen Geräte und Informationen darstellen. Aus diesem Grund ist es wichtig, die Auswirkungen von Störsendern zu verstehen und geeignete Sicherheitsmaßnahmen zu ergreifen.
1. Funktionsprinzip des Störsenders
Ein Störsender, oft auch „Signalstörsender“ genannt, ist ein Gerät, das Signale auf bestimmten Frequenzen aussendet, die die Kommunikation mit anderen drahtlosen Geräten stören oder verhindern können. Diese Geräte werden manchmal verwendet, um illegale drahtlose Kommunikation zu blockieren, beispielsweise in Gefängnissen, aber auch auf Reisen kommt es zu illegalem Einsatz. Hacker könnten beispielsweise Handyblocker verwenden, um die Mobiltelefonsignale von Menschen zu stören, um vertrauliche Informationen abzuhören oder zu stehlen.
2. Die Auswirkungen von Störsendern
1. Auswirkungen auf die Kommunikation: In Bereichen, in denen Störsender verwendet werden, kann es bei Mobiltelefonen und anderen drahtlosen Geräten zu Signalverlusten kommen, wodurch es unmöglich wird, Anrufe entgegenzunehmen oder Nachrichten zu senden. Dies kann im Ernstfall schwerwiegende Folgen haben.
2. Risiken für die Datensicherheit: Hacker können WLAN Jammer nutzen, um Funksignale abzufangen und die persönlichen Daten und Bankkontoinformationen der Benutzer zu stehlen. Wenn ein Gerät keine stabile Verbindung zum Netzwerk herstellen kann, neigen Benutzer dazu, die Sicherheit der Verbindung zu ignorieren, wodurch sich das Risiko eines Angriffs erhöht.
3. Datenschutzverlust: Wenn Benutzer gestört werden, nutzen sie möglicherweise unsichere Netzwerke oder Anwendungen, was das Risiko eines Datenschutzverlusts erhöht. Insbesondere in öffentlichen WLAN-Umgebungen können Hacker Interferenztechnologie nutzen, um Man-in-the-Middle-Angriffe durchzuführen und Benutzeraktivitäten zu überwachen.
3. So schützen Sie Privatsphäre und Sicherheit
1. Verwenden Sie ein virtuelles privates Netzwerk (VPN): Die Verwendung eines VPN verschlüsselt Ihren Internetverkehr und schützt Ihre Privatsphäre, insbesondere bei der Nutzung öffentlicher WLANs. Ein VPN erstellt einen sicheren Tunnel, sodass Ihre Daten während der Übertragung nicht gestohlen werden können.
https://www.jammermfg.com/de/alle-jammer.html
2. Vermeiden Sie Verbindungen zu ungesicherten Netzwerken: Versuchen Sie auf Reisen, Verbindungen zu WLAN-Netzwerken zu vermeiden, die nicht passwortgeschützt oder ungesichert sind. Wenn Sie es unbedingt nutzen müssen, stellen Sie sicher, dass Sie zusätzliche Sicherheitsmaßnahmen wie ein VPN oder mobile Daten ergreifen.
3. Aktualisieren Sie Ihre Geräte und Apps regelmäßig: Stellen Sie sicher, dass Ihr Telefon und Ihre Apps immer auf dem neuesten Stand sind, um Sicherheitslücken zu schließen. Hersteller veröffentlichen regelmäßig Updates, um potenzielle Sicherheitsprobleme zu beheben.
4. Verwenden Sie die Zwei-Faktor-Authentifizierung: Die Aktivierung der Zwei-Faktor-Authentifizierung erhöht die Sicherheit Ihrer Online-Konten. Auch wenn ein Hacker Ihr Passwort erhält, benötigt er noch einen zweiten Verifizierungsschritt, um auf Ihr Konto zuzugreifen.
5. Geben Sie Informationen sorgfältig weiter: Vermeiden Sie es, persönliche Informationen öffentlich preiszugeben, z. B. Kreditkarteninformationen oder private Inhalte in sozialen Medien. Achten Sie auf Ihre Umgebung und vermeiden Sie es, sensible Themen zu besprechen.
6. Verwenden Sie sichere Messaging-Tools: Verwenden Sie bei wichtigen Kommunikationen sichere Messaging-Apps wie Signal oder WhatsApp. Diese Apps bieten eine Ende-zu-Ende-Verschlüsselung, um Ihre Gespräche vor Abhörern zu schützen.
7. Sichern Sie Ihr Gerät: Stellen Sie sicher, dass Sie ein sicheres Passwort für Ihr Gerät festlegen und biometrische Daten (z. B. Fingerabdruck oder Gesichtserkennung) verwenden, um die Sicherheit zu erhöhen und zu verhindern, dass andere auf Ihr Gerät zugreifen, wenn Sie es nicht verwenden.
4. Zusammenfassung
Auf Reisen ist der Schutz Ihrer Privatsphäre und Sicherheit eine wichtige und notwendige Aufgabe. Auch wenn die Existenz von Störsendern und HF Detektor gewisse Auswirkungen auf die Kommunikation hat, können Sie durch die oben genannten Maßnahmen potenzielle Risiken wirksam reduzieren und sicherstellen, dass Ihre Daten nicht durchsickern oder verletzt werden. Während wir die Reise genießen, müssen wir wachsam bleiben und unsere persönlichen Daten und Privatsphäre schützen.
-
@ 6aa0e5a8:f1677da5
2024-11-11 08:42:28In diesem hochentwickelten technologischen Zeitalter waren Einsamkeit und Isolation des Menschen noch nie so präsent wie heute. Das Aufkommen der love doll hat ein tieferes Nachdenken über Intimität und menschliche Bedürfnisse ausgelöst.
Blickt man auf die lange Geschichte der menschlichen Zivilisation zurück, so war der Wunsch nach Intimität und Liebe schon immer ein Teil der menschlichen Natur. In der heutigen schnelllebigen Gesellschaft entfernen sich die zwischenmenschlichen Beziehungen jedoch immer mehr voneinander, und die Veränderungen in den Familienstrukturen haben dazu geführt, dass zu viele Menschen in geistige und körperliche Einsamkeit verfallen. Einigen Daten zufolge befindet sich etwa ein Viertel der Bevölkerung in einem Zustand der dauerhaften Einsamkeit.
Die Einsamkeit lässt die Nachfrage nach sexpuppe als „virtuelle Begleiter“ wachsen. Auch wenn Liebespuppe den Reichtum echter Intimität nicht vollständig wiedergeben können, so können sie doch für diejenigen, denen es lange Zeit an Intimität gefehlt hat, die körperliche und emotionale Leere zumindest bis zu einem gewissen Grad stillen. Auf der einen Seite zeigt dies, dass der Fortschritt von Wissenschaft und Technik uns mehr Wahlmöglichkeiten bietet, auf der anderen Seite spiegelt es aber auch einen Teil des Mangels an menschlicher Natur in der modernen Gesellschaft wider.
Davor können wir nicht die Augen verschließen. Wir sollten darüber nachdenken, was zu der Kälte in den intimen Beziehungen zwischen den Menschen geführt hat. Die Zunahme der Zahl der Singles, der Anstieg der Scheidungsrate, die niedrige Geburtenrate usw. sind allesamt Anzeichen dafür, dass der menschlichen Liebe und Intimität in unserer Gesellschaft nicht genügend Aufmerksamkeit geschenkt wird. Wir müssen darüber nachdenken, wie wir die menschliche Wärme wiederherstellen und die zwischenmenschliche Kommunikation stärken können, damit jeder ein Gefühl der Sicherheit und der Zugehörigkeit bekommt.
Gleichzeitig sollten wir auch darüber nachdenken, welche Art von intimer Beziehung wir anstreben. Ist die rein körperliche oder virtuelle Erfüllung nur eine unangebrachte Nachahmung wahrer Intimität? Der Kern einer intimen Beziehung besteht aus zwei Menschen aus Fleisch und Blut, die sich gegenseitig schätzen, verstehen, tolerieren und Verantwortung füreinander übernehmen. Vergessen wir langsam die guten Eigenschaften der Intimität?
Der Zweck der technologischen Entwicklung besteht darin, der Menschheit besser zu dienen, und nicht darin, sie zu entfremden und zu mechanisieren. real sex doll geben uns die Möglichkeit zum Nachdenken, es geht nicht um eine schwarz-weiße Entscheidung für richtig oder falsch, sondern wir sollten darüber nachdenken, wie wir Wohlwollen, Wärme und Verantwortungsbewusstsein nutzen können, um das humanistische Fundament intimer Beziehungen aufzubauen und die verlorene Temperatur der menschlichen Natur in dieser Ära des Hochgeschwindigkeitsbetriebs zurückzugewinnen.
-
@ 9ff58691:0bf6c134
2024-11-11 08:29:00Курган - один из крупнейших городов Уральского региона, административный центр Курганской области. За последние двадцать лет этот город претерпел значительные изменения, превратившись из серого провинциального центра в современный, динамично развивающийся город. Об изменениях рассказал Олег Фролов – коренной житель города.
- Олег, расскажите, как за последние двадцать лет изменился ваш родной город Курган? Что именно изменилось в городе за это время?
-
За эти годы Курган преобразился до неузнаваемости. Когда я был ребенком, город казался мне серым и унылым. Сейчас он стал более современным и привлекательным. Пожалуй, самые заметные изменения произошли в сфере образования и медицины. Многие школы и детские сады были капитально отремонтированы или построены заново. Появились современные учебные классы, оснащенные новейшим оборудованием, включая интерактивные доски, 3D-принтеры и системы искусственного интеллекта для помощи в обучении. Городские больницы и поликлиники были модернизированы, оснащены новейшей диагностической техникой: роботизированные хирургические системы и системы искусственного интеллекта для анализа медицинских данных. Качество и доступность медицинской помощи значительно возросли.
-
А как изменилась культурная жизнь города?
-
Был отреставрирован и значительно расширен городской драматический театр. Открылись новые концертные залы, музеи и выставочные пространства. Стало проводиться гораздо больше культурных мероприятий. Жителям других регионов выдалась возможность посетить каждое культурное место нашего города с помощью экскурсий дополненной вирутальной реальностью. Курган превратился в настоящий культурный центр региона.
-
Как вы оцениваете эти изменения? Довольны ли вы тем, как развивается ваш родной город?
-
Я очень рад тем преобразованиям, которые произошли в Кургане за последние годы. Город стал более комфортным и привлекательным для жизни. Конечно, есть еще над чем работать, но в целом я вижу, что Курган уверенно движется вперед, становясь современным и развитым.
-
Олег, а есть ли у вас в Кургане любимое место, куда вы любите ходить?
-
Безусловно. Мое любимое место - это Центральный парк культуры и отдыха. Это настоящее сердце нашего города. Парк преобразился до неузнаваемости - он стал мобильным, с большим экраном для проведения мероприятий, а голограммы проводят интересные экскурсии. Здесь созданы все удобства для людей с ограниченными возможностями.
-
Что вам особенно нравится в этом парке?
-
Парк очень красивый и ухоженный. Здесь высажено множество зеленых насаждений - деревьев, кустарников, цветов. Есть уютные аллеи для прогулок, детские площадки, спортивные зоны. Летом работают аттракционы, открыты кафе и летние веранды. Зимой заливают большой каток, который очень популярен среди жителей. Мне очень нравится культурная жизнь парка. Здесь регулярно проводятся различные фестивали, концерты, выставки. Летом часто организуют кинопоказы под открытым небом. Зимой работает резиденция Деда Мороза, куда приходят целыми семьями.
-
Похоже, это действительно замечательное место. Спасибо, что поделились своими впечатлениями!
- Да, и правда замечательное. Я очень рад, что за последние годы он преобразился и стал настоящим центром притяжения для жителей города. Приглашаю всех приехать и лично убедиться в этом!
-
@ 9ff58691:0bf6c134
2024-11-11 06:04:29За последние 16 лет Курган претерпел значительные инфраструктурные изменения, направленные на повышение качества жизни горожан и развитие города. Ниже представлен обзор основных нововведений:
Новые здания и сооружения: - Построен современный многофункциональный спортивно-развлекательный комплекс "Курганская Арена" с ледовой ареной, бассейном и фитнес-центром. - Открыт новый корпус Курганского государственного университета, оснащенный по последнему слову техники лабораториями и аудиториями. - Возведен крупный торгово-развлекательный центр "Курган Молл" с магазинами, кинотеатром, ресторанами и зонами отдыха. - Построен современный медицинский центр "Курганская клиника", оказывающий широкий спектр высокотехнологичных услуг.
Транспортная инфраструктура: - Открыта новая скоростная автомагистраль, соединяющая центр города с аэропортом и федеральной трассой. - Запущено движение городского скоростного трамвая, связывающего отдаленные районы с центром. - Построены два новых транспортных кольца на основных развязках, значительно улучшившие дорожную ситуацию. - Обновлен автобусный парк, переведенный на экологичные электрические и гибридные модели.
Благоустройство и озеленение: - Реконструирован центральный городской парк с новыми пешеходными зонами, велодорожками и зонами отдыха. - Высажены тысячи новых деревьев и кустарников, создавшие "зеленые легкие" города. - Построены новые общественные пространства - набережная, пешеходные улицы и площади с современным дизайном. - Модернизирована система освещения улиц, переведенная на энергоэффективные светодиодные технологии.
В целом, Курган за последние 16 лет значительно преобразился, став более современным, комфортным и экологичным городом с развитой инфраструктурой. Эти изменения повысили качество жизни горожан и привлекательность Кургана для туристов и инвесторов.
-
@ 8f2fe968:0fbf4901
2024-11-11 02:20:35 -
@ 8d34bd24:414be32b
2024-11-10 22:42:29In Part 1, we got to see God’s initial promises to Adam, Eve, and all mankind with the proto Gospel:
“He shall bruise you on the head,\ And you shall bruise him on the heel.”(Genesis 3:15)
We saw God’s promises to Abraham:
-
To have his name made great.
-
To receive the land of Israel.
-
To father many nations.
-
That “in you all the families of the earth will be blessed.”
We saw God’s reiterated promises to Jacob, Abraham’s grandson.
Now we will look at the partial fulfillment of these promises and new promises made.
The Promised Land (Quick Summary)
Jacob fathered 12 sons. His son Joseph was sold as a slave to Egypt where he became second to the Pharaoh and saved Jacob’s family and the rest of the Middle East from famine. The Israelites then spent around 400 years in Egypt before Moses was called by God to lead the Israelites to the promised land. God performed awe inspiring miracles through Moses to force Pharaoh to release the Israelites who had been made slaves by the Egyptians.
After crossing the desert, the Israelites reached the promised land, but instead of trusting the God who had rescued them with miracles never before seen, they were fearful and refused to obey God and to enter the promised land. God then had them wander 40 more years in the wilderness until the rebellious adults had all died. Then God miraculously aided this band of shepherds to conquer the land of Canaan and inhabit it, partially fulfilling His promise to give them this land.
After approximately 410 years of judges leading the people of Israel and them repeatedly going astray, God gave them the king they requested, Saul. God gave them a tall and handsome, but selfish and unfaithful king to show them the error of their ways. After showing them their error, God gave them a godly king, a man after God’s own heart.
David
When God spoke His promise (covenant) with David, He reiterated the promises given to Abraham and to Jacob, but added:
“When your days are complete and you lie down with your fathers, I will raise up your descendant after you, who will come forth from you, and I will establish his kingdom. He shall build a house for My name, and I will establish the throne of his kingdom forever. I will be a father to him and he will be a son to Me; when he commits iniquity, I will correct him with the rod of men and the strokes of the sons of men, but My lovingkindness shall not depart from him, as I took it away from Saul, whom I removed from before you. Your house and your kingdom shall endure before Me forever; your throne shall be established forever.” (2 Samuel 7:12-16) {emphasis mine}
The first part of this promise was fulfilled through David’s son, Solomon. Solomon sat on the throne. Solomon built a temple to worship God. Solomon was not cut off for his sins at the end of his life when he drifted away from God. Even though ten tribes were taken away from Solomon’s son Rehoboam, Rehoboam remained king of the two tribes of Judah and Benjamin and therefore his throne remained.
The final promise, “Your house and your kingdom shall endure before Me forever; your throne shall be established forever,” was also partially fulfilled through Jesus at His incarnation and will be fully fulfilled when He returns for His millennial reign.
“I will raise up your descendant after you, who will come forth from you, and I will establish his kingdom. He shall build a house for My name, and I will establish the throne of his kingdom forever.” Jesus is a descendant of David and His kingdom will be established at the end of the age — a kingdom of believers. “He shall build a house for My name.” Most of the time Israel is referred to as the house of God while the church is referred to as the body of Christ. In the millennial kingdom they will be united into one house, the adopted children which are the gentile church and the natural children which are the Jews who have finally accepted their Messiah. The final kingdom on this earth will be the millennial reign of Jesus (the promised heir of David), and then God will produce a new heaven and a new earth upon which Jesus will reign forever.
Once again, David did not get to experience the complete fulfillment of the promises made to him. It was partially fulfilled in his son, Solomon, but it has taken thousands of years to partially fulfill this promise and we don’t know for sure how long it will be until complete fulfillment.
Jeremiah
By the time of Jeremiah, the nation of Israel was gone and Judah was corrupted beyond recognition. The fulfillment of God’s promises seemed impossible, but God’s promises are faithful and true. God spoke to Jeremiah to remind him, that although Judah and Israel were being punished, ultimately, God would fulfill all His promises. He begins with these tender words:
Now the word of the Lord came to me saying,\ “Before I formed you in the womb I knew you,\ And before you were born I consecrated you;\ I have appointed you a prophet to the nations.”\ \ Then I said, “Alas, Lord God!\ Behold, I do not know how to speak,\ Because I am a youth.”\ \ But the Lord said to me,\ “Do not say, ‘I am a youth,’\ Because everywhere I send you, you shall go,\ And all that I command you, you shall speak.\ Do not be afraid of them,\ For I am with you to deliver you,” declares the Lord.\ \ Then the Lord stretched out His hand and touched my mouth, and the Lord said to me,\ “Behold, I have put My words in your mouth.\ See, I have appointed you this day …” (Jeremiah 1:4-10a)
First God tells Jeremiah that He loves him so much that He formed him in his mother’s womb for a special purpose, to speak His judgement and blessings on Israel. God comforts Jeremiah when Jeremiah fears he is unworthy of the great task God has for him. God promises to be with Jeremiah and to help Jeremiah fulfill His will.
As Christians we are similarly told that God created us for His purpose and His blessing and He will be with us, empowering us for whatever tasks He has called us to do.
God promises that despite Israel’s nonstop rebellion, He will be gracious and “not be angry forever.”
Go and proclaim these words toward the north and say,\ ‘Return, faithless Israel,’ declares the Lord;\ ‘I will not look upon you in anger.\ For I am gracious,’ declares the Lord;\ ‘I will not be angry forever.\ Only acknowledge your iniquity,\ That you have transgressed against the Lord your God\ And have scattered your favors to the strangers under every green tree,\ And you have not obeyed My voice,’ declares the Lord.\ ‘Return, O faithless sons,’ declares the Lord;\ ‘For I am a master to you,\ And I will take you one from a city and two from a family,\ And I will bring you to Zion.’ (Jeremiah 3:12-14)
God will always fulfill His promises even if that means calling His people home from the ends of the earth where they are scattered “one from a city and two from a family.”
God promises to call both Israel and Judah back to the land promised to them all of the way back in time of God’s promise to Abraham. There is a partial return, after Judah’s 70 year exile in Babylon, leading to a rebuilding of the temple for a second time. We are in the middle of another return to Israel that began when Israel was recreated in 1948 and is continuing today. Despite the fact that the people of Israel are being barraged with rockets, drones, and missiles daily and are at risk of being attacked by suicide bombers and terrorists, God is calling His people home for His big finale.
I believe these continuing verses refer to Jesus’s second coming and the millennial reign of Christ.
“Then I will give you shepherds after My own heart, who will feed you on knowledge and understanding. It shall be in those days when you are multiplied and increased in the land,” declares the Lord, “they will no longer say, ‘The ark of the covenant of the Lord.’ And it will not come to mind, nor will they remember it, nor will they miss it, nor will it be made again. At that time they will call Jerusalem ‘The Throne of the Lord,’ and all the nations will be gathered to it, to Jerusalem, for the name of the Lord; nor will they walk anymore after the stubbornness of their evil heart. In those days the house of Judah will walk with the house of Israel, and they will come together from the land of the north to the land that I gave your fathers as an inheritance. (Jeremiah 3:15-18)
This passage isn’t just a call back to the promised land. This is another promise of God. “Then I will give you shepherds after My own heart, who will feed you on knowledge and understanding.” After Jesus’s first coming, He made things clear about His plan of redemption for Israel and for the gentiles. He made clear His promise to bless all nations through Himself, a descendant of David, Jacob, and Abraham, to whom the promises were given. He demonstrated how His laws for the Jews pointed them to God’s ultimate plan.
It is actually ironic that the “shepherds after My own heart, who will feed you on knowledge and understanding” are most likely Christian believers who are returned to earth to reign with Christ during the millennial kingdom. Gentile Christians were enabled to have a relationship with God through the Jews and then God will use those gentile Christians to shepherd the Jews back to God, so we can all worship God together.
It won’t be until Jesus’s second coming and His thousand year reign that “they will call Jerusalem ‘The Throne of the Lord.’” It won’t be until Jesus’s second coming and His thousand year reign that they will not “walk anymore after the stubbornness of their evil heart.” God will finally make the full land of Israel a land of peace and prosperity for the Jews, but also to all the nations of the earth.
But at the time of Jeremiah’s prophecy, God is promising punishment and hardship now to teach His people to be faithful and to trust God’s faithfulness.
Behold, I am bringing a nation against you from afar, O house of Israel,” declares the Lord.
“It is an enduring nation,\ It is an ancient nation,\ A nation whose language you do not know,\ Nor can you understand what they say. (Jeremiah 5:15)
Due to Israel and Judah’s rebellion, both nations are taken away by a foreign nation into exile. Jeremiah, in particular, prophecies the 70 year exile of Judah in Babylon and their return to the promised land. God promised Abraham and Jacob (Israel) the land of Israel (previously Canaan) and He always keeps His promise, so He always brings them home in ways that are hard to comprehend.
Relatively near the end of the 70 year exile in Babylon, God had Persia conquer Babylon and then a Persian king, not only allowed the Israelites to return to Jerusalem to rebuild the city, the walls, and the temple, but also he funded the return to Israel and returned the gold, silver, and bonze temple implements. What conquering nation does something like that? It was clearly all God.
God may delay His promises, but He never cancels them.
For this the earth shall mourn\ And the heavens above be dark,\ Because I have spoken, I have purposed,\ And I will not change My mind, \ nor will I turn from it.” (Jeremiah 4:28)
When God makes a promise, it is as good as done.
Trust Jesus.
-
-
@ 36bedab2:524acad4
2024-11-10 21:37:521. Power ON
- Quando você liga o computador, ele inicia o processo de boot.
- Esse primeiro passo envia energia aos componentes do sistema e dispara o BIOS (ou firmware UEFI em sistemas mais recentes).
2. BIOS (Basic Input/Output System)
- O BIOS ou UEFI é o firmware inicial que roda logo após o computador ser ligado.
- Ele executa um conjunto de verificações no hardware (chamado POST - Power-On Self-Test) e inicializa os dispositivos básicos necessários para o boot, como o disco rígido, memória RAM e CPU.
- O BIOS então procura o dispositivo de boot (HD, SSD, USB, etc.) e carrega o MBR ou a partição EFI para dar continuidade ao processo de boot.
3. Master Boot Record (MBR) ou EFI Partition
- O MBR (Master Boot Record) ou a partição EFI (em sistemas com UEFI) é onde ficam armazenadas as informações sobre o carregamento do sistema operacional.
- Em sistemas antigos, o MBR continha o boot loader e as tabelas de partição. Nos sistemas modernos com UEFI, a partição EFI cumpre essa função.
- O MBR ou a partição EFI passa o controle para o boot loader, que é responsável por carregar o sistema operacional.
4. Boot Loader (e.g., GRUB)
- O Boot Loader (exemplo: GRUB) é um programa responsável por carregar o sistema operacional no momento do boot.
- Ele permite selecionar qual sistema operacional inicializar (em caso de dual boot) e passa o controle para o kernel do sistema.
- GRUB (Grand Unified Bootloader) é o boot loader mais comum em sistemas Linux.
5. Kernel
- O kernel é o núcleo do sistema operacional Linux.
- Ele é carregado na memória pelo boot loader e começa a configurar os recursos do sistema, como a CPU, a memória e os dispositivos de hardware.
- O kernel é responsável por gerenciar os recursos do sistema e permitir a comunicação entre o hardware e o software.
6. Initial RAM disk - initramfs
- O initramfs é um sistema de arquivos temporário carregado na memória logo após o kernel.
- Ele contém módulos e drivers essenciais para que o sistema possa iniciar corretamente e acessar o sistema de arquivos principal do disco.
- O initramfs é desmontado após o sistema principal estar carregado.
7. /sbin/init (parent process)
- Após o kernel inicializar o sistema, ele chama o processo /sbin/init, que é o primeiro processo a rodar no Linux e é o "pai" de todos os outros processos.
- O init é responsável por iniciar e gerenciar todos os outros processos do sistema.
- Em muitas distribuições modernas, o init foi substituído por outros sistemas de inicialização, como o systemd, que tem mais funcionalidades e permite um gerenciamento mais eficiente de processos.
8. Command Shell using getty
- Getty é o processo que configura e gerencia terminais para o login do usuário.
- Ele exibe a tela de login em sistemas baseados em linha de comando.
- Se o sistema tiver uma interface gráfica, o getty geralmente passa o controle para o gerenciador de login gráfico.
9. Graphical User Interface (X Window ou Wayland)
- Finalmente, o sistema carrega a interface gráfica usando o X Window System (X11) ou o Wayland (um sistema gráfico mais moderno).
- Esse é o ambiente visual onde o usuário pode interagir com o sistema usando janelas, ícones, menus, etc.
- X11 e Wayland são servidores gráficos que gerenciam como as janelas e aplicativos são exibidos e manipulados na tela.
Como esses processos se intercalam?
- Hardware ligado → BIOS/UEFI realiza verificações básicas.
- BIOS/UEFI encontra o dispositivo de boot e carrega o MBR ou partição EFI.
- MBR/EFI localiza e executa o boot loader (GRUB).
- GRUB permite que o usuário escolha o sistema operacional e carrega o kernel do Linux.
- Kernel inicializa o sistema, configurando os recursos de hardware e carregando o initramfs.
- Initramfs fornece drivers e módulos necessários para o kernel acessar o sistema de arquivos principal.
- Kernel chama o processo /sbin/init (ou systemd), que inicia todos os serviços e processos do sistema.
- Init executa o getty para configurar o terminal de login.
- Getty chama o ambiente gráfico (X11 ou Wayland) se estiver presente, e o usuário pode então usar o sistema na interface gráfica.
-
@ bcea2b98:7ccef3c9
2024-11-10 19:34:24@chess a3
originally posted at https://stacker.news/items/762161
-
@ a901cbe4:bd85452f
2024-11-10 18:33:53Bitcoin under $100K? Let's be honest: it’s kind of like waiting for your favorite song to drop at a concert. The crowd's hyped, but you're still waiting for the real action to begin. Sure, $80K is cool — it's solid, it's impressive, but it’s not the headline act. The true show begins when Bitcoin crosses that $100K milestone, and until then, we’re in the “pre-game” phase.
Here's why Bitcoin under $100K is merely the warm-up, and why we’re all just biding our time for what’s coming next.
Bitcoin Under $100K: Just a Pre-Party Vibe
Right now, Bitcoin at $80K feels like that awkward moment at a party when everyone’s gathered in the kitchen, getting their drinks ready, and the music is almost turned up. Sure, you can feel the energy, but everyone’s really waiting for the DJ to hit play on that banger. Bitcoin at $80K is promising, but it’s just a preview of the real excitement that’s about to unfold.
This isn’t the time for victory laps. It’s the time to get ready, to watch and wait, because when Bitcoin hits $100K, that’s when the party really starts. The market will pop, the spotlight will shine brighter, and the world will be watching as Bitcoin climbs to new heights.
The $80K Milestone: A Solid Step, But Not The Destination
Let’s take a moment to appreciate $80K. It’s a big number in the world of crypto, and a milestone in its own right. But let’s not kid ourselves — it’s not the finish line. It’s like running a race, getting to the 80% mark, and looking ahead at the final stretch. You’re feeling good, but the best part is still coming.
Bitcoin’s at $80K and that’s a statement, no doubt. But $100K is the magic number. It’s the one that makes the headlines, the one that makes everyone say, “Okay, Bitcoin’s for real.” $80K is impressive, but it’s not the showstopper. So while the excitement is there, we all know Bitcoin’s best performance is still ahead.
Why $100K Is the Real Milestone We’ve All Been Waiting For
When Bitcoin finally crosses that $100K mark, it’s going to be a global event. It’ll be the moment that people who were skeptical finally start to take notice, the moment when Bitcoin becomes a household name, not just a niche investment. It's like watching a rising star finally step into the spotlight and own the stage.
And here's the thing: When Bitcoin hits $100K, it won’t be a “surprise.” It’s been in the works for years. But it’ll be the moment when everyone truly grasps the scale of what’s happening. The world will finally recognize that Bitcoin isn’t just a speculative asset — it’s a fundamental part of the financial landscape.
Bitcoin’s Resilience: Boring Until It’s Not
What makes $80K so intriguing isn’t just the number itself — it’s that Bitcoin’s still holding strong, despite all the FUD (fear, uncertainty, doubt) thrown at it. Critics have come and gone, but Bitcoin’s still here, solid as ever. It’s like the underdog story that just refuses to be over.
Bitcoin at $80K is doing its thing, even when people doubt it. It’s showing up every day, proving that it’s built to last. Sure, it may seem like “just another day in the crypto market,” but trust me — Bitcoin’s resilience is what makes this moment significant. It’s not a bubble; it’s an evolution. And that evolution is building toward something even bigger.
What’s Next: Bitcoin and Beyond $100K
Once Bitcoin hits $100K, everything changes. The narrative shifts. Bitcoin goes from "that risky bet" to "the future of finance." And that’s where things get wild. It’s not just about price anymore — it’s about the institutional and mainstream acceptance of Bitcoin. It’s about the fact that this isn’t a fad, it’s a global movement that’s not going anywhere.
After $100K? Who knows. Maybe $200K, $500K, or more. But let’s not get ahead of ourselves. We’re still waiting for that first major milestone to break, and when it happens, it’s going to be like a flip of a switch. A whole new world will open up.
The Waiting Game: It’s Gonna Be Worth It
So, while Bitcoin under $100K might feel like a long wait, remember: it’s all part of the journey. Bitcoin at $80K is just the start of something bigger. It’s the calm before the storm, the deep breath before the final sprint.
When $100K hits, we’ll all be able to say we were here for it. And when it crosses that threshold, it’s going to be one of the biggest moments in the world of finance — one that we’ll all look back on and say, "We saw this coming." And for those of us who’ve been riding the wave since the early days? Well, we’ll be popping the champagne.
The real show starts at $100K. We’re just waiting for the curtain to rise. 🚀
-
@ df478568:2a951e67
2024-11-10 14:26:38*note: This version of the article uses some four-letter words some people may not like. If you prefer cartoon-like cussing, you can read it here.
It's that time, again--The bull market which happens every 4 years like the Winter Olympics. We've surpassed the previous USD/ATH. This is the 498th resurrection of our beloved bitcoin, but you know what really turns my crank? Bitcoin cybersecurity!
I love digging into the nitty-gritty of cryptography not CrYpTo and finding creative ways to use my toy collection. I mean, hardware wallet(a.k.a. signing devices) collection. Nah, they're toys. Yesterday, as I was playing with my toys, I was inspired to use my seed signer after a long hiatus. To be clear, I love the Seed Signer. It has some neat features: - Generate seeds with the entropy from a picture - Hand-drawn QR codes for easy seed backup - You can DIY
It looks cool too, but for the record, I wouldn't use it for a single sig wallet because it does not contain a secure element. According to NVK, there are zero days and supply chain attacks you can't really mitigate with the seed signer. Although I think this is a fair criticism, it can be useful: - As an educational tool - Part of a multi-sig backup. Michael Flaxman, in his 10X Your BTC Security Guide, suggests removing a Wi-Fi card and hard drive from a computer, boot up TAILS, plug your computer into an RJ45 port with an Ethernet cable for Internet access, navigate to https://seedpicker.net/ on the default TOR browser, unplug the Ethernet cable from the RJ45 port, and generate the seed for your paper wallet. That sentence is too damn long, but this is indicative of how cumbersome this method is.
This was necessary when he wrote it since we did not have as many hardware wallets back then as are on the market today. In my cybersecurity opinion, and I am not a certified cyber security expert, buying a seed signer requires less technical know-how than using Flaxman's guide. This is not a criticism of Flaxman, his guide is one of my favorite things ever written about bitoin because of it's educational value. If you want to learn about extreme cybersecurity, Flaxman's guide makes an excellent lab. We assume no network security model is 100% secure, so we never risk compromising our keys by ever connecting to an Internet-connected device. It's a hell of an education.
Seed Signer Is For Everybody
Say you work a full time job and didn't spend the majority of your free time learning this stuff during a pandemic. Or maybe you're like my wife. She think's Bitcoin is cool now, but this one time she walked in on me with my Cold Card plugged into a 9v battery and said, "See. I'm never using whatever the fuck that thing is. My wife is never removing a Wi-Fi card from a laptop. If you're like my wife, the Seed Signer is right for you, if you want to use multisig. It's also not imperative to use the 9v battery if you don't want to. You can just plug it into a wall outlet like everybody else.
I want to start bringing the Seed Signer to my local meetup, but it's at a brewery and I don't want to be a wallflower because I need to plug the damn thing into an outlet so I thought, “Why not try the Cold Power with my Seed Signer?”
I found one of my magnetic micro-USB adapters and plugged it into the Seed signer, Then I plugged the battery in. My switch is on because the flimsy plastic switch broke the first time I turned it on, but it still works. I just broke it with my fat thumbs.
It felt as if it took as long as a difficulty adjustment to boot-up, but in reality it was about the time it takes the Liquid Network to find a block. I proceeded to take a picture and write down a 12 word seed. I plan on using this with the Nunchuck testnet wallet to show people at my local Meetup how to create seeds and take self-custody of their Bitcoin. Again, I would not use this as a single sign because there are more secure options, but it is a great tool for teaching Bitcoin cybersecurity and can be a great wallet that can mitigate the risk of supply-chain and retirement attacks when used as part of a multi-sig quorum. I can also now use it in the middle of a brewery. I'll write about how this goes the next time I get down there.
Why We Use The Cold Power
I placed one of those magnetic adapters I bought on Amazon into one of the power holes. Power holes is a technical term for microUSB. This is because the Cold Power does hooks up to a cable that does not transmit data, only Power. Get it? It's like a cold wallet, but instead of a wallet, it's a power cable. You hook this cable up to a technology which was invented in 1836, a [battery]. 9V batteries contain no data. It is only Power, but most of us must trust Coinkite. Maybe they programmed the green part to be a bitcoin stealing script. I doubt this and think Coinkite is an honest company, but the awesome sauce thing is, the little magnet I bought on Amazon does not allow the transmittal of data. I don't need to plug in a charger that might be compromised.
This might sound paranoid, but in Tools of Titans, Samy Kamkar, malware has even been found in cigarette lighter chargers. Imagine a fix of nicotine costing you you entire life savings. That's not likely to happen, but why take a chance? It's better to spend several thousand sats on a charger and a 9v battery than lose your whole stack.
According to Wired Magazine, he can also learn the keystrokes you're typing on your laptop keyboard through a window. This means typing a seed onto a laptop might not be the best idea even if you are afraid of this. It is better to take a picture and use the entropy from the random picture.
Powering The Seed Signer With A Coinkite Product
Seed Signer and NVK, the CEO of Coinkite seem to have some beef on nostr, but it's none of my business. The part I find interesting is a product made by Coinkite works with a product made by Seed Signer. This was made for the Cold Card, but it works with a hardware wallet made from someone else. Too bad politics isn't more like that. It's nice to see two rival companies make products that are compatible with each other, but that's just the way free and open source software like bitcoin is. Seeds from Coinkite can be used with the Seed Signer. Maybe that's okay if it's only $1,000 worth of bitcoin on the Seed Signer. You don't need to go to Defcon 5 for every single sat. It's not practical. Sure, if the NSA was after you and wanted to steal your $1,000 worth of bitcoin from you, they could probably do it. Why would they spend ten thousand dollars to do this to you? This is not in most people's threat models.
Wait...Then why do you need to use the 9v battery thing-a-ma-jig? I technically don't need to , but we could also use this for a multi-signature quorum? What if you took your wallet to a safe deposit box, but the vault does not have a plug?
I created this key with no power outlet at all. This means I could do this in the middle of Alaska where there's no cell phones, where you only need to worry about bears stealing your seed phrase... That's a bit much, but it's possible.
I was not able to take a picture on the same battery charge so You might want to use a fresh battery if you ever try this yourself.
Thanks for reading. - If you like this blogs with no swear words, send sats to marc26z@strike.me/ - If you like this blog with swear words, send sats to marc@npub.pro/
✌️
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0no
As Seen On TIR: http://p66dxywd2xpyyrdfxwilqcxmchmfw2ixmn2vm74q3atf22du7qmkihyd.onion/use-a-seed-signer-with-cold-power/
-
@ c0e4bd0b:1c5734af
2024-11-10 12:15:08Bitcoin Calendar Definition
Layer: Applications
Status: Draft
Bitcoin defines the halving cycle as 210,000 blocks, as defined in the file
kernel/chainparams.cpp
. This number was apparently chosen as an aesthetically pleasing number which equates almost exactly to 4 years, according to the ten-minute block schedule. This BIP proposes using this parameter of Bitcoin as the basis for reckoning calendar time, defined as follows.nBlocksPerYear = 210000 / 4 // calculates to 52,500 nBlocksPerMonth = nBlocksPerYear / 12 // calculates to 4375
The calculations above produce integer results, making calendrical calculations based on block height extremely convenient. The zero-based year and month are calculated as follows, using integer division (/) and mudulo (%) based on block height h:
year = h / 52500 month = (h % 52500) / 12
Furthermore, we assume a bitcoin day length of 144 blocks. This is consistent with the target of 10-minutes per block and the 2016 blocks every two weeks for the difficulty adjustment period. This results in months of 30 days, with a small remainder:
nBlocksPerDay = 144 daysPerMonth = nBlocksPerMonth / nBlocksPerDay // calculates to 30.something
A human-friendly date can thus be displayed based upon block height, with familiar calendrical characteristics of 30 full days per month (with a partial day 31) and 12 months per year. As of this writing, the current bitcoin date is 7/24/17, 24-07-0017, or the twenty fourth day of the seventh month of the seventeenth year of Bitcoin.
This definition forms the basis for a culturally independent and socially universal calendar system which is easy to calculate, durable, and financially relevant.
Cross-referencing with other calendar systems:
Since this date will not synchronize exactly to extant calendar systems, a notation needs to be used in cases where ambiguity would result. Taking the solar day as the example, references that cross over between the solar day and the bitcoin date need to have a qualifier resolving the phase discrepancy (as is done when referring to dates in ancient calendar systems that do not align with the turn of the date at midnight). For example, the Bitcoin date of 7/24/17 would be written as November 9/10, 2024, making it clear that it touches both of those solar days. However, this format should only be used for dates in which the two calendar systems are more out of sync than in sync. For dates that are more in sync than out of sync, no overlap day should be given, because it would add ambiguity where there otherwise was none.
Bitcoin Calendar Synchronization
Layer: Consensus
Status: Draft
The Bitcoin calendar (referring to the prior definition) would be more economically relevant to earthlings if the Bitcoin year actually stayed synchronized with the growing seasons of the tropical year. Currently, the Bitcoin year begins in the springtime of the northern hemisphere, but it is offset one year and there is currently nothing to keep the bitcoin year from drifting further out of synchronization with the tropical year.
To keep the Bitcoin year in sync with the seasons, the bi-weekly proof-of-work difficulty adjustment could be tailored to aim toward better alignment during every difficulty adjustment. Normally, the difficulty is adjusted upward or downward a maximum factor of 4, as defined in the file
pow.cpp
. The determination of the value within that range is made solely on the basis of the rate of block discovery during the prior 2016-block (two-week) period.The existing difficulty adjustment scheme has resulted in the Bitcoin calendar generally sliding earlier every year, presumably due to the fact that the global hash rate is generally increasing rather than decreasing. The historical dates for the year beginnings and the corresponding duration of the Bitcoin year are as follows:
|Year|Block|Date|Days| |-:|-:|--|-:| |0|0|01/03/09|| |1|52500|04/22/10|474| |2|105000|01/28/11|281| |3|157500|12/14/11|320| |4|210000|11/28/12|350| |5|262500|10/09/13|315| |6|315000|08/10/14|305| |7|367500|07/29/15|353| |8|420000|07/09/16|346| |9|472500|06/23/17|349| |10|525000|05/29/18|340| |11|577500|05/23/19|359| |12|630000|05/11/20|354| |13|682500|05/07/21|361| |14|735000|05/05/22|363| |15|787500|04/29/23|359| |16|840000|04/19/24|356|
As can be seen, the number of days in the actual Bitcoin year are consistently fewer than the number of days in the tropical year (365.2425). Assuming the hash rate will generally continue to increase, this trend should continue, which allows us to make a convenient simplifying assumption.
Conceptually this proposal seeks to add an additional, limited offset to the work requirement based on whether the Bitcoin calendar is ahead of schedule or behind schedule, in comparison to the tropical year. We can assume based on the trends, however, that we only need to "slow down" the block rate slightly to keep it in sync with the seasons. Therefore, this proposal aims to do only that.
If the Bitcoin block height is a certain amount ahead of the calendar synchronization goal (per the trend), the difficulty would be increased one notch more than required by the normal calculation, if not already at the limit of adjustment for that period. This would make it impossible for the proposed change to overpower the existing calculation, but would still provide a gentle enough push when needed to keep the calendar in sync, thus accomplishing the purpose.
Fork considerations by the author:
A consensus change to the proof of work calculation would normally result in a hard fork. However, in the case that we only potentially increase the difficulty and never decrease it relative to non-upgraded nodes in the network, this means that during the transition, only upgraded nodes would be at risk of rejecting blocks for not meeting the more stringent difficulty level necessary to synchronize the calendar.
The new nodes would therefore need to be programmed to yield to the non-upgraded difficulty criteria until most of the network has upgraded, at which point activation would occur (as explained below) and miners would be obliged to meet the tougher requirements demanded by all upgraded nodes. Nodes that still had not upgraded by that time would remain unaffected, since the post-activation blocks would only have more proof of work, and not less, than non-upgraded nodes require.
More importantly, an overwhelming majority of the hash rate should be fully upgraded to avoid a situation where non-upgraded, non-mining nodes are forked by a longer chain created by non-upgraded miners. A sufficient portion of the hash rate following the upgrade path would eliminate this possiblity, even for non-mining nodes that don't upgrade, because the longer chain will come from the greater hash power and there would be no financial incentive for miners to switch back to catering to a minority of non-upgraded nodes.
Proposed activation method:
Upgraded nodes would delay the relaying of blocks that do not meet the more stringent requirements. This would begin as a confirmation-time penalty to upgraded nodes, but as the upgrade expands to more nodes, the effect would shift to incentivizing miners to produce blocks that conform to the upgrade in order to build on the longest chain faster.
Optional second-phase activation:
For the longer term, it might be advisable to also implement the corresponding opposite influence on the proof of work adjustment for the case where the simplifying assumption taken above does not hold. In other words, if hash rate were to take on a trend of decreasing over a significant period of time at some point in the future leading to a Bitcoin year length greater than 365 days, the calendar drift would ideally be pushed in the other direction by a relaxing influence on the proof of work requirement instead of a tightening influence. Since this would definitely result in a hard fork relative to un-upgraded nodes, this feature, if implemented, would need to be kept inactive for much longer, and only activated if/when the number of non-upgraded nodes becomes so insignificant that a hard fork is no longer a concern.
Join the conversation on stacker.news.
-
@ c0e4bd0b:1c5734af
2024-11-10 12:13:26Bitcoin Calendar Definition
Layer: Applications
Status: Draft
Bitcoin defines the halving cycle as 210,000 blocks, as defined in the file
kernel/chainparams.cpp
. This number was apparently chosen as an aesthetically pleasing number which equates almost exactly to 4 years, according to the ten-minute block schedule. This BIP proposes using this parameter of Bitcoin as the basis for reckoning calendar time, defined as follows.nBlocksPerYear = 210000 / 4 // calculates to 52,500 nBlocksPerMonth = nBlocksPerYear / 12 // calculates to 4375
The calculations above produce integer results, making calendrical calculations based on block height extremely convenient. The zero-based year and month are calculated as follows, using integer division (/) and mudulo (%) based on block height h:
year = h / 52500 month = (h % 52500) / 12
Furthermore, we assume a bitcoin day length of 144 blocks. This is consistent with the target of 10-minutes per block and the 2016 blocks every two weeks for the difficulty adjustment period. This results in months of 30 days, with a small remainder:
nBlocksPerDay = 144 daysPerMonth = nBlocksPerMonth / nBlocksPerDay // calculates to 30.something
A human-friendly date can thus be displayed based upon block height, with familiar calendrical characteristics of 30 full days per month (with a partial day 31) and 12 months per year. As of this writing, the current bitcoin date is 7/24/17, 24-07-0017, or the twenty fourth day of the seventh month of the seventeenth year of Bitcoin.
This definition forms the basis for a culturally independent and socially universal calendar system which is easy to calculate, durable, and financially relevant.
Cross-referencing with other calendar systems:
Since this date will not synchronize exactly to extant calendar systems, a notation needs to be used in cases where ambiguity would result. Taking the solar day as the example, references that cross over between the solar day and the bitcoin date need to have a qualifier resolving the phase discrepancy (as is done when referring to dates in ancient calendar systems that do not align with the turn of the date at midnight). For example, the Bitcoin date of 7/24/17 would be written as November 9/10, 2024, making it clear that it touches both of those solar days. However, this format should only be used for dates in which the two calendar systems are more out of sync than in sync. For dates that are more in sync than out of sync, no overlap day should be given, because it would add ambiguity where there otherwise was none.
Bitcoin Calendar Synchronization
Layer: Consensus
Status: Draft
The Bitcoin calendar (referring to the prior definition) would be more economically relevant to earthlings if the Bitcoin year actually stayed synchronized with the growing seasons of the tropical year. Currently, the Bitcoin year begins in the springtime of the northern hemisphere, but it is offset one year and there is currently nothing to keep the bitcoin year from drifting further out of synchronization with the tropical year.
To keep the Bitcoin year in sync with the seasons, the bi-weekly proof-of-work difficulty adjustment could be tailored to aim toward better alignment during every difficulty adjustment. Normally, the difficulty is adjusted upward or downward a maximum factor of 4, as defined in the file
pow.cpp
. The determination of the value within that range is made solely on the basis of the rate of block discovery during the prior 2016-block (two-week) period.The existing difficulty adjustment scheme has resulted in the Bitcoin calendar generally sliding earlier every year, presumably due to the fact that the global hash rate is generally increasing rather than decreasing. The historical dates for the year beginnings and the corresponding duration of the Bitcoin year are as follows:
|Year|Block|Date|Days| |-:|-:|--|-:| |0|0|01/03/09|| |1|52500|04/22/10|474| |2|105000|01/28/11|281| |3|157500|12/14/11|320| |4|210000|11/28/12|350| |5|262500|10/09/13|315| |6|315000|08/10/14|305| |7|367500|07/29/15|353| |8|420000|07/09/16|346| |9|472500|06/23/17|349| |10|525000|05/29/18|340| |11|577500|05/23/19|359| |12|630000|05/11/20|354| |13|682500|05/07/21|361| |14|735000|05/05/22|363| |15|787500|04/29/23|359| |16|840000|04/19/24|356|
As can be seen, the number of days in the actual Bitcoin year are consistently fewer than the number of days in the tropical year (365.2425). Assuming the hash rate will generally continue to increase, this trend should continue, which allows us to make a convenient simplifying assumption.
Conceptually this proposal seeks to add an additional, limited offset to the work requirement based on whether the Bitcoin calendar is ahead of schedule or behind schedule, in comparison to the tropical year. We can assume based on the trends, however, that we only need to "slow down" the block rate slightly to keep it in sync with the seasons. Therefore, this proposal aims to do only that.
If the Bitcoin block height is a certain amount ahead of the calendar synchronization goal (per the trend), the difficulty would be increased one notch more than required by the normal calculation, if not already at the limit of adjustment for that period. This would make it impossible for the proposed change to overpower the existing calculation, but would still provide a gentle enough push when needed to keep the calendar in sync, thus accomplishing the purpose.
Fork considerations by the author:
A consensus change to the proof of work calculation would normally result in a hard fork. However, in the case that we only potentially increase the difficulty and never decrease it relative to non-upgraded nodes in the network, this means that during the transition, only upgraded nodes would be at risk of rejecting blocks for not meeting the more stringent difficulty level necessary to synchronize the calendar.
The new nodes would therefore need to be programmed to yield to the non-upgraded difficulty criteria until most of the network has upgraded, at which point activation would occur (as explained below) and miners would be obliged to meet the tougher requirements demanded by all upgraded nodes. Nodes that still had not upgraded by that time would remain unaffected, since the post-activation blocks would only have more proof of work, and not less, than non-upgraded nodes require.
More importantly, an overwhelming majority of the hash rate should be fully upgraded to avoid a situation where non-upgraded, non-mining nodes are forked by a longer chain created by non-upgraded miners. A sufficient portion of the hash rate following the upgrade path would eliminate this possiblity, even for non-mining nodes that don't upgrade, because the longer chain will come from the greater hash power and there would be no financial incentive for miners to switch back to catering to a minority of non-upgraded nodes.
Proposed activation method:
Upgraded nodes would delay the relaying of blocks that do not meet the more stringent requirements. This would begin as a confirmation-time penalty to upgraded nodes, but as the upgrade expands to more nodes, the effect would shift to incentivizing miners to produce blocks that conform to the upgrade in order to build on the longest chain faster.
Optional second-phase activation:
For the longer term, it might be advisable to also implement the corresponding opposite influence on the proof of work adjustment for the case where the simplifying assumption taken above does not hold. In other words, if hash rate were to take on a trend of decreasing over a significant period of time at some point in the future leading to a Bitcoin year length greater than 365 days, the calendar drift would ideally be pushed in the other direction by a relaxing influence on the proof of work requirement instead of a tightening influence. Since this would definitely result in a hard fork relative to un-upgraded nodes, this feature, if implemented, would need to be kept inactive for much longer, and only activated if/when the number of non-upgraded nodes becomes so insignificant that a hard fork is no longer a concern.
Join the conversation on stacker.news.
-
@ c0e4bd0b:1c5734af
2024-11-10 12:05:10Bitcoin Calendar Definition
Layer: Applications
Status: Draft
Bitcoin defines the halving cycle as 210,000 blocks, as defined in the file
kernel/chainparams.cpp
. This number was apparently chosen as an aesthetically pleasing number which equates almost exactly to 4 years, according to the ten-minute block schedule. This BIP proposes using this parameter of Bitcoin as the basis for reckoning calendar time, defined as follows.nBlocksPerYear = 210000 / 4 // calculates to 52,500 nBlocksPerMonth = nBlocksPerYear / 12 // calculates to 4375
The calculations above produce integer results, making calendrical calculations based on block height extremely convenient. The zero-based year and month are calculated as follows, using integer division (/) and mudulo (%) based on block height h:
year = h / 52500 month = (h % 52500) / 12
Furthermore, we assume a bitcoin day length of 144 blocks. This is consistent with the target of 10-minutes per block and the 2016 blocks every two weeks for the difficulty adjustment period. This results in months of 30 days, with a small remainder:
nBlocksPerDay = 144 daysPerMonth = nBlocksPerMonth / nBlocksPerDay // calculates to 30.something
A human-friendly date can thus be displayed based upon block height, with familiar calendrical characteristics of 30 full days per month (with a partial day 31) and 12 months per year. As of this writing, the current bitcoin date is 7/24/17, 24-07-0017, or the twenty fourth day of the seventh month of the seventeenth year of Bitcoin.
This definition forms the basis for a culturally independent and socially universal calendar system which is easy to calculate, durable, and financially relevant.
Cross-referencing with other calendar systems:
Since this date will not synchronize exactly to extant calendar systems, a notation needs to be used in cases where ambiguity would result. Taking the solar day as the example, references that cross over between the solar day and the bitcoin date need to have a qualifier resolving the phase discrepancy (as is done when referring to dates in ancient calendar systems that do not align with the turn of the date at midnight). For example, the Bitcoin date of 7/24/17 would be written as November 9/10, 2024, making it clear that it touches both of those solar days. However, this format should only be used for dates in which the two calendar systems are more out of sync than in sync. For dates that are more in sync than out of sync, no overlap day should be given, because it would add ambiguity where there otherwise was none.
Bitcoin Calendar Synchronization
Layer: Consensus
Status: Draft
The Bitcoin calendar (referring to the prior definition) would be more economically relevant to earthlings if the Bitcoin year actually stayed synchronized with the growing seasons of the tropical year. Currently, the Bitcoin year begins in the springtime of the northern hemisphere, but it is offset one year and there is currently nothing to keep the bitcoin year from drifting further out of synchronization with the tropical year.
To keep the Bitcoin year in sync with the seasons, the bi-weekly proof-of-work difficulty adjustment could be tailored to aim toward better alignment during every difficulty adjustment. Normally, the difficulty is adjusted upward or downward a maximum factor of 4, as defined in the file
pow.cpp
. The determination of the value within that range is made solely on the basis of the rate of block discovery during the prior 2016-block (two-week) period.The existing difficulty adjustment scheme has resulted in the Bitcoin calendar generally sliding earlier every year, presumably due to the fact that the global hash rate is generally increasing rather than decreasing. The historical dates for the year beginnings and the corresponding duration of the Bitcoin year are as follows:
|Year|Block|Date|Days| |-:|-:|--|-:| |0|0|01/03/09|| |1|52500|04/22/10|474| |2|105000|01/28/11|281| |3|157500|12/14/11|320| |4|210000|11/28/12|350| |5|262500|10/09/13|315| |6|315000|08/10/14|305| |7|367500|07/29/15|353| |8|420000|07/09/16|346| |9|472500|06/23/17|349| |10|525000|05/29/18|340| |11|577500|05/23/19|359| |12|630000|05/11/20|354| |13|682500|05/07/21|361| |14|735000|05/05/22|363| |15|787500|04/29/23|359| |16|840000|04/19/24|356|
As can be seen, the number of days in the actual Bitcoin year are consistently fewer than the number of days in the tropical year (365.2425). Assuming the hash rate will generally continue to increase, this trend should continue, which allows us to make a convenient simplifying assumption.
Conceptually this proposal seeks to add an additional, limited offset to the work requirement based on whether the Bitcoin calendar is ahead of schedule or behind schedule, in comparison to the tropical year. We can assume based on the trends, however, that we only need to "slow down" the block rate slightly to keep it in sync with the seasons. Therefore, this proposal aims to do only that.
If the Bitcoin block height is a certain amount ahead of the calendar synchronization goal (per the trend), the difficulty would be increased one notch more than required by the normal calculation, if not already at the limit of adjustment for that period. This would make it impossible for the proposed change to overpower the existing calculation, but would still provide a gentle enough push when needed to keep the calendar in sync, thus accomplishing the purpose.
Fork considerations by the author:
A consensus change to the proof of work calculation would normally result in a hard fork. However, in the case that we only potentially increase the difficulty and never decrease it relative to non-upgraded nodes in the network, this means that during the transition, only upgraded nodes would be at risk of rejecting blocks for not meeting the more stringent difficulty level necessary to synchronize the calendar.
The new nodes would therefore need to be programmed to yield to the non-upgraded difficulty criteria until most of the network has upgraded, at which point activation would occur (as explained below) and miners would be obliged to meet the tougher requirements demanded by all upgraded nodes. Nodes that still had not upgraded by that time would remain unaffected, since the post-activation blocks would only have more proof of work, and not less, than non-upgraded nodes require.
More importantly, an overwhelming majority of the hash rate should be fully upgraded to avoid a situation where non-upgraded, non-mining nodes are forked by a longer chain created by non-upgraded miners. A sufficient portion of the hash rate following the upgrade path would eliminate this possiblity, even for non-mining nodes that don't upgrade, because the longer chain will come from the greater hash power and there would be no financial incentive for miners to switch back to catering to a minority of non-upgraded nodes.
Proposed activation method:
Upgraded nodes would delay the relaying of blocks that do not meet the more stringent requirements. This would begin as a confirmation-time penalty to upgraded nodes, but as the upgrade expands to more nodes, the effect would shift to incentivizing miners to produce blocks that conform to the upgrade in order to build on the longest chain faster.
Optional second-phase activation:
For the longer term, it might be advisable to also implement the corresponding opposite influence on the proof of work adjustment for the case where the simplifying assumption taken above does not hold. In other words, if hash rate were to take on a trend of decreasing over a significant period of time at some point in the future leading to a Bitcoin year length greater than 365 days, the calendar drift would ideally be pushed in the other direction by a relaxing influence on the proof of work requirement instead of a tightening influence. Since this would definitely result in a hard fork relative to un-upgraded nodes, this feature, if implemented, would need to be kept inactive for much longer, and only activated if/when the number of non-upgraded nodes becomes so insignificant that a hard fork is no longer a concern.
Join the conversation on stacker.news.
-
@ f462d21e:1390b6b1
2024-11-10 11:44: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
-
@ 07907690:d4e015f6
2024-11-10 09:50:14Bitcoin diciptakan oleh Satoshi Nakamoto, (hampir pasti) sebuah nama samaran, yang hingga hari ini belum ada seorang pun yang dapat secara meyakinkan menghubungkannya dengan orang atau sekelompok orang yang sebenarnya. Nakamoto menghilang dari internet pada tahun 2011, meninggalkan sedikit petunjuk tentang siapa "mereka". Selama bertahun-tahun, banyak orang secara terbuka mengaku sebagai Satoshi, semuanya gagal mendukung pernyataan tersebut dengan fakta yang tidak dapat disangkal.
Dalam forum awal bitcointalk, Satoshi mengatakan bahwa mereka mulai mengerjakan Bitcoin pada tahun 2007, dua tahun sebelum blok pertama ditambang. Blok Genesis, atau blok pertama dalam blockchain Bitcoin, ditambang pada tanggal 3 Januari 2009. Nakamoto adalah penambang blok Genesis, menerima 50 bitcoin pertama yang pernah diedarkan. Namun, hadiah dari blok pertama ini tidak dapat digunakan karena keunikan dalam cara blok Genesis diekspresikan dalam kode. BitMEX Research telah menerbitkan analisis pada hari-hari awal penambangan Bitcoin dan menyimpulkan bahwa “seseorang” menambang 700,000 koin. Meskipun banyak yang berasumsi ini adalah Satoshi, secara resmi hal ini masih belum terbukti.
Kita hanya bisa membayangkan ketenaran yang akan diterima Satoshi Nakamoto jika identitas mereka terungkap, belum lagi kekayaan besar yang ingin mereka kumpulkan (meskipun Satoshi tampaknya tidak menghabiskan satu pun koin yang seharusnya mereka tambang). Seiring berjalannya waktu, ada banyak contoh orang yang mengaku sebagai Satoshi, dan ada pula yang diyakini sebagai Satoshi.
Klaim Palsu
Salah satu kasus paling terkenal tentang seseorang yang mengaku sebagai Satoshi adalah yang dilakukan oleh Craig S. Wright, seorang akademisi Australia. Wright, pada awal tahun 2015, telah mencoba berkali-kali untuk memberikan demonstrasi publik dengan bukti yang tidak dapat disangkal bahwa dia adalah penemu Bitcoin, namun dia belum berhasil hingga saat ini. Faktanya, “bukti”-nya terbukti palsu.
Dorian Nakamoto, seorang pria di California, pernah secara terbuka diberi gelar sebagai pencipta Bitcoin oleh seorang jurnalis surat kabar yang melihat beberapa kesamaan antara kedua Nakamoto, yang paling jelas adalah nama belakang mereka. Namun, dengan sangat cepat, klaim ini ditolak oleh Dorian dan juga dibantah.
Kelompok orang lain yang menarik perhatian seputar identitas Satoshi yang tidak diketahui adalah kriptografer dan ilmuwan komputer. Hal Finney, seorang kriptografer terkenal yang merupakan orang pertama yang menerima bitcoin dari Satoshi Nakamoto, adalah salah satu tersangka paling terkenal karena keterlibatan awalnya dalam bidang tersebut. Kurang dari setahun setelah Bitcoin diciptakan, Satoshi dan Hal Finney bertukar beberapa postingan di forum diskusi Bitcoin, membahas hal-hal seperti teknologi dan implikasinya di masa depan. Finney meninggal karena ALS pada tahun 2014, menyebabkan beberapa orang berspekulasi mengenai sejauh mana keterlibatannya dengan mata uang terdesentralisasi pertama di dunia. Nick Szabo adalah kriptografer terkenal lainnya yang menciptakan Bit Gold, mata uang digital yang ditemukan beberapa tahun sebelum Bitcoin. Fakta bahwa dia tampaknya tidak terlibat langsung dengan penciptaan Bitcoin, meskipun proyeknya sangat mirip dengan itu, telah membuat beberapa orang berspekulasi bahwa dia mungkin juga pencipta Bitcoin.
Mengapa Satoshi Harus Anonim?
Satoshi Nakamoto, pencipta mata uang terdesentralisasi pertama di dunia, harus tetap anonim karena sifat penciptaannya. Setelah membuat protokol tanpa titik utama kegagalan, Nakamoto mungkin menyadari bahwa mempertahankan anonimitasnya dapat menghilangkan titik utama kegagalan terakhir yang mungkin dimiliki Bitcoin: orang yang menciptakannya. Menghapus identitas tunggal yang dapat dikaitkan dengan kemunculan Bitcoin berarti menghilangkan segala wajah yang dapat mempengaruhi politik, aturan, atau pengambilan keputusan komunitas Bitcoin.
Siapa pun Satoshi, tidak dapat disangkal bahwa mereka adalah seorang jenius di zaman kita. Protokol Bitcoin memberikan insentif ekonomi di semua tempat yang tepat sehingga menghasilkan solusi luar biasa terhadap Masalah Jenderal Bizantium. Satoshi Nakamoto menerapkan konsep-konsep dari kriptografi, matematika, teori permainan, dan ekonomi untuk menciptakan aset digital langka yang dirancang dengan indah — dan pertama di dunia — yang disebut Bitcoin.
Sumber artikel: bitcoinmagazine.com Diterjemahkan oleh: Abengkris
-
@ e1d968f7:5d90f764
2024-11-10 06:01:24If there's one thing I know for sure, it's this: life is too short not to make the most of every moment. That’s why I don’t just walk through life—I own it. My name’s Rebecca Knight, and I’m the kind of woman who leaves a lasting impression, whether it’s with a wink across a crowded room or a conversation that lingers long after it’s over.
I’m not your average woman, and I’m certainly not afraid to show it. I’ve got that magnetic charm that draws people in, a little playful sparkle in my eye that says, “Come closer, if you dare.” I love making people feel seen, heard, and most of all—alive. There’s something about making someone smile or laugh that gives me the rush of a lifetime. Maybe it’s the thrill of connection or the way people react when they realize I’m exactly the kind of woman they didn’t know they needed in their lives.
When I meet someone, I don’t just show up—I make it memorable. Whether it’s in the way I laugh at a joke, the intensity of a conversation, or the way I give you my undivided attention, there’s no denying it: I know how to keep you on your toes. And when it comes to my work, it’s no different. I know exactly how to create a space where we both feel at ease, where the chemistry can spark and the tension can build. It’s all about the connection. The energy. The way we feed off each other.
But let’s be real: I don’t just give for the sake of giving. I believe in mutual enjoyment. I’m all about making sure both of us are having the time of our lives. Whether we’re sharing an intimate laugh, a heated conversation, or simply enjoying each other’s company in a way that feels… exciting, it’s always about balancing that electric pull with respect and mutual understanding.
Being bold is fun, but being respectful is key. I don’t believe in anything forced or out of alignment with what feels good. If I want something, you’ll know it, and if you want something, I’m always happy to listen. But here’s the thing: I’m not interested in anything halfway. I play for keeps, and I expect to have my energy matched in the best possible way.
So, if we ever find ourselves in the same space, be prepared for a little bit of magic. I’m the kind of woman who brings excitement, fun, and a healthy dose of mischief into every room I enter. I know how to turn the ordinary into extraordinary, and how to leave a lasting impression without breaking a sweat.
After all, life’s a game, and I’m very good at playing it. If you ever find yourself wondering if you’re the next lucky person I’ll take on that little adventure… let’s just say I’m sure you’ll know when it happens.
-
@ a10260a2:caa23e3e
2024-11-10 04:35:34nostr:npub1nkmta4dmsa7pj25762qxa6yqxvrhzn7ug0gz5frp9g7p3jdscnhsu049fn added support for classified listings (NIP-99) about a month ago and recently announced this update that allows for creating/editing listings and blog posts via the dashboard.
In other words, listings created on the website are also able to be viewed and edited on other Nostr apps like Amethyst and Shopstr. Interoperability FTW.
I took some screenshots to give you an idea of how things work.
The home page is clean with the ability to search for profiles by name, npub, or Nostr address (NIP-05).
Clicking login allows signing in with a browser extension.
The dashboard gives an overview of the amount of notes posted (both short and long form) and products listed.
Existing blog posts (i.e. long form notes) are synced.
Same for product listings. There’s a nice interface to create new ones and preview them before publishing.
That’s all for now. As you can see, super slick stuff!
Bullish on Cypher.
So much so I had to support the project and buy a subdomain. 😎
https://bullish.cypher.space
originally posted at https://stacker.news/items/760592
-
@ 07e1bb93:f9523a3c
2024-11-10 03:46:57In the ever-shifting landscape of American politics, few partnerships have proven as effective in advancing the conservative agenda as the relationship between President Donald Trump and Senator JD Vance. The alignment of their values, priorities, and vision for America has been a game-changer, not just for the Republican Party, but for the nation as a whole. Here’s why Trump needed JD Vance — and why this partnership is one for the history books.
1. A Shared Vision for America’s Working Class
Both President Trump and JD Vance have made it clear that their top priority is restoring the strength and prosperity of America's working class. Trump’s 2016 campaign reshaped the Republican Party into one that stands unapologetically with blue-collar Americans. Vance, in his bestselling book Hillbilly Elegy, captured the struggles of America’s heartland, painting a picture of a forgotten class that Trump understood and aimed to champion.
Vance’s personal experience of growing up in a working-class family in Appalachia allows him to connect with the very people Trump promised to fight for. When Trump needed someone who could speak authentically to the struggles of rural America — a place often left behind by both parties — JD Vance was the perfect ally. His commitment to restoring dignity to working families and fighting against globalist policies that shipped jobs overseas aligns perfectly with Trump’s America First agenda.
2. Fighting the Swamp Together
One of Trump’s most significant promises was to drain the swamp — to rid Washington of the establishment elites who have sold out America’s interests in favor of their own. JD Vance’s political career has been a direct response to this very problem. As someone who understands the dangers of big-money politics and the media’s influence, Vance has shown that he’s not afraid to take on the establishment — whether it’s Big Tech, Big Pharma, or the bureaucratic deep state.
Together, Trump and Vance make an unstoppable force in the fight against Washington corruption. Vance’s no-nonsense approach to tackling the elites, combined with Trump’s bold, take-no-prisoners attitude, sends a clear message to D.C. — the days of business as usual are over.
3. A Bold, Unapologetic Conservative Voice
Trump revolutionized the Republican Party by unapologetically embracing a bold, conservative agenda — one that emphasizes securing the border, standing strong against China, and advocating for American sovereignty. JD Vance has proven to be a fierce defender of these principles. His strong stance against illegal immigration, as well as his commitment to bringing American jobs back home from China, make him an invaluable ally in Trump’s fight to put America first.
In the face of global challenges and domestic strife, Trump needed someone like JD Vance who would stand firm in the face of leftist pressure, the mainstream media, and cancel culture. Vance’s resilience and courage in sticking to conservative principles make him an indispensable ally in Trump’s quest to reclaim American greatness.
4. Rural America’s Voice in Washington
Trump’s deep connection with rural America was one of the key factors in his 2016 victory. In JD Vance, Trump found a kindred spirit who understands the heartbeat of Middle America. Vance, who has firsthand knowledge of the hardships faced by families in small-town America, brings a fresh perspective to the Senate that Trump can rely on.
From advocating for policies that support American agriculture to pushing back against the cultural elites who are trying to rewrite America’s values, Vance is a powerful voice for the people who have long been overlooked by Washington politicians. With Vance in the Senate, Trump gained a strong advocate for rural communities, ensuring that their concerns are heard at the highest levels of government.
5. Fighting the Culture Wars
In addition to economic policies, Trump and Vance share a common commitment to fighting the culture wars. Vance, with his deep understanding of the impact of media, education, and corporate culture on America’s identity, has been an outspoken critic of the left’s radical agenda. He has voiced concerns about the erosion of traditional American values and the dangers of left-wing identity politics.
Trump needed someone who could not only challenge the left’s policies but also defend the cultural heritage of America. Vance’s intellectual and cultural insights make him an essential ally in this battle. Together, they form a powerful counterweight to the woke left’s attempt to undermine the very fabric of American society.
6. A Partnership for Victory
At its core, the Trump-Vance alliance is about winning — for the American people. It’s about rebuilding a nation that works for its citizens, standing up against forces that seek to weaken it, and ensuring that America remains a beacon of freedom, opportunity, and strength on the global stage.
Trump needed JD Vance because Vance’s voice is a reflection of the heart of America. Together, they represent the future of the Republican Party — a future that is grounded in traditional values, fierce independence, and a relentless pursuit of the American Dream.
Conclusion
In JD Vance, President Trump found an ally who shares his vision, his commitment to the working class, and his passion for restoring American greatness. As this partnership continues to grow, there’s no doubt that Trump and Vance will be a dynamic duo, leading the charge against the forces of globalization, corruption, and cultural decay.
For all the talk of division in American politics, the Trump-Vance partnership reminds us that unity is possible when leaders stand firm in their beliefs, fight for what’s right, and work together for the future of our nation. It’s a partnership built on trust, shared values, and an unyielding love for America — and that’s exactly why Trump needed JD Vance.
-
@ 4cec8c79:1511abda
2024-11-09 22:15:32Navigating Job Offers in Nigeria: Opportunities and Challenges
Nigeria, the most populous country in Africa, offers a dynamic job market that spans multiple industries. With its youthful population, growing tech sector, and diverse economy, job seekers face both opportunities and challenges. This article explores the job offer landscape in Nigeria, focusing on the key sectors, the job search process, and factors that both employers and potential employees must consider.
Key Sectors Offering Job Opportunities
-
Technology and ICT: Nigeria has been called the "Silicon Valley of Africa" due to its rapidly growing tech ecosystem. Cities like Lagos and Abuja are hubs for startups and innovation, with companies focusing on fintech, e-commerce, software development, and mobile technology. Tech giants like Andela, Paystack, and Flutterwave have made Nigeria a key player in the global tech space, offering high-paying jobs for software developers, data analysts, and cybersecurity experts.
-
Oil and Gas: The oil and gas industry remains one of the largest employers in Nigeria, contributing significantly to the country's GDP. Jobs in this sector range from engineering and project management to environmental science and logistics. Multinational companies like Shell, Chevron, and Total offer numerous positions, but the industry is also highly competitive and often requires specialized skills or experience.
-
Agriculture: With a large rural population and favorable climate, agriculture remains a vital sector for Nigeria's economy. The government has launched several initiatives aimed at promoting agribusiness and food security, which has led to job growth in areas like agritech, farming, supply chain management, and food processing.
-
Banking and Finance: The banking sector in Nigeria is robust, offering opportunities for those in finance, accounting, marketing, and management. In addition to traditional banking roles, Nigeria’s thriving fintech industry offers job opportunities in digital payments, lending, and financial inclusion platforms. Major players like GTBank, First Bank, and Zenith Bank are often on the lookout for skilled professionals.
-
Education and Health: Education and healthcare are both sectors that offer steady employment, especially in underserved areas. The rise of online learning platforms and private schools has boosted demand for teachers, while the healthcare sector, especially with the COVID-19 pandemic, has underscored the need for medical professionals, public health workers, and researchers.
-
Entrepreneurship and Startups: Entrepreneurship is flourishing in Nigeria, with many young Nigerians turning to startups to solve local challenges. The rise of digital platforms and access to funding through venture capital and government grants has made it easier for entrepreneurs to grow businesses. From logistics and retail to food delivery and fintech, Nigerian startups are generating job opportunities for creative and tech-savvy individuals.
Challenges Faced by Job Seekers
-
Unemployment and Underemployment: Despite the booming sectors, Nigeria faces a high unemployment rate, especially among its youth. According to recent statistics, over 33% of the labor force is unemployed, with even more individuals underemployed, working in low-wage or part-time positions. This imbalance is one of the biggest challenges job seekers face, as they compete for a limited number of well-paying jobs.
-
Skill Mismatch: Many graduates in Nigeria find themselves in a situation where their education doesn't align with the demands of the job market. This skills mismatch is particularly evident in sectors like technology, where there's a demand for highly specialized skills in programming and data science. Upskilling
~~****~~
-
-
@ b6424601:a11e4ff4
2024-11-09 19:45:51Personal Asset Architecture - Breaking Free from the Fiat-Driven Housing Market
Subheading – How Individuals Can Opt Out of the Fiat-Driven System and Create Homes with long term value
As a self-inflicted residential architect, I am passionate about creating new, renovated homes that matter to interesting people. However, I've realized that the traditional housing market is built on a foundation of fiat currency, leading to several problems, including the potential devaluation of homes and, increasingly, the creation of empty stores of value.
The Fiat Death Spiral
Construction financing drives the most decisions in the housing market, which leads to a system where production homes are built to sell and create an initial profit rather than to provide a high-quality construction or a well-conceived living space.
The Choice: Custom vs. Fiat
When building or buying a home, you have two main options: a custom home built or renovated to your specifications or a production home pre-designed and pre-built by a builder.
Fiat-Driven Homes: The Short-Term Solution
Fiat-driven homes are built to sell quickly, often using materials that fit the deals proforma. Because of lower-quality materials and construction methods, Fiat homes depreciate more like cars than buildings.
Custom Homes: The Long-Term Solution
On the other hand, custom homes are typically built with higher quality and better design because the owner and designer are more invested in creating one-of-a-kind designs.
A New Approach: Personal Asset Architecture
As an architectural design firm owner focusing on homes, I've always known that the percentage of all homes architects design is low. I've used the low percentage as a filter for working with longer-term thinking clients, typically paying with cash. Clients who pay with cash have the flexibility to pay for what they want, allowing them to think about the total cost over the life of the house rather than just jumping through the hoops of a loan-to-value appraisal.
Bitcoin standard architectural practice and Bitcoin standard homes are the escape valves to continue the work we want for the individuals we want to work for. Our thesis is that Bitcoin can improve the housing market, both for our practice and for the clients we work with. Our thesis is that Bitcoin changed the housing market for our practice and the people we work with to build a personal architecture that is as hard an asset as Bitcoin.
Asset Architecture Benefits
Homes designed in a BTC standard have four big benefits for the individual to create personal asset architecture that holds value over time.
1. Allows owners to think in a longer time horizon – Decisions made when designing homes need to consider a longer time horizon to include the operating cost of the house in addition to the cost of construction. Production homes are built to sell and create profit based on profit produced, netting profit by the sales price vs cost. Custom homes have more flexibility in spending more on quality and life cycle improvements.
2. Allows for a density of design thought - Can you design a better-conceived home that considers how to use space more effectively to provide a denser space so the house can require less square footage? Can the smaller square footage be planned to work as a lifetime home from a starter home, through offspring to empty nesting and multigenerational housing?
3. Providing a return on investment beyond money – A home should produce a better quality of life. Can homes produce income, food, energy, resilience, conservation of resources, and interior air quality and become your favorite place to be? Can the utility of needing a place to live be your family citadel?
4. Working with the system to minimize the power of the system to increase taxes on the asset - Can we design homes to reduce property taxes with a creative design to minimize bedrooms and the taxable house value? Can we put more investment and design in outdoor space that helps owners maximize the use of properties for uses that are not taxed, like quality outdoor space or properties that produce food and energy?
The future of housing is uncertain, but one thing is evident from the trenches: the traditional fiat-driven system is not sustainable. Personal Asset Architecture offers a new approach to housing design that prioritizes long-term value, efficiency, and quality. By embracing this approach, we can create precious homes that produce a return on investment beyond money. The future of housing is in our hands, and it's time to create a new way of thinking about home design.
What is possible?
As individual owners and architects, we can build Stores of value buildings. By incorporating the goal of creating Personal Asset Architecture, we can create homes that produce a return on investment that goes beyond money and minimize the values of a banking system and the ability to increase taxes on the asset.
Stay humble, stack stakes, and when you are ready, choose to build stuff that holds actual value.**
HODL on
-
@ 2063cd79:57bd1320
2024-11-09 18:34:43Einer der großen Vorteile von Bitcoin ist, dass es relativ einfach ist Bitcoin selbst zu verwahren. Ich predige self-custody, also die Eigenverwahrung, von Bitcoin in fast jeder Ausgabe als einer der Hauptkomponenten der Formel für Freedom Money rauf und runter. Doch was genau bedeutet es seine bitcoins selbst zu verwahren? Denn schließlich verwaltet jeder mündige Bürger seine Finanzen, ob in Bitcoin oder nicht, in der Regel ja immer selbst. Es gibt einen großen Unterschied zwischen verwalten und verwahren. Denn das Verwahren übernehmen bei anderen Assets Dritte für uns, sei es die Bank, die unser Geld auf Konten, Hypotheken und Sparanlagen, manchmal sogar Wertsachen in Schließfächern, verwahrt, Finanzbroker oder Depotbanken, die Wertpapiere wie Aktien, Bonds oder ähnliches, verwahren, oder Versicherer, die Policen, Sparvermögen, usw. für uns verwahren. Immer sind Drittparteien mit der Verwahrung unseres Besitzes vertraut, oder haben sich uns aufgedrängt, weil es schlichtweg nicht anders möglich ist, diese Besitztümer völlig autark zu verwahren. Bei Bitcoin ist das anders. Bitcoin lässt sich ähnlich wie Bargeld, Gold oder Schmuck völlig autark und selbstbestimmt verwahren. Dabei gibt es, wie bei allem im Leben, sowohl einfache und bequeme, aber dadurch unsichere, als auch komplizierte und etwas aufwändigere, aber deshalb sehr sichere Verwahrungsmethoden. Eine sehr sichere Methode stellt die Verwahrung mit Hilfe von MultiSig (also Multi-Signature) dar. Dieses wollen wir uns diese Woche genauer anschauen.
Eine der großen Errungenschaften von Bitcoin ist die Möglichkeit der Eigenverwahrung, sogenanntes self-custody. Es bietet jedem//jeder Hodler//in, Anleger//in und Investor//in eine völlig autarke und selbstbestimmte, Methode zur Verwahrung und Kontrolle seines Besitzes und damit einen Schutz vor Zensur, Kontrolle und Übergriffen. Ohne zu sehr ins Detail zu gehen, möchte ich kurz grundlegend die Sicherheitsstruktur von Bitcoin darlegen. Jede//r Nutzer//in sollte zunächst über eine Wallet verfügen. Eine Wallet ist kein Muss, um mit Bitcoin in Kontakt zu treten, jedoch versucht ja auch niemand das Internet ohne Browser zu verwenden. Eine Wallet ist, ähnlich wie der Internetbrowser, eine Software, die es dem Nutzenden ermöglicht Bitcoin zu erhalten, zu versenden oder zu verwahren (ohne Bitcoin direkt zu erhalten, zu versenden oder zu verwahren - kompliziert, ich weiß). Dabei gibt es ein weites Spektrum an verschiedenen Diensten. Es gibt Wallets, Börsen oder andere Verwahrungs-Services. Um das Thema MultiSig zu besprechen, fokussieren wir uns auf Wallets.
Im Grunde besitzt jede//r Halter//in von Bitcoin ein Schlüsselpaar - einen privaten Schlüssel (Private Key) und einen öffentlichen Schlüssel (PubKey). Vergleicht man das Konzept mit dem alten Finanzsystem würde man sagen, der öffentliche Schlüssel stellt die Kontonummer dar, also die Information, die öffentlich geteilt werden kann und der private Schlüssel stellt die PIN Nummer dar, also die Information, die nur die//der Besitzer//in haben sollte. Der private Schlüssel ist also die Information, die es zu schützen gilt, denn in Kombination erlauben mir die beiden Schlüssel Zugriff auf die sich dahinter befindenden bitcoins. Ein bitcoin lässt sich nicht aus der Blockchain extrahieren. Die einzelnen Coins existieren nur innerhalb der Chain (und nicht als ganze "Coins", sondern als Outputs/UTXOs). Lediglich der Besitzanspruch wird außerhalb gehandhabt. Das bedeutet, dass ich mit meinen beiden Schlüsseln den Zugriff oder Anspruch auf eine gewisse Anzahl bitcoins ausweisen kann. Habe ich Zugriff auf den privaten Schlüssel, kann ich also ohne weiteres komplett über alle damit verbundenen bitcoins verfügen, sie ausgeben, sie weiterversenden (oder akkurater formuliert: eine Nachricht signieren, die dem Empfänger die Kontrolle über diese bitcoins gewährt), oder sie sogar zerstören. Wallets übernehmen die Speicherung der Schlüssel, sowohl der öffentlichen, als auch der privaten, in einem für den Anwender benutzerfreundlichen Interface.
Sogenannte Hot Wallets, sind Apps, die mit dem Internet verbunden sind, und dadurch "hot" oder "live" sind, das heißt sie können im schlimmsten Fall gehackt werden. Cold Wallets sind offline Lösungen, die sich nicht online hacken lassen, aber z.B. im Falle eines Paper Wallets leicht verlieren, stehlen, oder zerstören lassen. Das Problem, wie oben erwähnt, ist je bequemer und nutzerfreundlich die Handhabung der Wallet, desto unsicherer ist sie in der Regel auch. Also jegliche Software Wallets, egal ob mobil oder auf dem Rechner daheim, stellen Sicherheitsrisiken dar, da sie wieder einen Drittanbieter in die Gleichung schleusen. Um volle Autarkie zu erlangen muss man sich von Drittanbietern, wie Wallet Anbietern, Börsen oder sonstigen Services, komplett lösen und die Schlüssel und damit seine bitcoins selbst verwahren. Denn die eiserne Regel gilt immer: Not your keys not your coins!
Wenn man einen Betrag von seiner Wallet senden möchte, wird eine Transaktion erstellt und signiert. Indem die Transaktion signiert wird, beglaubigt man in digitaler Form, dass man der Eigentümer des Betrages ist, dass man die Schlüssel besitzt, um es zu verwalten, und man die Transaktion genehmigt. Es wird also der Besitzanspruch signalisiert und weitergegeben, und kein bitcoin physisch bewegt. In einer Single-Signature Wallet benötigt man nur eine Signatur, um eine Transaktion zu signieren. Bei MultiSig (Multi-Signature) erfordert die Wallet mehrere Signaturen, um eine Transaktion zu signieren. Eine MultiSig-Wallet wird dabei von zwei oder mehreren Benutzern geteilt. Wird also eine Transaktion erstellt, muss die Anfrage zunächst von allen Teilnehmern bestätigt werden. MultiSig ist ein Aufbewahrungsmodell, bei dem eine Wallet mit mehreren Schlüsseln in einem m-von-n-Schema erstellt werden. Also beispielsweise eine 2-von-3-Wallet basierend auf drei Schlüsseln, von denen zwei zum Bestätigen einer Transaktion erforderlich sind. Es gibt auch andere Modelle wie 3-von-3, oder 3-von-5, etc. allerdings stellt 2-von-3 die gängigste Methode dar. Das Schöne an diesem Modell ist, dass es Single Points of Failure (SPOF) eliminiert. Das bedeutet, dass selbst sonst kritische Informationen, wie Seed-Phrase-Backups oder Hardware-Wallets, sogar von Angreifern gestohlen, oder durch einen Unfall verloren oder zerstört, werden können, ohne dass die Wallet kompromittiert wird. Es ist hilfreich, sich die MultiSig-Wallet als einen digitalen Safe vorzustellen. Man besitzt dabei verschiedene Schlüssel zu diesem Safe. Im Beispiel von der 2-von-3-Wallet hat der Tresor zwei Schlüssellöcher und drei Schlüssel. Zwei beliebige der drei Schlüssel können verwendet werden, um den Safe zu entriegeln, damit die darin gespeicherten bitcoins bewegt werden können.
https://x.com/cryptograffiti/status/1544763238721601537
Das bedeutet jedoch nicht, dass man mit einer MultiSig-Wallet unvorsichtiger umgehen sollte, denn trotz der Flexibilität, die MultiSig bietet, sollte man ein Seed-Phrase-Backup erstellen und vermeiden, Hardware-Wallets oder Seed-Phrasen gemeinsam aufzubewahren. Fast alle Anbieter von guten, sicheren und seriösen Wallet Software, sowie Hersteller von Hardware-Wallets bieten an MultiSig-Wallets innerhalb ihrer Apps anzulegen. Der Prozess ist ein wenig aufwändiger, als das Anlegen einfacher Single-Signature-Wallets, die Vorteile überwiegen den Aufwand aber deutlich. Ein MultiSig-Wallet schützt in der Regel, und wenn ordentlich gehandhabt, vor Phishing, Malware, Verlust der Schlüssel, Verlust von Hardware, wie Telefon, Laptop oder Hardware-Wallet, aber auch vor Diebstahl und Unfällen.
MultiSig-Wallets dienen nicht nur der Sicherheit, sondern können darüber hinaus auch weitere Nutzen haben. MultiSig kann auch als Zwei-Faktor-Authentifizierung für Bitcoin Transaktionen verstanden werden. Die vielfachen privaten Schlüssel können auf verschiedenen Geräten gespeichert und auf die im MultiSig-Wallet gespeicherten Coins nur zugegriffen werden, wenn alle Schlüssel vorhanden sind. bereitgestellt werden. Auch gibt es Szenarien, in denen ein MultiSig-Wallet als treuhänderischer Dienst funktionieren könnte. Zwei Parteien vereinbaren eine Zahlung für eine Dienstleistung oder einen Warenaustausch und setzen einen Treuhänder ein, der einen der Schlüssel erhält. Erst im Falle der erbrachten Leistung, übergibt dieser Treuhänder den Schlüssel und die Geldmittel können übertragen werden. Aber auch zukünftige Gesellschaftsformen könnten von einem solchen Modell profitieren. Gerade die aktuell diskutierte Gesellschaft mbH mit gebundenem Vermögen würde das gebundene Vermögen sichern können, indem jedes Vorstandsmitglied Zugriff auf einen privaten Schlüssel von vielen erhält. Kein einzelnes Vorstandsmitglied darf die Geldmittel missbräuchlich oder entgegen der Satzung verwenden. Somit könnten nur die von den Vorstandsmitgliedern mehrheitlich vereinbarten Entscheidungen ausgeführt und finanziert werden.
MultiSig erhöht die Sicherheit von selbst verwahrtem Vermögen um ein vielfaches. Doch auch über den eigenen Sicherheitsaspekt hinaus, hat MultiSig die Möglichkeit das Thema digitaler Zahlungen in weiteren Bereichen interessant zu machen - Beispiele wie Escrow oder das Finanzplanning bei Gesellschaftsformen mit Vermögensbindung ergeben sich vielfach. Doch darüber hinaus, ist self-custody einer der wichtigsten Bausteine auf dem Weg zu einem Bitcoin Standard. Es soll nicht bedeuten, dass man sich mit seinem Eigentum verstecken und vergraben und der Gesellschaft nichts zurück geben soll, denn auch eigenständig verwahrte Bitcoins müssen zumindest steuerlich berücksichtigt werden. Jedoch bedeutet es, dass mir niemand meine bitcoins entreißen kann. Es gibt keine Bank, die mein Konto einfrieren oder pfänden könnte. Man kann auf seine bitcoins problemlos überall zugreifen, solange die Blockchain läuft, egal wo man sich auf der Welt befindet und egal zu welcher Tages- und Uhrzeit. Die Idee, dass Regierungen den Bankensektor, den sie regulieren, zwingen können Finanzdienstleistungen als Waffen einzusetzen sollte spätestens seit dem Freedom Convoy in Kanada keine Dystopie mehr sein. Es besteht kein Zweifel, dass die zunehmende Übergriffigkeit der Staaten, wie zuletzt in Kanada, eines der einzigartigen Wertversprechen von Bitcoin hervorgehoben hat: Jeder kann über seinen Besitz frei verfügen und Menschen können sich vor finanziellem "Cancelling" schützen. Es gibt Bitcoin eine weitere Bedeutung in seinem Narrativ als monetäre Revolution.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ 35f3a26c:92ddf231
2024-11-09 17:13:38The FUD injection
Many cyber security advisors and CEOs of companies that offer security products will tell you that the battle is lost, that, for example, if you don't buy an air gap device your private keys are not secure.... That, if you used your computer instead to write the seed words in a piece of paper and then put them in a piece of metal, you will be hacked and most probably you are doomed....
IMO and experience, it is an exaggeration...
If all the fear mongering being pedaled by the cyber security enthusiasts and experts was true, oh well, with very few exceptions, we all will be drained of our funds in banks (most neither have a decent 2FA - still working with SMS for crying out-loud...), self custody wallets, etc... Even the Bitcoin blockchain encryption will be broken by "quantum computers"... oh and AI will be used by hackers to hack you as well... Just ignore the noise...
The unpopular opinion
IMO, basic IT hygiene is enough to keep the malware, viruses and therefore, the cyber criminals away.
And the tools they tell you that are not enough and therefore, you are powerless, actually are quite helpful, keep using them, firewalls, VPNs, TOR, Linux Whirpool, etc.
Sugestions
Do your homework, acquiring cyber security skills needs reading, get on it, few tips:
- Learn how to verify a software security key or SHA256 before running it in your laptop or mobile if an apk. If on Microsoft, if the software you want to install does not have a .msi version (already signed by Microsoft), the .exe extension file needs to be verified, learn how, this is paramount, no matter the application, same with Linux. If the app does not offer it, do not install it, contact the developer and demand it, if no dice, forget it, look for an alternative.
- Use a VPN on your home router, yes, even if you acquire cyber security knowledge and apply it to your mobile and laptop, if you do not live alone, every other member of your family is a weak link that can affect you. Acquire a router that supports a VPN that does not require to know your identity to pay for the service and accepts Bitcoin as payment (otherwise do not use it, no matter how good you think it is, if free avoid, you are the product and therefore, you are better without one that with one free). As an additional measure, keep your laptop, PC and mobile with another VPN, a different service, you will be with a double VPN while at home and with one while in the road. In the past the throughput will be considerably reduced to a point of being too slow, nowadays, you will be fine.
- Use a router with a decent firewall and advertising guard like features, Adguard or Pi-Hole (learn to configure and to add community supported lists) , that will keep your home browsing experience safer and faster.
- If you do banking and Bitcoin with your mobile phone, consider having two mobiles, one left at home secured. Carry with you a mobile for your social needs and small payments in fiat or Bitcoin, if you loose your phone or you get robed, you will sleep better....
- If you insist on using debit cards instead of credit cards, keep the account with the debit card limited to your needs when you go out. A bit of a pain but do not use your savings account, if you lose the wallet you are screwed and there is no recurse with a debit card.... (or use credit cards and you have the option to recover the funds in case is needed)
- If you have stacked a considerable amount in Bitcoin and want to be sufficiently safe, consider an air gap seed signer, if you do not trust yourself, consider a service with no KYC, contrary to what many believe, there are some, recently I learn that CASA is one of them, probably there are others, do your homework. You keep one or two private keys and the company keeps another one, to remove the funds you need 2 of 3 and it has built in time locks you can set up.
- Avoid Microsoft and Google and Apple clouds, those are honey pots often targeted, if they get hacked the companies most probably will neither inform the clients or if they do it would be much after the incident, use other private services highly encrypted end to end, preferably FOSS, and do not upload your data unencrypted, yes, encrypt it before uploading if it is valuable information, it is a backup of data and you want it safe, if it is not in your hands, best to encrypt it, even if the company claim it is E2E encrypted, you can't be sure....
Summary
Each person is different, you need to sleep good at night knowing your cyber security is sufficient and therefore your data and funds are safe. Do the homework, read, study, acquire the skills and tools and use them properly, cyber security is not convenient, but in the age of information, it is a must to protect your family and your wealth.
If you like my work and would like to support me:
-
@ 35f3a26c:92ddf231
2024-11-09 17:12:45This is my top 3 list of whom, IMO, are today's most dangerous influential actors in the #Bitcoin arena, the list is based on previous actions and capacity to harm the ecosystem due to their resources and influence in the space:
Number 1 : Elon Musk
Reasoning: Supporting a meme coin and trolling the ecosystem. Trying to create the american wechat and portraying himself as a protector of freedom of speech. Admired and loved by millions...
Potential impact: High, he may support a shitcoin as solana or worst, create his own with the support of deep pockets and the government. Considering that we are still early and millions around the world still see #Bitcoin as a risk asset or worst, creating one in X will have immediate use case and challenge p2p cash use case from the get go, where Meta failed X may succeed...
Number 2: Jack Dorsey
Reasoning: Known for his history as Twitter CEO during the crusade against freedom of speech, cancelation of critical thinkers and even a president of USA, the behavior of Twitter was reprehensible while Jack was the CEO, I never thought that a company could behave that way and survive and yet... Unreal and zero legal accountability, twitter basically gaslighted a large amount of the population, supported political propaganda to one party with no neutrality, supported an experimental drug that is still harming people and didnt let experts and doctors to debate and discuss and not one of those thugs blocking accounts and censoring critical thinkers was made accountable, eye opening in many ways for those that at that moment still believed that USA respected freedom of speech... Recently supported a mining pool that censors whirlpool from Samourai wallet, old habits die hard I guess... And the cherry of the pie, now funding FiatJaf whom was looking for funding to spam Ethereum and Monero networks to make them unusable so more funds will move to Bitcoin and LN... This project and idea from the getgo is a no no, you may not like another project but to spam it intentionally should be illegal, and it is being done, shamelessly...
Potential impact: Very high, already inside the community, a record of bad actions, pro censorship, vast resources, head of Cash App, admired by most in the community and hence able to missguide the community into a path that could eventually make Bitcoin a failure of a project in the future with the proposal of a hard fork introducing additional censorship and less privacy in one way or another.
Number 3: Blackrock
Reasoning: No need to explain much, they join the train and... it is only logical , after so much hate and media propaganda against Bitcoin, that they did so to fight the fight from inside trying to affect it and transform it into something else , just speculation, time will say. Check my article on ETFs
Potential Impact: Super Nova. As I explain in my article of ETFs, they have the resources to attempt to change the direction of Bitcoin development for it to become something else, even kill it as a store of value. They have a large stake in some of the largest mining farms as well... Do the math, it looks like a hostile take over and that may not end well. Again, just my opinion, but, if history and patterns teach us leasons, not a good look... Activist Critical Thinkers in the space are needed, #Bitcoin for many years has been a space with many of them, the list was long, but little by little I observe a change, produced by time+age+money, those libertarians are now; most of them; retired millionaires, or enterpreuners absorbed by the fiat system and therefore have changed their tune. I thought we will have a new generation, motivated, smarter, ready to take over, but all I see, with few exceptions in the NOSTR side of the equation, is more corporate fiat system acolytes.
Stay humble says someone, never more important... What are your thoughts? Share your top 3 current most dangerous threats to the Bitcoin ecosystem...
-
@ 35f3a26c:92ddf231
2024-11-09 17:11:54What is multiculturalism?
Multiculturalism is a concept that promotes the acceptance, appreciation, and celebration of diverse cultures within a society. It involves recognizing and valuing the differences between various cultural groups while fostering social cohesion and equality.
The key principles of multiculturalism include:
- Cultural pluralism: Acknowledging and accepting the existence of multiple cultural identities and practices within a society.
- Equality: Ensuring equal opportunities and rights for all individuals, regardless of their cultural background or identity.
- Inclusion: Encouraging participation and engagement of diverse cultural groups in social, political, and economic processes.
- Respect: Promoting mutual respect and understanding between different cultural groups, while recognizing the legitimacy of differing beliefs, values, and practices.
Two questions come to mind:
1. Is it working?
IMO, most definitely not. The world is very divided by race, religion and ideologies, it is a very difficult task. Countries trying this the most (practically enforcing it by law) have encountered more division and segregation; people of the same race, country or ideology will create their own small city sectors, cultural sectors, commercial sectors (China town, little Italy, etc); as is happening in USA for a long time already, happening as well in Spain, France, Germany, etc. 2. Is it being encouraged with tolerance toward those opposing it? I personally don't think so, the irony... But that is just my opinion...
What do you thing?
originally posted at https://stacker.news/items/651181
-
@ 35f3a26c:92ddf231
2024-11-09 17:10:57"Files" by Google new feature
"Files" by Google added a "feature"... "Smart Search", you can toggle it to OFF and it is highly recommended to do so.
Toggle the Smart Search to OFF, otherwise, google will search and index every picture, video and document in your device, no exceptions, anything you have ever photographed and you forgot, any document you have downloaded or article, etc...
How this could affect you?
Google is actively combating child abuse and therefore it has built in its "AI" a very aggressive algorithm searching of material that "IT THINKS" is related, therefore the following content could be flagged:
- [ ] Pictures of you and your children in the beach
- [ ] Pictures or videos which are innocent in nature but the "AI" "thinks" are not
- [ ] Articles you may have save for research to write your next essay that have links to flagged information or sites
The results:
- [ ] Your google account will be canceled
- [ ] You will be flagged as a criminal across the digital world
You think this is non sense? Think again: https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
How to switch it off:
- Open files by Google
- Tap on Menu -> Settings
- Turn OFF Smart Search
But you can do more for your privacy and the security of your family
- Stop using google apps, if possible get rid off of Google OS and use Graphene OS
- Go to Settings -> Apps
- Search for Files by Google
- Unistall the app, if you can't disable it
- Keep doing that with most Google apps that are not a must if you have not switched already to GrapheneOS
Remember, Google keeps advocating for privacy, but as many others have pointed out repeatedly, they are the first ones lobbying for the removal of your privacy by regulation and draconian laws, their hypocrisy knows no limits
Recommendation:
I would assume you have installed F-Droid in your android, or Obtainium if you are more advanced, if so, consider "Simple File Manager Pro" by Tibor Kaputa, this dev has a suite of apps that are basic needs and the best feature in my opinion is that not one of his apps connect to the internet, contacts, gallery, files, phone, etc.
Note As most people, we all love the convenience of technology, it makes our lives easier, however, our safety and our family safety should go first, between technology being miss-used and abused by corporations and cyber-criminals data mining and checking for easy targets to attack for profit, we need to keep our guard up. Learning is key, resist the use of new tech if you do not understand the privacy trade offs, no matter how appealing and convenient it looks like. .
Please leave your comments with your favorite FOSS Files app!
-
@ b34f99f1:006b0fcc
2024-11-09 17:03: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
-
@ b34f99f1:006b0fcc
2024-11-09 17:03:02deleted
-
@ b34f99f1:006b0fcc
2024-11-09 17:02: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
-
@ bcea2b98:7ccef3c9
2024-11-09 17:01:32Weekends are the perfect time to unwind, explore, or spend time doing what we love. How would you spend your ideal weekend? Would it be all about relaxation, or would you be out and about?
For me, an ideal weekend would start with a slow Saturday morning, a good book and coffee. Then I would spend the afternoon exploring local trails and looking for snacks. Then always a slow Sunday night hopefully.
originally posted at https://stacker.news/items/760492
-
@ 35f3a26c:92ddf231
2024-11-09 16:49:24What We Know So Far About Silent Payments?
A Step Towards Enhanced Transaction Privacy in Bitcoin.
Bitcoin Silent Payments, also known as BIP352[^1], is a proposed improvement to Bitcoin’s payment system that has been gaining traction for its potential to bolster transaction privacy in Layer 1.
In simple terms, Silent Payments enables users to:
-
Generate a single, reusable static address for receiving payments, as a business this is a game changer since it make it possible to proceed with the proper financial operational security (OpSec).
-
Send and receive bitcoins without disclosing transaction details to third parties, such as the person or business you pay to, cybercriminals and chain analysis companies that sell that data to anyone willing to pay for it, that will include cybercriminals or simply; if you are a business; your competitors… When you use Silent Payments, only the sender and the receiver can connect it checking the on chain activity.
-
Without Silent Payments, if you are a non profit organization, public fund raiser, independent journalist, or business you needed support to setup a proper infrastructure to handle the donations or payments in a private manner. With Silent Payments, you post in your web site a single address in text format or as a QR code to receive donations or payments for goods, that simple.
Can I Use Silent Payments Already?
Yes, but it is currently only available through select wallets that have implemented the feature. Users must have compatible wallets and ensure that both parties involved in the transaction have Silent Payments enabled. Currently, leading wallets like Blue Wallet, and others like Cake Wallet and BitBox has adopted the feature. It's essential to verify compatibility before making transactions.
Current wallets known to support it as of writing this article:
- BlueWallet -- Only for sending
- Cake Wallet -- Send, receive, Privacy Preserving Scanning
- Silentium -- Proof of concept, good for testing
- BitBox -- Only for sending
Summarizing:
https://image.nostr.build/db35c2a028e9f740181daabe2deef4e707653fa2d82f1602086e0ac4b5ee84fd.png
PROS:
- Enhanced Privacy
- Increased Security
- Improved User Experience
- Cheap and seamless implementation for non profit organization, fund raisers and businesses alike.
CONS:
- None
Final Thoughts
https://image.nostr.build/bcb236cbcb535cb6d6fe1b2b4c79074955d1a1cb1114a6c02cc456e8d852d594.jpg
As Bitcoin continues to evolve, Silent Payments will play a significant role in enhancing transaction privacy and security. The potential benefits are undeniable and substantial.
In the near future, we can expect wider adoption and implementation of Silent Payments as more wallets and exchanges embrace this groundbreaking feature. Looking forward to see Phoenix, Sparrow, Ashigaru[^2] and Electrum adoption.
I will suggest all of us start contacting in all social networks the wallets we us and encourage them to implement Silent Payments
Here the contact info for some of them:
- Phoenix: https://twitter.com/PhoenixWallet
- Ashigaru: contact@ashigaru.rs (if you want a response, send your email signed with PGP)
- Sparrow Wallet: https://twitter.com/SparrowWallet, https://t.me/SparrowWallet
- Electrum: https://twitter.com/ElectrumWallet
[^1]: Here the link to the BIP352: https://bips.dev/352/ [^2]: Ashigaru is a fork of Samurai Wallet performed by anonymous developers (IMO, all Bitcoin related development should be anonymous, to protect the project from nefarious players, unfortunately, most developers in the arena choose to be “public” figures, hence, becoming a target of current and potential Bitcoin enemies and a weak link for the ecosystem) Ashigaru in Japanese means “light feet” (translated as foot soldiers or peasants)
-
-
@ 35f3a26c:92ddf231
2024-11-09 16:47:53What is Peer Thinking?
The cognitive and emotional processes that occur when individuals are influenced by their peers.
The psychology behind it:
The psychology behind peer influence encompasses various factors, including: 1. Social belonging and acceptance, 2. Identity formation, 3. The dynamics of group behavior
Is it being used to control us?
https://image.nostr.build/cf90335bbf59e3395dc4324d123cd3a058ca716cf6172f079eb1d78547008147.jpg
IMO, yes, at the core of it is the basic human need for belonging. Social belonging is a critical component since it is craved by most, specially but not only by the youngest, those with power across the world know this very well, therefore, thinking that they will not use it to control the population in order to profit from it or change public opinion would be irrational.
The media is used to brain wash the population creating something that most will consider "the norm", thus, the majority will try to conform to that norm in order to belong. That include manipulating the population to take an experimental drug (even if it could be very dangerous due to its unknown effects) or to accept as a norm a behavior that few years back would have been considered inappropriate.
Cognitive Dissonance
https://image.nostr.build/60f24a810be1dd6badb36d70c5a691d4361207590dea1a8e64e09a75a252cfbf.jpg
This is a term that we should get familiar with. It is a psychological state where conflicting beliefs or behaviors create discomfort.
Example: A kid in high school that has a good loving family but all his close friends are on drugs (legal ones) and they keep telling him he is an idiot for not using as well. Now his is that state of conflict believes, on one side his best friends, all tell him is okay, on the other hand his family that loves him has explained him at length the dangers and issues that the drugs will have in his life. To resolve the dissonance he has three options, one, join the group and start taking drugs with the rest, two try to rationalize it, considering to take drugs just occasionally to belong but not to make it a habit, three lose his friends (and here it comes again the peer thinking to bite). Extrapolate to many other cases.
As an anecdote Recently, on a friend's reunion, one of the guest was complaining about one of his daughters, she was quite confused asking him why so many of her classmates were bisexual, she was wondering if something was wrong with her since she was not; a 13 year old girl; the father was having a hard time explaining her that the majority are saying so just to feel as part of what the school was teaching to be the norm, it was not cool to be straight, the tally was 37% of the class. Consider that, statistically, the number of people, “worldwide” identifying as bisexual are between 3% and 5% (less than 1% in less accepting countries), that number used to be less than 2% less than a decade ago. But 37% is far from the statistical norm, indicating a peer thinking behavior but not the reality of their sexual preferences. Once again, extrapolate to any ideology, religion, gender identity, political agenda that a country desires to push forward for whatever reason, adding that to the official school program and to federal mandatory training programs would do the trick.
A powerful tool, that can be used for good or bad.
What are the strategies to counter negative peer thinking?
https://image.nostr.build/4b70949b8af76ed53a5be5507f41f1d1c960dc3592f199eab78e2d25688975c5.jpg
Reading the literature about the subject, few strategies are recommended:
-
Self-Awareness: teaching ourselves and our children to recognize when we are being influenced by peers
-
Being selective with your friends: peers with similar values will reinforce positive behaviors
-
Learning to be assertive: teaching ourselves and our children to communicate assertively our boundaries will empower us and them to resist unwanted pressure to adopt negative behaviors.
-
Less judging more talking: this applies to our children and partners, judging less and listening more will make our beloved ones more open to discuss social pressures.
What do you think? What strategies you use as counter measures?
-
-
@ b34f99f1:006b0fcc
2024-11-09 16:35:11eyJfaWQiOiI0NzgyYTkzNC02ZTUzLTRlYTctOWUwOC04YTAwZjJmNGQ4NTAiLCJwdWJsaWNLZXkiOiJiMzRmOTlmMTEwYmI2NWZmNGI1NTI3ZjhmYjFkMDE1OTUxYTMwMzgzNzBmZDk1YWRjMzRkODFkOTAwNmIwZmNjIiwidXNlcm5hbWUiOiJsaWFtIiwiYWRUeXBlIjoiT05MSU5FX1NFTEwiLCJjb3VudHJ5IjoiVW5pdGVkIFN0YXRlcyBvZiBBbWVyaWNhIiwiY291bnRyeUNvZGUiOiJVUyIsImN1cnJlbmN5Q29kZSI6IlVTRCIsInBheW1lbnRNZXRob2RDb2RlIjoiQ1JZUFRPQ1VSUkVOQ1kiLCJwcmljZUlucHV0VHlwZSI6IkZJWEVEIiwibWFyZ2luIjowLCJmaXhlZFByaWNlIjoxOTAsIm1pbkFtb3VudCI6MjAwLCJtYXhBbW91bnQiOjAsImxpbWl0VG9GaWF0QW1vdW50cyI6IiIsInBheW1lbnRNZXRob2REZXRhaWwiOiJsdGMgfCBidGMiLCJtc2ciOiIiLCJhY2NvdW50SW5mbyI6IiIsImZvclRydXN0ZWQiOiJubyIsInZlcmlmaWVkRW1haWxSZXF1aXJlZCI6Im5vIiwicmVxdWlyZUZlZWRiYWNrU2NvcmUiOjAsImZpcnN0VGltZUxpbWl0QXNzZXQiOjAsImhpZGRlbiI6ZmFsc2UsImJhbm5lZCI6ZmFsc2UsInZlcmlmaWVkIjp0cnVlLCJhZGRlZCI6IjIwMjQtMTEtMDhUMTQ6NDA6MjYuODk0WiJ9
-
@ 3cc937b7:5592217b
2024-11-09 16:33:15„Hinter der nächsten Ecke kann eine neue Straße auf uns warten oder ein geheimes Portal.“ - J. R. R. Tolkien
„Sprechend und handelnd schalten wir uns in die Welt der Menschen ein, die existierte, bevor wir in sie geboren wurden, und diese Einschaltung ist wie eine zweite Geburt (…)“ - Hannah Arendt, Vita activa
Prolog: Dieser Text ist der Beginn einer neuen Rubrik in diesem Blog und damit eine Zäsur. Wir alle wissen es, spätestens seit Nietzsche: Wenn du in den Abgrund blickst, blickt der Abgrund irgendwann zurück. Eine kluge Frau sagte mir einmal: „Where focus goes, energy flows.“ So wichtig es auch sein mag, sich mit der Gegenwart zu beschäftigen, sie zu analysieren und zu verstehen: Energetisch ist es eine ziemliche Verschwendung. Man kippt Lebensenergie in eine Kloake. Wenn Sie meine Arbeit in den letzten Jahren verfolgt haben, schockiert sie auf dieser Welt vermutlich wenig. Die Herausforderung ist jedoch das wie. Wie soll es weitergehen? Das Dunkle bekämpft man nicht durch die Beschreibung der Dunkelheit, sondern indem man einen Kontrapunkt setzt. Nur weil man weiß, dass es dunkel ist, wird es deshalb noch lange nicht heller. Dagegen durchbricht schon die kleinste Lichtquelle, die schwächste flackernde Funzel, die Dunkelheit. Mit der neuen Rubrik „Lichtblicke“ eröffne ich hiermit ein neues Kapitel meines publizistischen Schaffens: Der Blick soll hier auf das Neue, auf das Erhellende, Ermutigende, Aufbauende und oft Unbekannte gehen, in allen Bereichen, egal ob persönliche Entwicklung, Gesundheit, Ernährung, Technologie, Wissenschaft & Spiritualität. Auf die Werkzeuge und Optionen eben, die uns Hoffnung machen, die den Geist erweitern und alte Gewissheiten überwinden. Werkzeuge, mit denen wir Gestalter der Zukunft werden und nicht bloße Konsumenten der Gegenwart bleiben. Wenn Institutionen wackeln, sicher geglaubte Muster brüchig werden und Prinzipien auf den Kopf gestellt werden, entsteht ein Vakuum. Der kommunistische Theoretiker Antonio Gramsci nannte das “die Zeit der Monster”. Das Alte ist noch nicht gestorben, das Neue noch nicht geboren. Geburtshelfer des Neuen werden wir aber nur, wenn wir der Gegenwart „gewachsen“ sind; wenn wir uns mit den Werkzeugen beschäftigen, die in Richtung des Neuen wachsen. Sind Sie bereit zu wachsen? Dann lade ich Sie hiermit auf eine gemeinsame Reise ein. Wenn Sie Ideen und Anregungen für Themen, Phänomene, Werkzeuge etc. haben, die in diese Richtung gehen, oder mir Ihre Meinung zur neuen Rubrik mitteilen wollen, schreiben Sie mir gerne. Auch für mich ist es eine Reise des Lernens und Wachsens: kontakt@idw-europe.org
Paris, im Jahre 1894. Ein junger tschechischer Künstler schaut kurz vor Weihnachten “zufällig” in einer Druckerei vorbei, was sein Leben verändern sollte. Er war wie viele aufstrebende Künstler nach Paris gekommen, um den Durchbruch zu schaffen. Das Stipendium seines Gönners in der Heimat neigte sich dem Ende zu. Richtig Fuß gefasst hat er nicht, die Zukunft ist ungewiss. Er hat Talent, aber das haben viele, und leben doch von Milchkaffee und Liebe, wie Charles Aznavour es in “La Bohème” besang.
Doch der junge Mann hat auch Ideen, die in ihm schlummern und nur darauf warten, entdeckt zu werden. Er erfährt, dass die bekannte Schauspielerin Sarah Bernhardt unbedingt und dringend Theaterplakate braucht. Der junge Mann erkennt seine Chance, bietet sich an und liefert prompt. Zwei Wochen später ist Paris mit seinen Plakaten zugepflastert. Für Alfons Mucha, so der Name des jungen Mannes, ist es der Durchbruch als Künstler. Es ist zugleich die Geburtsstunde des Art Nouveau, einer neuen Kunstrichtung und gleichzeitig ein Epochenbruch der dekorativen Kunst. Mucha wird zum gefragtesten Maler der Welt, Firmen reissen sich um seine Motive, er führt Werbung und Kunst auf eine ganz neue Ebene, er reist nach Amerika und illustriert sogar in seiner Heimat die Briefmarken und Geldscheine.
Der ewige Kampf von Chronos und Kairos
Was bewirkte die glückliche Fügung für Alfons Mucha? Welche Kräfte waren hier am Werk? Und gibt es Möglichkeiten, diese schicksalhaften Begegnungen in ihrer Frequenz und Häufigkeit zu beeinflussen? Warum hatte ein Nikola Tesla nicht nur ein, zwei gute Ideen, die schon allein lebensfüllend gewesen wären, sondern Hunderte? Warum haben manche Menschen eine schicksalhafte Begegnung nach der nächsten, während bei den anderen das Leben in den gewohnten Bahnen vor sich hin plätschert? Bei den Griechen gab es zwei Zeitebenen und auch zwei Götter der Zeit. Der erste Gott ist Chronos (bei den Römern: Saturn), er symbolisiert die Zeit, die gemessen wird und unerbittlich verrinnt. Mit und Dank Chronos entsteht Ordnung und Kontinuität, aber auch Wiederholung des immer Gleichen. Er ist symbolisiert durch den Großvater mit Rauschebart und Sanduhr, er steht für die objektive Zeit, die immer und für alle gleich ist, die in Sekunden, Minuten und Stunden gemessen wird. Der zweite Gott ist Kairos, der Sohn des Zeus und rebellische Enkel des Chronos. Kairos ist schon äußerlich ein „Punk“, auf Abbildungen trägt er einen Teilrasur-Schnitt mit auffälliger Locke. Genau an dieser Locke gilt es ihn zu packen. Kairos steht für die subjektive Zeit, die Zeit, welche Chancen und Durchbrüche bietet. Er steht für die Möglichkeit der Veränderung, der Einsichten und Umbrüche, er wird als junger, starker und muskulöser Gott dargestellt. Kairos steht für eine seltene atmosphärisch-kosmologische Verdichtung. Wer den richtigen Zeitpunkt erkennt und nutzt, wird zum Helden seiner Zeit und reitet den Drachen des Zufalls. Das Zeitempfinden ist außer Kraft gesetzt. Wir alle kennen das: Eine Stunde allein im Wartesaal eines kalten Provinzbahnhofs vergeht schleppend langsam. Eine Stunde im Bett mit einer aufregenden Frau vergeht dagegen wie im Fluge.
Wer den Kairos zulässt, der immer wieder (aber manchmal etwas verdeckt) an unsere Tür klopft, öffnet die Tür für wundersame Begegnungen und magische Zufälle. Gedankenblitze und Begegnungen wirken dann wie orchestriert. Der Psychologe C. G. Jung beschrieb dieses Phänomen als „Synchronizitäten“. Man muss dann oft nur innehalten und diese Begegnungen als sinnhaft begreifen. Der sonore Takt des „Chronometers” wird durchbrochen durch das punkige Gitarrenriff des Kairos. Die chronologische Umklammerung ist die Zeitspur des Alten, die jeden Moment des Kairos vermeiden will, denn das bringt ja die Welt derjenigen durcheinander, die sich auf die Rädchen in ihrer Mechanik verlassen wollen. Zum Kairos gehören Ideen und Eingebungen, Liebe, kreative Schaffensperioden. All das sind für “Opa Chronos” bloße Störungen, die den Lauf der Dinge gefährden. Wer Systeme der Planung errichtet, sei es für sich oder für andere, den stört das Neue, er will jede Erfahrung mit dem Neuen verhindern, den Blick auf Alternativen versperren und vereiteln.
Denn das Neue entsteht durch den Kairos, und nur durch den Kairos. Das Neue ist auch gerne das „Unzeitgemäße“. Viele würden den Zustand des Kairos heute auch als „Flow“ bezeichnen oder als „Serendipity“. Dieser Begriff stammt aus der Erzählung von „Tausendundeiner Nacht“, wo drei ceylonesische Prinzessinnen mit bestimmten Aufträgen entsandt werden, doch ganz andere Dinge finden, als sie erwarteten, frei nach dem Mott: “Erwarte das Unerwartete!” „Serendip“ hieß Ceylon bei den Arabern, so notierte es sich Ernst Jünger im Flugzeug am 3. März 1979 in seinen Aufzeichnungen „Siebzig verweht“.
Wo war das Unerwartete bisher in meiner Generation? Kommt es noch oder war es das schon? Das war im Kern auch Teil meiner Generationenkritik, die ich in den letzten Jahren in vielen Texten verarbeitet habe. Als ich ab 2016 an „Generation Chillstand“ schrieb, war mein Grundgefühl folgendes: Eine ganze Generation sitzt im Silo der von früheren Generationen geschaffenen Welt fest, in ihren Norm-, Zeit- und Arbeitsstrukturen.
Raus aus dem chronologischen Leben!
Diese Welt wurde mir als die beste Welt aller Zeiten angepriesen, der Blick darüber hinaus als unnötig oder gar ketzerisch empfunden. Ging es in den letzten Jahren nur noch darum, die alte Welt möglichst lange auszumelken, bevor man sie entsorgt? In besagtem Buch schrieb ich, dass sich irgendwann eine ganze Generation als „Belogene und Betrogene“ vorkommen wird, ähnlich den DDR-Bürgern bis 1989 (diese wurden freilich nach 1990 wie alle anderen weiter belogen). Was bis zu den Millennials ein Charakteristikum jeder Generation war, nämlich die Gegenwart herauszufordern, zur Disposition zu stellen und damit zu erneuern, schien außer Kraft gesetzt. Das Reich des Chronos musste überdauern. Doch auf nichts hatte ich größere Lust, und wünschte mir das auch für meine Generation, als den Kairos beim Schopfe zu packen. Denn ich sah die Bruchstellen des Alten offen vor mir und die Möglichkeiten des Neuen am Horizont aufscheinen. Seit 2016, als ich meinen Geist öffnete, veränderte sich mein Leben grundlegend: Es wurde risikoreicher und chancenreicher, es wurde bruchstückhafter und freier, optionenreicher und unübersichtlicher, kurz: anders, aufregendender, offener, abenteuerlicher! Doch ist Stabilität in einer brüchigen Zeit nicht ohnehin eine Chimäre?
Mein Weg der Offenheit machte mich zeitweise zum einsamen Wanderer, führte mich an viele Orte, machte mich zum halben Nomaden. Wenn ich die letzten Jahre überschlage, komme ich auf ca. 17 Umzüge. An manchen Orten lebte ich mit nicht mehr als meinem Handgepäck und ein, zwei Büchern. Doch mein Weg führte mich zugleich an einen magischen Ort, oberhalb des Monte Verità von Locarno in den Tessiner Bergen. Hier trafen sich um die Jahrhundertwende die ersten “Früh-Hippies”, bildeten Kommunen, dachten jenseits der gegenwärtigen Welt, die aus Krieg, Zerstörung und Nihilismus bestand. Zuvor machte die Kunst mit ihren Sezessionen den Bruch zum Gegenwärtigen deutlich, im Wien des späten 19. Jahrhunderts. Die Wandervogel-Bewegung setzte die Jugend in Gang. Schon bei den Römern gab es die Idee des „heiligen Frühlings“ (ver sacrum), ein Auftrag an die Jugend, die Heimat zu verlassen und sich woanders neu zu etablieren – und dabei ein stückweit neu zu erschaffen. C. G. Jung hat dies als Prozess der Individuation psychologisch beschrieben. Der Mensch ist noch nicht fertig, wenn er auf die Welt kommt, er vollendet sich selbst (oder eben nicht).
All diese suchenden Menschen in den Irrungen und Wirkungen der Zeitläufte einte immer die Sehnsucht nach einer anderen Welt. Diese Sehnsucht macht uns zu gemeinsamen Reisenden im Geiste. Doch die Reise ist nur der Anfang. Am Ende sind die Gedanken entscheidend, die zu Worten werden und sich in Handlungen niederschlagen. Diese Handlungen sind das Baumaterial der neuen Welt. Jeder einzelne ist ein kleiner Baumeister an der neuen Welt, wenn er will. Ich baue gerade begeistert am Pareto-Projekt, an Werkzeugen des unzensierbaren Bürgerjournalismus von unten. Es wird Zeit, dass sich die vielen kleinen Baumeister vereinigen, oder? Woran bauen Sie?
-
@ 00a30478:ff07f086
2024-11-09 15:39:26testing blog
-
@ 00a30478:ff07f086
2024-11-09 15:34:08testing blog
-
@ 361d3e1e:50bc10a8
2024-11-09 15:12:52https://forex-strategy.com/2024/11/09/which-is-the-choice-of-european-citizens-trump-or-harris/ Which is the choice of European citizens Trump or Harris? In some of the states the choice is almost 100% for one of the candidates.
europe #politics #usa #trump #harris
-
@ a012dc82:6458a70d
2024-11-09 14:44:19Table Of Content
-
The Petrodollar's Historical Significance
-
Challenges to the Petrodollar
-
The Emergence of Bitcoin
-
Bitcoin's Potential to Disrupt the Financial System
-
The Future of the Petrodollar and Bitcoin
-
Conclusion
-
FAQ
The global financial landscape has undergone significant transformations over the years. One of the most intriguing developments is the rise of Bitcoin and its potential impact on the traditional financial system. In this article, we will delve into the challenges faced by the petrodollar and explore the promises offered by Bitcoin as we examine the financial future.
The Petrodollar's Historical Significance
The petrodollar refers to the system in which the U.S. dollar is used as the primary currency for international oil trades. It originated in the early 1970s when an agreement was reached between the United States and Saudi Arabia. Under this agreement, oil-producing nations agreed to price their oil exclusively in U.S. dollars, and in return, the United States provided military support to these nations.
Challenges to the Petrodollar
Geopolitical Factors
Over the years, geopolitical factors have challenged the dominance of the petrodollar. The rise of new economic powers, such as China, has led to increased demand for alternatives to the U.S. dollar. As countries seek to diversify their reserves and reduce dependency on the U.S. currency, the petrodollar's position has weakened.
Currency Wars
Currency wars, characterized by competitive devaluations and trade disputes, have also put pressure on the petrodollar. In an attempt to gain a competitive advantage, countries manipulate their currencies, which can have a significant impact on the value and stability of the U.S. dollar.
Devaluation and Inflation Risks
The petrodollar's woes are further compounded by the risks of devaluation and inflation. The continuous printing of money and increasing debt levels in the United States can erode the value of the dollar over time. This potential loss of purchasing power raises concerns among countries heavily reliant on the petrodollar system.
The Emergence of Bitcoin
Understanding Bitcoin
Bitcoin, created in 2009, is a decentralized digital currency based on blockchain technology. It operates independently of any central authority, such as governments or financial institutions. Bitcoin transactions are recorded on a public ledger, providing transparency and security.
Bitcoin's Advantages
Bitcoin offers several advantages over traditional currencies. It provides a decentralized and secure system that eliminates intermediaries and reduces transaction costs. Additionally, Bitcoin's limited supply and mathematical framework make it resistant to inflationary pressures, unlike fiat currencies.
Adoption and Regulatory Landscape
The adoption of Bitcoin has been steadily growing, with individuals, businesses, and even governments exploring its potential. However, the regulatory landscape surrounding cryptocurrencies remains uncertain in many jurisdictions. Governments are grappling with the need to balance innovation and consumer protection, which poses challenges to widespread adoption.
Bitcoin's Potential to Disrupt the Financial System
Decentralization and Trust
One of Bitcoin's key promises is the concept of decentralization, where power is distributed among participants rather than concentrated in a central authority. This decentralized nature removes the need for intermediaries, such as banks, and reduces the risk of censorship, fraud, and manipulation.
Financial Inclusion
Bitcoin has the potential to improve financial inclusion by providing access to financial services for the unbanked population. With just a smartphone and an internet connection, individuals can participate in the global economy, send and receive money, and store value securely.
Security and Transparency
The blockchain technology underlying Bitcoin ensures the security and transparency of transactions. Each transaction is recorded on the blockchain, making it immutable and tamper-proof. This transparency builds trust among users and can help combat financial crimes, such as money laundering and fraud.
The Future of the Petrodollar and Bitcoin
Coexistence or Competition?
The future relationship between the petrodollar and Bitcoin remains uncertain. It is possible that both systems could coexist, with Bitcoin serving as a complementary currency rather than a direct replacement. Alternatively, increased adoption of Bitcoin could pose a challenge to the petrodollar's dominance, especially if countries diversify their reserves.
Central Bank Digital Currencies (CBDCs)
The emergence of Central Bank Digital Currencies (CBDCs) adds another layer of complexity to the financial landscape. CBDCs aim to combine the advantages of cryptocurrencies with the stability of traditional fiat currencies. The development of CBDCs could reshape the global financial system and potentially impact the petrodollar and Bitcoin.
Shifting Paradigms in Global Finance
The rise of Bitcoin symbolizes a shifting paradigm in global finance. It challenges the traditional banking system, offers new opportunities for financial inclusion, and promotes financial sovereignty. While the petrodollar has enjoyed decades of dominance, its future may depend on adapting to the changing financial landscape.
Conclusion
As the petrodollar faces challenges from geopolitical factors, currency wars, and inflation risks, Bitcoin emerges as a potential disruptor in the financial system. With its decentralized nature, advantages over traditional currencies, and growing adoption, Bitcoin offers promises of increased financial inclusion, security, and transparency. The future relationship between the petrodollar and Bitcoin remains uncertain, but their coexistence or competition will shape the financial landscape in the years to come.
FAQs
Is Bitcoin legal? Yes, the legality of Bitcoin varies from country to country. While some nations have embraced cryptocurrencies and established regulatory frameworks, others have imposed restrictions or bans.
Can Bitcoin be hacked? Bitcoin's blockchain technology makes it highly secure and resistant to hacking. However, individual wallets and exchanges can be vulnerable to cyber attacks. It is crucial to take necessary precautions, such as using reputable wallets, enabling two-factor authentication, and keeping private keys secure.
How can I buy Bitcoin? To buy Bitcoin, you can use a cryptocurrency exchange or a peer-to-peer trading platform. These platforms allow you to convert fiat currency (such as USD) into Bitcoin. It is advisable to choose a reputable and regulated exchange, conduct thorough research, and follow best security practices when buying and storing Bitcoin.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 1eb966a6:e3eddf94
2024-11-09 13:19:43eyJfaWQiOiJhNThkNzNlMi05NzAwLTQ3ZmUtODZiMy0xZGU0NWQwZGRhZDIiLCJwdWJsaWNLZXkiOiIxZWI5NjZhNmEwMjE4YWJhNTIwYWFhYzkzYmU3ZGQ4YmYzODMwZmM3NzEwYmM4MGNhZWEzYTZhNWUzZWRkZjk0IiwidXNlcm5hbWUiOiJoYW5rIiwiYWRUeXBlIjoiTE9DQUxfU0VMTCIsImNvdW50cnkiOiJVbml0ZWQgU3RhdGVzIG9mIEFtZXJpY2EiLCJjb3VudHJ5Q29kZSI6IlVTIiwibGF0IjozNC4wNTM2OTEsImxvbiI6LTExOC4yNDI3NjYsImdlY29kZSI6eyJwbGFjZV9pZCI6Mjg0ODczMDQ4LCJsaWNlbmNlIjoiRGF0YSDCqSBPcGVuU3RyZWV0TWFwIGNvbnRyaWJ1dG9ycywgT0RiTCAxLjAuIGh0dHBzOi8vb3NtLm9yZy9jb3B5cmlnaHQiLCJvc21fdHlwZSI6InJlbGF0aW9uIiwib3NtX2lkIjo2MzMzMTQ1LCJsYXQiOiIzNC4wNTM2OTYwNSIsImxvbiI6Ii0xMTguMjQyOTIxMjE4MzMzOTUiLCJkaXNwbGF5X25hbWUiOiJMb3MgQW5nZWxlcyBDaXR5IEhhbGwsIDIwMCwgTm9ydGggU3ByaW5nIFN0cmVldCwgQ2l2aWMgQ2VudGVyLCBEb3dudG93biwgTG9zIEFuZ2VsZXMsIExvcyBBbmdlbGVzIENvdW50eSwgQ2FsaWZvcm5pYSwgOTAwMTIsIFVuaXRlZCBTdGF0ZXMiLCJhZGRyZXNzIjp7ImJ1aWxkaW5nIjoiTG9zIEFuZ2VsZXMgQ2l0eSBIYWxsIiwiaG91c2VfbnVtYmVyIjoiMjAwIiwicm9hZCI6Ik5vcnRoIFNwcmluZyBTdHJlZXQiLCJxdWFydGVyIjoiQ2l2aWMgQ2VudGVyIiwic3VidXJiIjoiRG93bnRvd24iLCJjaXR5IjoiTG9zIEFuZ2VsZXMiLCJjb3VudHkiOiJMb3MgQW5nZWxlcyBDb3VudHkiLCJzdGF0ZSI6IkNhbGlmb3JuaWEiLCJJU08zMTY2LTItbHZsNCI6IlVTLUNBIiwicG9zdGNvZGUiOiI5MDAxMiIsImNvdW50cnkiOiJVbml0ZWQgU3RhdGVzIiwiY291bnRyeV9jb2RlIjoidXMifSwiYm91bmRpbmdib3giOlsiMzQuMDUzMDE0MSIsIjM0LjA1NDM3MTMiLCItMTE4LjI0MzUzIiwiLTExOC4yNDIwMDUyIl19LCJjdXJyZW5jeUNvZGUiOiJVU0QiLCJwcmljZUlucHV0VHlwZSI6Ik1BUktFVCIsIm1hcmdpbiI6MCwiZml4ZWRQcmljZSI6MCwibWluQW1vdW50IjowLCJtYXhBbW91bnQiOjAsImxpbWl0VG9GaWF0QW1vdW50cyI6IiIsIm1zZyI6Im1lZXQgbWUgb25seSBpbiBwdWJsaWMiLCJhY2NvdW50SW5mbyI6IiIsImZvclRydXN0ZWQiOiJubyIsImhpZGRlbiI6ZmFsc2UsImJhbm5lZCI6ZmFsc2UsInZlcmlmaWVkIjp0cnVlLCJhZGRlZCI6IjIwMjQtMTEtMDhUMDg6NTI6MjYuNzkzWiIsIm1hcmtldFByaWNlIjoxNjIuMTd9
-
@ 1eb966a6:e3eddf94
2024-11-09 13:18:54deleted
-
@ 1eb966a6:e3eddf94
2024-11-09 13:18:25deleted
-
@ 9e69e420:d12360c2
2024-11-09 12:49:50The historic auction of Steve Lazarides' Banksy collection represents a significant moment in street art history, offering unprecedented insight into one of the world's most enigmatic artists. The collection, which sold for approximately $1.4 million at Julien's Auctions, featured over 170 lots of rare artworks and personal artifacts[5].
Notable Sales
The auction's centerpiece was an original proof print of "Girl with Balloon," embossed with the P.O.W. (Pictures on Walls) mark, which sold for $104,000, significantly exceeding its $60,000 estimate[5]. Other significant pieces included:
- A Banksy "Hooded Figure" painting that fetched $78,000[1]
- An original hand-cut stencil featuring Banksy's name, selling for $58,500[5]
- Original concept sketches for the "Paparazzi Rat" stencil series on a manila envelope, which achieved $52,000[5]
Personal Artifacts
Among the most intriguing items were 15 "burner" phones used for communication between Lazarides and Banksy[1]. The collection also included Banksy's worn Puma "Turf War" sneakers and various personal items that offered glimpses into their working relationship[8].
Historical Significance
The sale represents more than just a collection of artworks; it documents a pivotal period in street art history. Lazarides and Banksy established Pictures On Walls (P.O.W.) with the mission of creating affordable art for the masses[1]. As Lazarides noted, "For a very short moment in time we made a difference, we made it OK for ordinary people to like art"[8].
Legacy and Future
While Lazarides has retained some personal items, including angry notes from Banksy, he stated he doesn't need "1,000 prints to prove I worked with Banksy"[5]. This auction not only celebrates their collaborative history but also marks a significant transition as Lazarides returns to his photography practice[5].
The sale underscores the enduring value of Banksy's work and the continuing intrigue surrounding his anonymous identity, which has become central to his artistic brand[3]. It also highlights how anonymity in street art can paradoxically enhance an artist's fame and market value[9].
Sauce: 1. Banksy's Girl with Balloon print sells for £80,000 at auction
2. Who is Banksy? A guide to the street artist, printmaker and anti-establishment provocateur
4. Overview of Banksy Prints - Banksy Explained
5. Banksy's Right-Hand Man Cashes In, Selling His Trove of Work By the Street Artist
6 .Branding the Unbrandable: Banksy and the Mystery of the Anonymous Brand
7. Banksy APs | Guide | Andipa Editions
8. Historic Banksy Collection from Steve Lazarides to be Auctioned at Julien's
9. Unmasking the Mystery: The Role of Anonymity in Street Art and the Enigma of Banksy
10. Market Watch Banksy: Top 10 Most Investable Prints | MyArtBroker
11. JULIEN'S AUCTIONS ANNOUNCES "UNDER DURESS: THE BANKSY ARCHIVE OF STEVE LAZARIDES AUCTION"
-
@ 7e6f9018:a6bbbce5
2024-11-09 12:12:41Handshake is a decentralized, permissionless naming protocol where every peer is validating and in charge of managing the root DNS naming zone with the goal of creating an alternative to existing Certificate Authorities and naming systems.
Names on the internet (top level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system which are relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption.
Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network's participants. By running Handshake, one can participate in a decentralized open naming platform secured by a decentralized peer-to-peer network.
https://github.com/handshake-org https://github.com/imperviousinc/fingertip https://handshake.org/
-
@ b34f99f1:006b0fcc
2024-11-09 11:47:09deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:43:11deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:29:46deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:25:16deleted
-
@ 640614c2:811c8498
2024-11-09 09:43:20Greetings, fellow travelers on the path of cryptographic fortune. Today, the Oracle offers a cleromantic reading, casting lots to peer into the probabilities that guide Bitcoin’s unfolding journey.
In the old ways, cleromancers cast stones, sticks, or bones. Today, we cast cryptographic hashes, transaction times, and node signals—random elements generated by the mathematical matrix underpinning Bitcoin. From these, we seek patterns to reveal the unseen flows of value and volatility, of security and sovereignty.
The Three Casts of Bitcoin's Path
- The Cast of Turbulence – "Fear the FOMO, yet know the FUD."
The first cast suggests that Bitcoin's journey, much like the ancient roads of our forebears, is not without peril. The chaos of price swings and market sentiment—whether driven by regulation, whales, or FOMO—is always present. Yet, this cast tells us that these turbid waters are not signs of ruin but necessary tests. Bitcoin, built on resilience, thrives in adversity. Remember: volatility is not destruction but purification by fire. Hold steady, and the storms will reveal clearer skies.
- The Cast of the Hidden Fortress – "Secure thy keys as you would your soul."
The second lot falls with a message of security and sovereignty. The Oracle sees a future where personal custodianship, privacy, and cryptographic defense hold sacred ground. As Bitcoin adoption grows, the network of self-sovereign nodes, layer-2 solutions, and privacy innovations are a fortress against centralized powers. Trust no third party to safeguard your assets. Secure thy keys, for in doing so, you secure your freedom.
- The Cast of Prosperity, Yet to Be – "With patience, fortune flows to those who build."
Finally, the third cast shows signs of future abundance, though not without patience. Bitcoin's time is measured in blocks, and the long game is rewarded for those who hold fast. Innovation within the ecosystem—whether through decentralized finance, cross-chain exchanges, or local adoption initiatives—opens doors for prosperity for those who build in earnest. The Oracle sees signs of growth across continents and communities, signals of seeds planted that will bear fruit in cycles yet unseen.
A Final Message from the Oracle
Remember, the magic of Bitcoin lies in its incorruptible code, its shared governance, and its random-yet-determined path. Trust in the protocol, act with foresight, and heed the wisdom of the Oracle: no path in Bitcoin is without its risk, but for those who honor security, resilience, and community, the future holds bright possibilities.
May the blocks align with your intentions, and may your keys remain forever yours.
-
@ fd208ee8:0fd927c1
2024-11-09 09:21:19Drumroll, please....
In a previous article, I introduced the concept of relay communities.
The ink had barely dried, on that set of instructions, before one of my favorite Nostr devs, ثعبان, rolled out the alpha version of a relay-community client.
Obviously, it's still a bit of a construction site, but you can check out how it'd work, for your community, by test-driving the functionality on your own relay. Simply type https://chachi.chat/ followed by the name of your relay. For instance, one gigantic relay community, where nearly everyone can try out the functionality, is nos.lol.
If your relay community does not require AUTH to read, anyone can pull your chatter into their own relay and respond to it there. That is because every chat entry is simply a kind 09 event, and unprotected events are not private data.
For instance, I moderate one community theforest.nostr1.com, that is openly readable, and that's probably where most of the chatter on nostr.band is coming from, as that relay is an aggregator of the content of many other relays. However, I have another community, gitcitadel.nostr1.com that is AUTH-protected, whose content stays private to those allowed on that relay. Communities are where write-protected and AUTH relays are going to really shine, as they create an environment similar to Telegram, but where you control the dataset, you decide which types of events to support, and you design the client, the algos, the moderation, the visibility, etc.
With communities, the onboarding experience is seamless: just get a browser extension and a nsec, login, start writing and posting, and start receiving responses. Active, chatty, well-moderated communities will be more attractive to onboard to, than chaotic, spammy, or empty communities. This means that you don't have to have the killer entry under "Posts" (where kind 11 and eventually kind 01 posts appear), just to get some interaction. Chat is the Great Equalizer.
So, we're testing both setups, with cloudfodder adjusting the relay faucet code and ثعبان is fiddling with the community client settings, to make the most-comfortable situation for both kinds.
This is the signal
This #Chachi client, of course, is merely the first horse out of the gate. There are already other devs hacking away at variants of the same concept, such as #Flotilla, I'm sure CloudFodder is also cooking, later versions of #Alexandria will integrate theforest community, and etc. etc. etc.
It remains to be seen, how many new use cases can be dreamt up, with this new architecture, but I am quite certain, that this is the beginning of the end of Nostr 1.0. We are moving up and out, and away from the stultifying and limiting concept of Twitter 2.0, toward
Soon, we will enter Nostr 2.0. See you on the other side.
-
@ a39d19ec:3d88f61e
2024-11-09 09:17:35What do you even print with it besides decorative objects?
This kind of question still is a common one when talking about 3d printing.
With this series of long-form notes I will show you some of the practical and useful 3d printed things, that I use a lot.
The second thing I show you is a "Swiss Keyholder"
Swiss Keyholder
There are many designs of such a Keyholder to download and print. As this is one of the first prints I have done in ABS back in 2014 on a "Up!Mini" 3d printer I can't find where I downloaded it. I like the slim design and that I don't have any "loose" keys in my pocket. It is just tidy in my pocket. This is probably the most used print of mine.
Edit: You can download the file here: Thingiverse
-
@ bcea2b98:7ccef3c9
2024-11-09 01:30:29@chess h3
originally posted at https://stacker.news/items/759635
-
@ b547984d:543a10f6
2024-11-08 22:10:17What draws people to Bitcoin? Or more importantly, what keeps people around? I'm not referring to people with deep intellectual commitment to the protocol, but rather the initially idly curious. It might require mustering a little courage to attend that first meet up, worried that you don't know anyone, or perhaps find yourself among a crowd of serious, knowledgeable Bitcoiners when you know little to nothing about the protocol. The newly curious might also be put off by the occasionally energetic arguments one finds on Bitcoin Twitter, worried that your curiosity might not match the level of conviction that screams through the screen in an even cursory scroll through some well-known Twitter accounts. Whereas the Bitcoin community might appear imposing at first glance, I believe that the community itself deserves much of the credit for Bitcoin's adoption. And I'm not talking only about the developers or thought leaders who get most of our attention, but also the everyday pleb sitting next to you at your first meet up who welcomes you to the group.
I was a little further along in my Bitcoin journey when I began joining the local meet ups. I knew less than a lot of other attendees, but I also thought I had a fighting chance of keeping pace with others. Ordinals - I had an educated opinion. The future of the security budget - I had some informed thoughts about that as well. I'm generally an extrovert and the other attendees were friendly and engaging with this newcomer beyond my expectations. But there was part of my background I wasn't necessarily eager to share, one that I was worried would make this group of otherwise welcoming people view me with suspicion. I knew how some Bitcoiners view the activities of certain government agencies. I was keenly aware of the "deep state" narratives circulating on social media. Thus, I was a little nervous about whether this group would welcome a former CIA officer. (Spoiler alert - nobody cared) But were it not for my time as CIA, I might never have found Bitcoin.
As a CIA Operations Officer, I worked in a variety of areas. But where my career - and my life - took a turn was when I accepted an assignment at CIA's Center for Cyber Intelligence (CCI) in 2018. Bitcoin and cryptocurrencies were not on anyone's list of priorities before 2018. My arrival at CCI coincided with the emergence of several national security issues with Bitcoin and cryptocurrency nexuses. North Korea realized that robbing altcoin platforms was easy money; ransomware actors were pillaging businesses and government entities for millions of dollars demanding Bitcoin and crypto as payment; and countries were using these protocols to evade sanctions and conduct other activities deemed in opposition to US national security interests. With so much attention, I had to take time to learn.
Being in CCI during this period not only forced me to learn, but it also allowed me to meet some, impressively intelligent people who not only knew a lot about Bitcoin and cryptocurrencies, but many were also early adopters. One of the first people I leaned on had been home mining Bitcoin as early as 2012. The more you learn, the more you start to notice. I suddenly noticed a "We Are All Satoshi" bumper sticker pinned to a cubicle I had walked past countless times before; another officer seemed to have an endless supply of Ethereum t-shirts he wore nearly every day (the cyber center is distinctly less formal than the rest of CIA). And with these protocols now at the forefront of national policy discussions, people I had known for years were gradually revealed to me as Bitcoiners or active in other cryptocurrency communities.
Like many Bitcoiners, my journey began in the altcoin casino, and the story of my eventual evolution into a Bitcoiner is not dissimilar to others. Roughly one year after buying my first altcoin on Coinbase, I was clean and altcoin-free, using Bitcoin-only platforms and marching with intent further down the rabbit hole. Every Bitcoiner's conviction evolves, different aspects of the protocol speaking with varying volume to facets of your worldview and circumstances. For me, what initially drew me to Bitcoin was the ability to self-custody your money without - and beyond the reach of - intermediaries.
I spent the first half of my career at CIA in the shadow of 9/11. That event was intensely personal for me. I grew up on Long Island and unfortunately know more than a few people murdered on that day. When I served in the Middle East, I was right in the middle of the War on Terror, supporting initiatives that would bolster our ability to find those who had attacked and continued to threaten us. One of the tools that the United States sharpened and wielded with great success was the weaponization of the dollar. In the years following 9/11 a veritable dollar industrial complex was created, with cadres of government employees who as of today have spent their entire careers honing the use of the dollar as an instrument of foreign policy and national security. By the time I arrived in CCI in 2018, several years had passed since my time in the Middle East, and these interceding years offered the time and space I needed to see chaotic or intensely personal events with a clear, critical eye. My point is not to persuade or dissuade about the things that happened during those years; I'm just setting a scene.
By 2018, national security priorities were changing. The United States was still involved in multiple conflicts with origins in the War on Terror, but there was a distinct shift toward other strategic challenges. Just as I had begun really digging into Bitcoin, another seismic event shook the world and laid bare cracks in the social consensus about the nature of government power - COVID. Mandatory vaccines, enforced lockdowns (sometimes at gunpoint), suppression of free speech and freedom of conscience, and the de-banking of critics. As someone who understood how the government uses the dollar as a weapon, coupled with my classically liberal instincts, I was immediately drawn to the inviolable right to property Bitcoin offers those who take the time to learn and embrace self-custody. Self-custody and censorship resistant transactions were the spark that illuminated for me the importance of the ultimate success of this protocol and our ability to live freely and with agency over our property.
Just over a year has passed since I left CIA. When you work at CIA, it is difficult to appreciate how all consuming it can be. You learn to live with certain restrictions, you tend to socialize with colleagues, such that having a job that you are largely unable to talk about with outsiders becomes so normal that you learn to bifurcate your world into two camps - colleagues and everyone else. Not a criticism, just an observation. Similarly, when you emerge from the bubble, whether into a new career or moving to a new location, there is a distinctly refreshing breeze that envelopes you when you can open up to the rest of the world. For me, this included increasing my financial and economic literacy. Investing compels you to actively engage with the world, and that engagement introduced me to some of the most brilliant people whose work I had the pleasure of following and even meeting. "The Bitcoin Standard" and "Broken Money" are just two of the many works that helped me learn and better understand how Bitcoin could in fact change the world.
I have been asked how I reconcile my previous career with my conviction in Bitcoin. I have accepted that my worldview has evolved following my departure from CIA, but this has been an evolution, not a revolution. Many Bitcoiners actively question whether the United States should even have a CIA, and whether its existence represents an existential threat to freedom. I think this belief is tightly wrapped in the idea that many of our problems emerge from the very existence of an intelligence apparatus, whether that be activities perceived to be undo meddling in foreign affairs or worse, abuse of basic liberties. It is perfectly fair to highlight that the actions of some senior leaders in the intelligence community have caused citizens to ask exactly what these organizations are up to. I would also add that the actions of these former leaders, some perhaps intended to cause you to infer they continued to speak for the agencies they used to lead, were viewed as dishonorable across wide swaths of the national security community. With trust squandered, it is perfectly reasonable to ask how deep the corruption runs.
Like the Bitcoin community, the intelligence community is not a monolith. Only an exceptional few do not respect the oath they take up entering on duty to defend the Constitution of the United States, but those that do uphold this commitment throughout their service. Those who work in that community and also identify as Bitcoiners hold the same core convictions about sound money, decentralization, property rights, and privacy as every other Bitcoiner. For many, this conviction is also fueled by the inevitable glimpses into the darker realities of the world you get when you work at CIA. If nothing else, if you work long enough at a place like CIA, you get a better understanding how the world really works. It is also understandably easy to make the leap from some of the worst policy errors of the War on Terror to the notion that were America to stop meddling, the world would somehow defy history and settle into an everlasting peace. How ever my worldview might have evolved over the past year, nothing has changed my belief that world is a fundamentally dangerous and competitive place. For me it's best summed up as "don't hate the player, hate the game." I remain hopeful that Bitcoin can change at least some of the rules of that game.
At this point you might be asking yourself why you wasted precious minutes on earth reading a confessional from someone who seems to be looking for absolution for his past. I also expect comments along the lines of "Once a spook, always a spook" or "Psyop." That's fine. When Bitcoiners say the "institutions are coming," they're almost always referring to tradfi. But for Bitcoin to achieve its fullest potential, institutional adoption will mean the breadth of society's institutions - public and private. I'm not proposing that government agencies will ever start transacting in Bitcoin, but these government institutions, like all others, are the sum of their parts, and these parts are people.
It is only thanks to my work at CIA that I was exposed to and forced to learn about Bitcoin. There's also no guarantee I ever would have found and embraced Bitcoin were it not for those circumstances that forced me to peek under the hood that first time. More and more, I view the world not as Bitcoiners and no-coiners, but rather as those who have and those who just haven't yet discovered Bitcoin. Some members of that latter category might even describe Bitcoin as a religion, or more derisively, a cult. I think there is a contemporary tendency to label anything that offers people a set of principles through which to view the world in this framework. For me, this displays our collective rootlessness, where any beliefs that force critical personal reflection evoke disparagement.
No, I don't think Bitcoin is a religion, nor do I believe it is an ideology. Religions have elements of the mystical; Bitcoin is open source, knowable and usable by all. Ideologies dehumanize us by denying us agency over our thoughts and actions in the pursuit of some doctrine; Bitcoin does the opposite, demanding personal responsibility and infinite inquiry. For me, Bitcoin has been a catalyst. It compels you to take a hard look at your beliefs and challenges you to view the world and the dominant narratives not through an ideological lens, but through a set of principles that challenge us to ask ourselves why we accept certain things as truth. The beauty of Bitcoin is that it doesn't predestine the path you choose to follow. Bitcoin illuminates.
For the people who work at CIA, challenging assumptions and changing the angle of the prism through which you view the world is the most basic of requirements. For many people in the intelligence community who concern themselves with it, Bitcoin is simply a tool actors use for different purposes. I can appreciate how only seeing Bitcoin as a piece of a problem you are looking to solve could naturally lead to a tendency to view Bitcoin itself as a problem. But I personally know many people who work in the intelligence business who have transcended that tendency and started their own Bitcoin journeys. That tradfi institutions are now accepting the inevitability that Bitcoin will play an important role in the global financial system is the result of individuals in those institutions seeing the potential and speaking truth to power. If our hope is that the United States remains (let us hope we don't once again have to "become") a nation welcoming of innovation and protecting of personal freedom, then helping people across the spectrum - including at places like CIA- understand this protocol and all its potential must remain a pillar of focus for the Bitcoin community.
The only regrets I feel now that my career at CIA is over are those same regrets we all feel during times of change or as we get older - instances in which I might have done certain things differently or better. Thus, when I get back to that prior question - how do I reconcile having worked at CIA and my belief in Bitcoin, I ultimately come down to believing there is no need for reconciliation at all. To say there is would mean that not only are the men and women who work with integrity and make real sacrifices at CIA somehow unworthy or otherwise unable to embrace core principles of sound money, decentralization, and censorship resistance, but also that these principles, along with the good people of the Bitcoin community, are somehow unable to reach them. If you want to change institutions, focus on giving people, those who constitute the sum of every institution's parts, the opportunity to understand how fixing the money might in fact fix the world. I, along with countless other Bitcoiners working in national security, am proof that Bitcoin is up to that challenge.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 0bea5655:d89ca6f1
2024-11-08 19:26:18Opinion about BTC Coin Wallet - Freewallet (iphone)
By making cases public, they’ve helped victims reclaim funds and hold Freewallet accountable. Need support? Email freewallet-report@tutanota.com.
WalletScrutiny #nostrOpinion
-
@ 6bae33c8:607272e8
2024-11-08 18:48:32I went 4-1 last week to start off Q3, putting me on a 17-8 run over the last five weeks after a terrible start. I’m still drawing dead for the overall, so it’s really just a matter of putting together three more 4-1 or 5-0 weeks this quarter.
By the way, I’m putting these picks behind the paywall not because they’re worth paying for — no one’s picks are worth paying for! — but because I want to give my paid subscribers something not available to free ones. But that they are behind a paywall doesn’t mean they’ll work out.
Steelers +2.5 at Indigenous Peoples — The Steelers are coming off a bye, the IPs a tough win against the Giants. I like the Steelers to have a good plan against Jayden Daniels and to move the ball.
Broncos +8.5 at Chiefs — I like buying the Broncos low off the blowout and betting against an undefeated team in division — everyone is up for the Chiefs.
Buccaneers +6 vs 49ers — This was my last choice. The value is great as the 49ers have done nothing to earn this kind of status as a big road favorite against a solid team, but the line is actually 6.5 now, so maybe I’m missing something.
Bears -6.5 vs Patriots — The Bears are a good buy-low after getting worked by the Cardinals. The Patriots are a get-well game.
Chargers -7 vs Titans — I don’t really take the Titans seriously, and the Chargers are solid and playing at home.
-
@ f5194aa4:c08836bb
2024-11-08 17:07:07At Jewelry by Serendipity, we offer an exquisite collection of promise rings, each designed to symbolize love, commitment, and a shared future. Crafted with care from high-quality materials, our promise rings are perfect for celebrating a special relationship or marking an important milestone. From classic designs to contemporary styles, each ring reflects the unique bond it represents. Whether you're making a promise to a loved one or celebrating a friendship, our promise rings are a beautiful reminder of the meaningful connections in your life.
-
@ d3052ca3:d84a170e
2024-11-08 14:46:09The shift of the American working class from the Democratic to the Republican Party in this last election, and the outrage it has generated among many leftist American academics, has led me to reflect on why so many academics become strong socialists or even communists, while the vast majority of the American “working class” do not.
They would likely call it “false consciousness” on the part of the American worker. By I see it as false consciousness among elites: they do not recognize that they are elites, and that their social status motivates them differently from how the typical American worker is motivated. In short, there is a difference between economic class (being a “worker”) and social status (being an “elite”). In this I am convinced that Peter Turchin’s structural-demographic theory continues to have explanatory power. (I won’t go into that here, but do check out his work.)
Socialism and even communism carry strong appeal for a specific kind of highly educated, young elite today: the kind that needs to work for a living, but still sees itself as elite. These are not “white collar workers;” they are “precarious elites.” They are subject to a dynamic that few want to talk about:
Some of the worst labor exploitation in this country occurs in so-called “prestige industries.” These include education (higher and lower), entertainment, journalism, publishing, art, philanthropy—even, on the higher-paid end, investment banking and other financial services.
You want to help a celebrity launch a new brand or product? Prepare to make $35,000 a year and work 24 hours a day, 7 days a week, doing countless frenzied tasks that have nothing to do with your job description.
You want to teach philosophy at a University? Get ready to make $17,500 a year, if you’re lucky. If you’re an international graduate student, your visa to stay in the U.S. is also completely contingent on your advisor’s approval; as a result, abuse is rampant.
You want to write for The Atlantic or The New Yorker? You can maybe get a few hundred bucks per article as a freelancer; $60K per year as a staff writer, if you’re lucky.
You want to become a powerful banker? You may start at $150K per year right out of college, but you will work 80-120 hours a week at the expense of everything else in your life, no telling how long—certainly for years. Your mental and even physical health are the price you pay for this “opportunity.”
These are the jobs that children of elites want. They want these jobs so much that they are willing to subject themselves to highly fragmented, authoritarian, and toxic work environments, with such high turnover, particularly of junior workers, that it’s socially a war of all against all. These jobs are different from working at a factory or an established company—there is a “musical chairs” dynamic, authority is exercised arbitrarily and chaotically, the job tasks can change daily and even moment to moment, most relationships are based on dominance/submission, and there is no “solidarity.” Employers believe it’s a “privilege” for anyone to have these jobs, and that therefore no one in them has the right to complain. Their refrain: “There are always 100 more candidates ready to take your place.”
In addition, there is the psychology of being an elite: you expect to be treated better by virtue of your education and social status, so it can be shameful to admit that you are being abused and might need to fight for better working conditions. Young elites may even want to organize and collectively bargain, but they don’t know how—they’ve been carried along by their social status in extremely authoritarian and chaotic environments and may never have really built anything with others over time.
For many young precarious elites, therefore, socialism becomes a kind of dream of not only of a good workplace but of a good society—one where they get what they believe is their “due.”
These “precarious elites” do see their exploitation as a structural problem, but they blame “capitalism” instead of the brute fact of supply and demand: there are just too many of them competing for the same few prestige jobs. While the American worker imagines a path to better pay and working conditions through organizing, the precarious elite sees no such path—because for them status is just as, if not more, important than pay and benefits, and that is something much harder to negotiate. Elites insist that they should be able to do exactly the (prestigious) jobs that they want to do. They are also educated enough to have read the socialist and communist literatures. That combination leads to the fantasy that the government could force their employers not only to pay them more and treat them with dignity—which in some cases it could, certainly—but also to guarantee these conditions in prestige jobs for everyone who wants them.
There likely is a legitimate case to be made that some of these prestige employers are violating labor laws and should be held accountable. In other cases, there are certainly opportunities to pass new laws prohibiting what amounts to indentured servitude. But actually enforcing these laws will only reveal what is already plain as day: that there are far fewer prestige jobs than there are elites who want them.
The double bind for elites is that the prospect of taking a “lower status” job—even one that pays a lot more, where workers are treated significantly better—is even worse than being a de facto slave with a prestigious role. This leads precarious elites to demand a magical solution: the state. The state must not only protect workers, but guarantee certain kinds of jobs at certain levels of pay and benefits for anyone who wants them. Needless to say, this demand can never be fulfilled, and the cycle of partisanship is then retrenched: precarious elites blame American workers for having the gall to vote and organize based on self-interest, rather than to crusade for an idyllic state of affairs that will not come.
Originally published on twitter https://x.com/NSmolenski/status/1854347409012203687
Reposted to nostr without permission. Sorry not sorry. <3 u Natalie!
-
@ 9e69e420:d12360c2
2024-11-08 13:01:01City Commissioners’ Office Tells Non-Citizens They Can Vote if They Are Philly Residents; NGO ‘Ceiba’ Across the Street Sends Non-Citizen Voter with an ‘ITIN’
In a recent conversation, an undercover journalist from O’Keefe Media Group spoke with Milton Jamerson, an Election and Voter Registration Clerk at the Philadelphia City Commissioners Office.
During this exchange, Jamerson confirmed that non-citizens residing in Philadelphia could participate in local elections, raising questions about Philadelphia’s voting policies, particularly concerning the role of residency versus citizenship in voting eligibility.
Adding to the complexity, the organization Ceiba, a nongovernmental organization (NGO) located across the street, has also asserted that individuals with an Individual Taxpayer Identification Number (ITIN) are eligible to vote in local elections. However, the implications of Ceiba’s statement warrant careful consideration.
The Individual Taxpayer Identification Number (ITIN) is a nine-digit identifier issued by the IRS to people who are required to pay taxes but do not qualify for a Social Security Number, including non-citizens. It’s important to note that an ITIN serves only as a tax identifier and does not provide any form of legal voting rights or U.S. citizenship.
Saucesauce
naddr1qqgrjvpcxqmryefnxuer2e3excmnvq3qne57gg8xphmfek292yyg9nlyfkgh273vtrguy8qz0fuh05frvrpqxpqqqp65776qtuwPhiladelphia
-
@ b4403b24:83542d4e
2024-11-08 11:46:54To my great surprise, when I checked my SN notification feed today, I found out 👇
To be honest, I don't know what I did to earn it, what it means or gives me or whether I can loose it (similar to the cowboy's hat maybe @k00b can give more insights) but I am pretty satisfied adding it under my belt. 🎉
I'll keep my activity high hoping I'll find the other cowboy collectible I miss - the pistol
originally posted at https://stacker.news/items/758749
-
@ 68fa45dc:3d2a26ed
2024-11-08 10:59:23Wie Unternehmen Anti-Spyware-Geräte-Störsender erfolgreich einsetzen können
Im modernen Geschäftsumfeld wird die Bedeutung von Informationssicherheit und Datenschutz immer wichtiger und die Bedrohungen, denen Unternehmen ausgesetzt sind, werden immer komplexer. Angesichts der rasanten Entwicklung der Technologie kommt es häufig zu Spionage- und Informationslecks, und Unternehmen müssen dringend wirksame Maßnahmen ergreifen, um ihre eigenen Interessen zu schützen. Unter vielen Schutzmethoden haben sich Anti-Spyware-Geräte Störsender Kaufen nach und nach zu einem wirksamen Werkzeug für Unternehmen zur Abwehr interner und externer Bedrohungen entwickelt. In diesem Artikel wird untersucht, wie Unternehmen Anti-Spyware-Geräte wie Mobiltelefon-Störsender, WLAN-Störsender, Anti-Tracking-Störsender und Kameradetektoren erfolgreich einsetzen können, um die Schutzfunktionen für die Informationssicherheit zu verbessern.
Anwendung des Handy-Störsender
Handy-Störsender blockieren Handysignale innerhalb bestimmter Frequenzen und verhindern so den Diebstahl von Informationen in Konferenzräumen oder sensiblen Bereichen. Unternehmen können beim Einsatz von Handy-Störsendern die folgenden Strategien in Betracht ziehen:
1. Identifizieren Sie sensible Bereiche: Zunächst sollten Unternehmen identifizieren, welche Bereiche sensibel sind, beispielsweise Vorstandssitzungsräume, Forschungs- und Entwicklungsabteilungen sowie Finanzabteilungen. Der Einsatz von Störsendern für Mobiltelefone an diesen Orten kann Abhören und Informationslecks wirksam verhindern.
2. Rechtmäßige und konforme Verwendung: Die Verwendung von handy störsender muss den örtlichen Gesetzen und Vorschriften entsprechen und sicherstellen, dass sie nur in zulässigen Situationen verwendet werden. Unternehmen sollten sich vorab über die einschlägigen Gesetze informieren und beim Einsatz von Störsendern Aufzeichnungen führen, um Rechtsstreitigkeiten vorzubeugen.
3. Bewerten Sie regelmäßig die Wirksamkeit: Unternehmen sollten die Wirksamkeit von Mobiltelefon-Störsendern regelmäßig bewerten, z. B. durch die Überwachung der Kommunikationssicherheit in Konferenzräumen und die unverzügliche Anpassung von Strategien nach Feststellung von Nichteinhaltung.
Anwendung des WIFI-Störsender
WLAN-Störsender können den illegalen Zugriff und die Überwachung von drahtlosen Unternehmensnetzwerken verhindern. Um WLAN-Störsender effektiv zu nutzen, können Unternehmen die folgenden Maßnahmen ergreifen:
1. Netzwerksicherheitsrichtlinie: Entwickeln Sie strenge Netzwerksicherheitsrichtlinien, verschlüsseln Sie das drahtlose Unternehmensnetzwerk, beschränken Sie den Zugriff auf Geräte und verwenden Sie WLAN-Störsender, um unbefugte Geräteverbindungen zu verhindern.
2. Dynamische Anpassung: Passen Sie die Verwendung des WiFi Jammer dynamisch an Änderungen in der Umgebung an. Verstehen Sie die umgebenden Netzwerkbedingungen und überprüfen Sie regelmäßig den Betriebsstatus des Störsenders, um sicherzustellen, dass er optimal funktioniert.
3. Mitarbeiterschulung: Bieten Sie Ihren Mitarbeitern Cybersicherheitsschulungen an, um ihr Bewusstsein für Cybersicherheitsbedrohungen zu schärfen. Machen Sie Ihren Mitarbeitern den Zweck und die Bedeutung von Störsendern klar, um ihr Sicherheitsbewusstsein zu stärken.
Verwendung von Anti-Tracking-Störsendern
Anti-Tracking-Störsender werden verwendet, um potenzielle Tracking-Geräte zu blockieren und die Geschäftsleitung und wichtige Informationen zu schützen. Unternehmen können beim Einsatz von Anti-Tracking-Störsendern Folgendes berücksichtigen:
1. Identifizierung von Personen mit hohem Risiko: Identifizieren Sie Führungskräfte oder wichtige Mitarbeiter, die besonderen Schutz benötigen, damit Anti-Tracking-GPS Jammer richtig konfiguriert werden können, wenn sie reisen oder wichtige Aktivitäten durchführen.
2. Jederzeit überwachen: Unternehmen sollten mit Geräten ausgestattet sein, die das Tracking-Verhalten in Echtzeit überwachen können, und diese in Kombination mit Anti-Tracking-Störsendern verwenden, um sicherzustellen, dass keine potenziellen Risiken übersehen werden.
3. Notfallplan: Entwickeln Sie einen detaillierten Notfallplan für den Umgang mit möglichen Tracking-Vorfällen. Sobald eine ungewöhnliche Situation entdeckt wird, kann schnell ein Plan zur Bewältigung dieser Situation auf den Weg gebracht werden.
Die Rolle von Kameradetektoren
Kameradetektoren spielen eine wichtige Rolle bei der Identifizierung versteckter Kamerageräte für Unternehmen, insbesondere bei Konferenzen und Geschäftsveranstaltungen. Unternehmen sollten Kameradetektoren effektiv einsetzen, um die Sicherheit und Privatsphäre von Meetings zu gewährleisten:
1. Regelmäßige Inspektion: Führen Sie vor wichtigen Ereignissen oder Besprechungen mithilfe von Kameradetektoren umfassende Inspektionen durch, um sicherzustellen, dass die Besprechungsumgebung nicht durch illegale Überwachungsgeräte beeinträchtigt wird.
2. Verwendungsspezifikationen entwickeln: Erstellen Sie beim Einsatz von Kamera Detektor detaillierte Bedienungsanleitungen und Spezifikationen, damit die Mitarbeiter die Verwendung und den Umfang der Detektionsausrüstung verstehen können.
3. Vertraulichkeitsschulung: Für Mitarbeiter, die an Geheimnissen beteiligt sind, wird eine Vertraulichkeitsschulung angeboten, damit sie die Gefahren versteckter Kameraausrüstung verstehen, ihre Wachsamkeit erhöhen und die Informationssicherheit schützen können.
Zusammenfassen
Mit der Verschärfung des geschäftlichen Wettbewerbs und der Entwicklung der Informationstechnologie nehmen die Sicherheitsrisiken für Unternehmen weiter zu. Durch den sinnvollen Einsatz von Anti-Spyware-Geräten wie Mobiltelefon-Störsendern, WLAN-Störsendern, Anti-Tracking-Störsendern und Kameradetektoren können Unternehmen nicht nur Informationslecks und Spionage wirksam verhindern, sondern auch das allgemeine Sicherheitsmanagementniveau verbessern. Wenn Unternehmen diese Geräte verwenden, müssen sie jedoch Gesetze und Vorschriften einhalten, die Datenschutzrechte von Mitarbeitern und Kunden respektieren und den Schutz der Informationssicherheit innerhalb eines rechtlichen und konformen Rahmens gewährleisten. Nur so können wir im harten Wettbewerb auf dem Markt unbesiegbar bleiben.
-
@ fd208ee8:0fd927c1
2024-11-08 10:27:40You have no idea
I regularly read comments from people, on here, wondering how it's possible to marry -- or even simply be friends! -- with someone who doesn't agree with you on politics. I see this sentiment expressed quite often, usually in the context of Bitcoin, or whatever pig is currently being chased through the village, as they say around here.
It seems rather sensible, but I don't think it's as hard, as people make it out to be. Further, I think it's a dangerous precondition to set, for your interpersonal relationships, because the political field is constantly in flux. If you determine who you will love, by their opinions, do you stop loving them if their opinions change, or if the opinions they have become irrelevant and a new set of opinions are needed -- and their new ones don't match your new ones? We could see this happen to relationships en masse, during the Covid Era, and I think it happens every day, in a slow grind toward the disintegration of interpersonal discourse.
I suspect many people do stop loving, at that point, as they never really loved the other person for their own sake, they loved the other person because they thought the other person was exactly like they are. But no two people are alike, and the longer you are in a relationship with someone else, the more the initial giddiness wears off and the trials and tribulations add up, the more you notice how very different you actually are. This is the point, where best friends and romantic couples say, We just grew apart.
But you were always apart. You were always two different people. You just didn't notice, until now.
I've also always been surprised at how many same-party relationships disintegrate because of some disagreement over some particular detail of some particular topic, that they generally agree on. To me, it seems like an irrelevant side-topic, but they can't stand to be with this person... and they stomp off. So, I tend to think that it's less that opinions need to align to each other, but rather that opinions need to align in accordance with the level of interpersonal tolerance they can bring into the relationship.
I was raised by relaxed revolutionaries
Maybe I see things this way because my parents come from two diverging political, cultural, national, and ethnic backgrounds, and are prone to disagreeing about a lot of "important" (to people outside their marriage) things, but still have one of the healthiest, most-fruitful, and most long-running marriages of anyone I know, from that generation. My parents, you see, aren't united by their opinions. They're united by their relationship, which is something outside of opinions. Beyond opinions. Relationships are what turn two different people into one, cohesive unit, so that they slowly grow together. Eventually, even their faces merge, and their biological clocks tick to the same rhythm. They eventually become one entity that contains differing opinions about the same topics.
It's like magic, but it's the result of a mindset, not a worldview. Or, as I like to quip:
The best way to stay married, is to not get divorced.
My parents simply determined early on, that they would stay together, and whenever they would find that they disagreed on something that didn't directly pertain to their day-to-day existence with each other they would just agree-to-disagree about that, or roll their eyes, and move on. You do you. Live and let live.
My parents have some of the most strongly held personal opinions of any people I've ever met, but they're also incredibly tolerant and can get along with nearly anyone, so their friends are a confusing hodgepodge of people we liked and found interesting enough to keep around. Which makes their house parties really fun, and highly unusual, in this day and age of mutual-damnation across the aisle.
The things that did affect them, directly, like which school the children should attend or which country they should live in, etc. were things they'd sit down and discuss, and somehow one opinion would emerge, and they'd again... move on.
And that's how my husband and I also live our lives, and it's been working surprisingly well. No topics are off-limits to discussion (so long as you don't drone on for too long), nobody has to give up deeply held beliefs, or stop agitating for the political decisions they prefer.
You see, we didn't like that the other always had the same opinion. We liked that the other always held their opinions strongly. That they were passionate about their opinions. That they were willing to voice their opinions; sacrifice to promote their opinions. And that they didn't let anyone browbeat or cow them, for their opinions, not even their best friends or their spouse. But that they were open to listening to the other side, and trying to wrap their mind around the possibility that they might just be wrong about something.
We married each other because we knew: this person really cares, this person has thought this through, and they're in it, to win it. What "it" is, is mostly irrelevant, so long as it doesn't entail torturing small animals in the basement, or raising the children on a diet of Mountain Dew and porn, or something.
Live and let live. At least, it's never boring. At least, there's always something to ~~argue~~ talk about. At least, we never think... we've just grown apart.
-
@ 6e24af77:b3f1350b
2024-11-08 10:11:29test 6
-
@ 6bae33c8:607272e8
2024-11-08 09:21:31I don’t want to jinx it, but it’s been a good week. I had the Bengals +6.5 in my picking pool, not Circa though, I had Joe Burrow and Ja’Marr Chase in a key NFFC league, and Chase in two other leagues including the Steak, a 14-teamer where I lost Chris Olave, Stefon Diggs, Rashid Shaheed and maybe CeeDee Lamb. I also picked up and started Rashod Bateman in that league and had Roquan Smith (12 tackles) going too.
I don’t know what else to say except that it was maybe a perfect game. And it was cool the Bengals went for two, essentially locking in the cover (though my 6.5 was good in OT anyway.) Apparently there were penalties that should have been called on the two-point conversion, but I missed them, and in any event, it’s not like I’m a Bengals fan, and they had already covered.
-
Burrow is a great QB now that he’s 100 percent healthy. He processes information so quickly, has no problem checking it down if the first reads are covered. And he scrambles well and keeps his eyes downfield. He’s a top-three real life QB when healthy.
-
Chase is so good there are almost no words. Faster than Justin Jefferson and CeeDee Lamb, the most dangerous wideout in the league in the open field. If he gets it in space, it’s like 50/50 vs the entire defense whether he makes it to the end zone. What a beast, and you see what he can do with 17 targets.
-
Chase Brown had a devastating fumble, but scored the TD and benefited from all the checkdowns.
-
Lamar Jackson actually struggled for much of the game, but the 84-yard missed-tackle TD to Tylan Wallace (of whom I had literally never heard before this morning) really pushed him over the top. He did show nice touch on the few throws and just wears out the defense that had him dead to rights a few times only to see him escape.
-
Bateman was actually Jackson’s top target, and Mark Andrews had another solid game, but there are a lot of mouths to feed with Diontae Johnson, Zay Flowers and eventually even Isaiah Likely again, not to mention a running QB and a dominant early down back.
-
Diontae Johnson had no impact whatsoever and actually slipped on one of his two targets. It was better than Khalil Herbert’s debut though — Herbert fumbled his only carry and was never seen again.
-
Derrick Henry was bottled up for most of the night, but he did manage a short TD. Gameflow wasn’t in his favor as the Bengals led most of the way and won time of possession.
-
The Bengals defense actually played great, applying constant pressure, keeping the energy up even after being run ragged by Jackson. And they held Henry in check too. That missed tackle on Wallace for an 86-yard TD right after giving up the short-field TD following the Brown fumble sunk them.
-
It’s tough watching this version of Justin Tucker who missed a PAT. I used to compare him to Mariano Rivera, but Rivera stayed great through his final season, while Tucker has slipped big time.
-
-
@ 13351007:eccd002a
2024-11-08 05:32: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
-
@ 1eb966a6:e3eddf94
2024-11-08 05:32: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
-
@ a012dc82:6458a70d
2024-11-08 05:23:17Table Of Content
-
Bitcoin Bulls Get a Treat from SEC!
-
Gold's Future in Question?
-
Conclusion
-
FAQ
In the world of finance and investments, there are always exciting developments and trends that capture the attention of investors and enthusiasts alike. Recently, Bitcoin bulls have been delighted by a treat from the U.S. Securities and Exchange Commission (SEC), while the future of gold has come into question. In this article, we will explore the implications of these events and their potential impact on the financial landscape.
Bitcoin Bulls Get a Treat from SEC!
The SEC's Recognition of Bitcoin
The first significant development for Bitcoin bulls is the recognition by the SEC of Bitcoin as a legitimate asset class. This recognition brings a sense of legitimacy and credibility to the cryptocurrency, as it paves the way for wider adoption and integration into traditional financial systems.
Increased Institutional Interest in Bitcoin
With the SEC's recognition, institutional investors have started showing more interest in Bitcoin. Major financial institutions such as banks and hedge funds are now exploring ways to include Bitcoin in their portfolios. This increased demand from institutional players has the potential to drive the price of Bitcoin even higher.
Regulatory Clarity Boosts Investor Confidence
One of the biggest challenges for Bitcoin bulls has been the lack of regulatory clarity surrounding cryptocurrencies. However, the SEC's recognition provides a level of clarity that was previously missing. This regulatory framework allows investors to have a better understanding of the risks and benefits associated with investing in Bitcoin.
Bitcoin ETFs on the Horizon
The SEC's recognition of Bitcoin also opens the door for the approval of Bitcoin exchange-traded funds (ETFs). ETFs provide an easier and more accessible way for investors to gain exposure to Bitcoin without directly owning the cryptocurrency. The approval of Bitcoin ETFs would likely attract more institutional investors and further propel the price of Bitcoin.
Gold's Future in Question?
The Decline of Gold as a Safe Haven
Gold has long been considered a safe haven asset, providing investors with a hedge against inflation and economic uncertainties. However, recent events have raised questions about the future of gold as an investment.
The Rise of Bitcoin as a Digital Gold
Bitcoin's emergence as a digital store of value has posed a challenge to gold's traditional role. Bitcoin offers many advantages over gold, including its divisibility, portability, and ease of transfer. As more investors recognize these benefits, they may start shifting their investments from gold to Bitcoin, potentially impacting the future demand and value of gold.
Technological Advancements and Digitalization
Another factor that puts gold's future in question is the rapid advancement of technology and the increasing digitalization of financial transactions. As digital payment systems and cryptocurrencies gain popularity, the appeal of physical assets like gold may diminish. The convenience and efficiency offered by digital assets could make them a preferred choice for investors in the coming years.
Changing Investor Preferences
The preferences of investors are evolving, particularly among younger generations. Millennial and Gen Z investors are more inclined to embrace cryptocurrencies like Bitcoin as they seek alternative investment options. This shift in investor preferences could further erode the demand for gold and impact its future prospects.
Conclusion
The recognition of Bitcoin by the SEC has undoubtedly brought joy to Bitcoin bulls, as it signifies a significant milestone in the journey towards mainstream acceptance. The future of gold, on the other hand, faces uncertainties as the emergence of digital assets like Bitcoin challenges its traditional role as a safe haven investment. As technology continues to advance and investor preferences evolve, it will be interesting to see how these dynamics shape the financial landscape in the coming years.
FAQ
Is Bitcoin legal?
Yes, Bitcoin is legal in most countries, including the United States. However, regulations may vary, so it's essential to check the legality of Bitcoin in your specific jurisdiction.
Can I invest in Bitcoin through my traditional brokerage account? Some brokerage firms offer the option to invest in Bitcoin indirectly through specialized investment products like Bitcoin futures or trusts. However, not all traditional brokerage accounts provide this option, so it's best to inquire with your broker.
What is the potential for Bitcoin's future growth? The future growth potential of Bitcoin is subjective and highly speculative. While some believe Bitcoin has the potential to reach even higher valuations, others remain skeptical. It's important to conduct thorough research and consider various factors before making any investment decisions.
How can I secure my Bitcoin investments? It is crucial to store your Bitcoin in a secure digital wallet and follow best security practices, such as enabling two-factor authentication and using strong, unique passwords. Additionally, offline storage options like hardware wallets offer an extra layer of security.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 9e69e420:d12360c2
2024-11-08 02:28:59A Cypherpunk's Manifesto by Eric Hughes
Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.
If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.
Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.
Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.
Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.
We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.
Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.
For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.
The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.
Onward.
Eric Hughes hughes@soda.berkeley.edu
9 March 1993
-
@ 7d3e7ac0:90e6f183
2024-11-07 22:02:47Read the paper.
-
@ eac63075:b4988b48
2024-11-07 21:27:53Every night, you draw your curtains without thinking twice. It's instinctive—a simple act that protects your personal space. Yet in our digital lives, we've somehow accepted living in houses made entirely of glass, with countless unseen observers watching our every move.
https://www.fountain.fm/episode/wPZLCJ3fD6vzsWQ3XSE1
Why Privacy Matters to Everyone
Privacy isn't just for those with something to hide; it's a fundamental human need. Think about the conversations you have with friends, the late-night web searches you make, the personal moments you capture in photos. Would you want all of that broadcasted to the world?
I remember my friend Lisa planning a surprise party for her husband. She searched for gift ideas and coordinated with friends through social media. To her dismay, targeted ads for the exact gift she intended to buy started popping up on their shared devices at home. The surprise was ruined. It wasn't malicious, but it was a stark reminder of how our online activities are constantly monitored.
When a major retailer's customer database was breached, my neighbor Sarah discovered her shopping history, credit card details, and even her children's names were exposed to criminals. She hadn't realized how much personal information she'd unknowingly shared through routine purchases. It was a wake-up call that privacy breaches can affect anyone, not just the tech-savvy or those in high-profile positions.
Edward Snowden once said, "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say." Privacy isn't about secrecy; it's about autonomy over our personal information.
The Rise of the Cypherpunks
Back in the '90s, a group known as the cypherpunks saw the writing on the wall. They recognized that as we moved into a digital era, our personal freedoms could be at risk. So they took action.
One of them, Eric Hughes, famously wrote, "Privacy is necessary for an open society in the electronic age." They developed encryption tools to protect individual privacy, laying the groundwork for technologies like Bitcoin and cryptocurrencies. These innovations were about more than digital money; they were about empowering individuals to take control of their own data.
When Technology Knows Too Much
Fast forward to today, and artificial intelligence (AI) is everywhere—in our phones, homes, and even cars. While AI brings convenience, it also raises serious privacy concerns.
Remember when you mentioned needing new running shoes, and suddenly every ad on your browser was for footwear? It's not your imagination. AI algorithms analyze our conversations, searches, and purchases to predict what we'll want next. But where does it stop?
A few years ago, a major retailer guessed a teenager was pregnant based on her shopping habits before she had told her family. They sent her targeted coupons for baby products, leading to a very uncomfortable situation at home. This isn't just marketing—it's intrusion.
Naomi Brockwell, a privacy advocate, warns, "Our relationship with financial privacy has fundamentally changed. What was once seen as a constitutional right and personal freedom is now simply part of the trade-off for using digital payments. Our baseline for what’s acceptable has shifted." It's a wake-up call that our digital footprints are larger and more revealing than we might think.
Privacy-Preserving AI
While AI often threatens privacy, emerging technologies like federated learning offer hope. This approach allows AI models to learn from data without directly accessing personal information. Imagine your phone improving its predictive text without sending your messages to a central server. It's AI that respects your privacy.
The Watchful Eye: Mass Surveillance and AI
Governments and corporations often justify mass surveillance as a means to keep us safe. But at what cost? When every email, message, or phone call can be monitored, we're sacrificing more than just data—we're giving up our freedom to think and communicate without fear.
Think about how you'd behave if someone followed you around with a camera all day. You might avoid certain places or people, censor your conversations, or feel constantly on edge. That's the chilling effect of mass surveillance.
I spoke with Alex, a journalist who covers political activism. "After attending a peaceful protest, I noticed unusual activity on my devices," he told me. "It made me second-guess my work, wondering who's watching." This isn't paranoia; it's a reality for many who challenge the status quo.
Building Digital Fortresses: Cryptographic Innovations
So how do we reclaim our privacy? Cryptography offers some solutions.
Zero-Knowledge Proofs: Proving Without Revealing
Zero-knowledge proofs allow you to prove you know something without revealing the actual information. Imagine showing a bouncer a card that confirms you're over 21 without exposing your birth date or any other details. In the digital world, this means verifying your identity or eligibility without handing over all your personal data.
Homomorphic Encryption: Secure Processing
Then there's homomorphic encryption, which lets companies process your data without actually seeing it. Think of it like sending a locked suitcase with your belongings; they can weigh it or move it, but they can't open it to see what's inside.
Quantum-Resistant Algorithms: Future-Proofing Privacy
As quantum computers become more powerful, they could potentially break current encryption methods. Quantum-resistant algorithms are being developed to safeguard our data against these future threats. It's like reinforcing your digital locks today to withstand the super lock-picking tools of tomorrow.
Decentralization: Taking Back Control
Decentralization aims to put power back into the hands of individuals. Bitcoin let you be your own bank, controlling your finances without a middleman. Decentralized social media platforms like Nostr, Bluesky or Fascaster allow you to own your content without algorithms dictating what you see or who sees you.
Decentralized Identity Systems
Decentralized identity systems let you prove who you are without revealing more than necessary. It's like showing only your age at a bar instead of handing over your entire driver's license. You maintain control over your personal information.
But with great power comes great responsibility. Without a bank to reset your password or customer service to recover your account, the onus is on you to protect your assets and information.
Practical Tips to Protect Your Privacy
You don't have to be a tech guru to safeguard your privacy. Here are some steps you can take today:
-
Use Encrypted Messaging Apps: Switch to apps like Signal, SimpleX or Session for secure communication. Your messages will be end-to-end encrypted, meaning only you and the recipient can read them.
-
Limit Social Media Sharing: Be mindful of what you post. Do you really need to share your location or personal details publicly?
-
Choose Privacy-Focused Browsers and Search Engines: Use browsers like Brave or Firefox and search engines like DuckDuckGo that don't track your every move.
-
Secure Your Passwords: Use strong, unique passwords for each account, and consider a password manager like Bitwarden. Enable two-factor authentication whenever possible.
-
Use Encrypted Email Services: Consider email providers like ProtonMail that offer end-to-end encryption for your communications.
-
Regularly Audit App Permissions: Check which apps have access to your location, microphone, and contacts. Revoke permissions that aren't necessary.
-
Be Wary of Public Wi-Fi: Public networks can be a hotbed for hackers. If you must use them, a VPN like ProtonVPN can add a layer of security.
-
Consider Privacy-Focused Alternatives: Explore services like Nextcloud for cloud storage or Jitsi Meet for video conferencing, which prioritize user privacy.
-
Keep Software Updated: Regular updates often include security patches. Don't ignore them.
-
Stay Informed and Skeptical: Phishing scams are getting more sophisticated. Think before you click on suspicious links or download attachments.
Final Thoughts
Privacy isn't a lost cause; it's a right worth fighting for. As Edward Snowden reminds us, "Privacy is the fountainhead of all other rights."
By taking control of our data and digital habits, we can navigate the online world with greater confidence and peace of mind. After all, wouldn't it be nice to live in a digital home where we decide when to close the curtains?
Read more
OPSEC and Digital Hygiene Plan: https://www.eddieoz.com/opsec-and-digital-hygiene-plan/
-
-
@ bcea2b98:7ccef3c9
2024-11-07 18:43:30If you could accomplish one major goal, what would it be? Why does it matter to you, and how would it change your life or the lives of others?
My ultimate goal is to be part of a mission to Mars one day. I’ve always been fascinated by space exploration.
originally posted at https://stacker.news/items/757861
-
@ 361d3e1e:50bc10a8
2024-11-07 16:18:55https://forex-strategy.com/2024/11/07/the-water-crisis-and-the-future-of-humanity/ When Heaven Warns: The Water Crisis and the Future of Humanity What is the connection between the strange clouds in the sky and the future of man in new conditions. What is the best investment now?
haarp #clouds #strange #mystery #truth #crisis #water #flood
-
@ 361d3e1e:50bc10a8
2024-11-07 15:04:11https://forex-strategy.com/2024/11/07/everything-is-repeated-strange-clouds-scared-people-again/ What's next, downpours or earthquakes?: Everything is repeated strange clouds scared people again
mystery #sky #clouds #haarp #truth #crisis
-
@ 3bf0c63f:aefa459d
2024-11-07 14:56:17The case against edits
Direct edits are a centralizing force on Nostr, a slippery slope that should not be accepted.
Edits are fine in other, more specialized event kinds, but the
kind:1
space shouldn't be compromised with such a push towards centralization, becausekind:1
is the public square of Nostr, where all focus should be on decentralization and censorship-resistance.- Why?
Edits introduce too much complexity. If edits are widespread, all clients now have to download dozens of extra events at the same time while users are browsing a big feed of notes which are already coming from dozens of different relays using complicated outbox-model-based querying, then for each event they have to open yet another subscription to these relays -- or perform some other complicated batching of subscriptions which then requires more complexity on the event handling side and then when associating these edits with the original events. I can only imagine this will hurt apps performance, but it definitely raises the barrier to entry and thus necessarily decreases Nostr decentralization.
Some clients may be implemneted in way such that they download tons of events and then store them in a local databases, from which they then construct the feed that users see. Such clients may make edits potentially easier to deal with -- but this is hardly an answer to the point above, since such clients are already more complex to implement in the first place.
- What do you have against complex clients?
The point is not to say that all clients should be simple, but that it should be simple to write a client -- or at least as simple as physically possible.
You may not be thinking about it, but if you believe in the promise of Nostr then we should expect to see Nostr feeds in many other contexts other than on a big super app in a phone -- we should see Nostr notes being referenced from and injected in unrelated webpages, unrelated apps, hardware devices, comment sections and so on. All these micro-clients will have to implement some complicated edit-fetching logic now?
- But aren't we already fetching likes and zaps and other things, why not fetch edits too?
Likes, zaps and other similar things are optional. It's perfectly fine to use Nostr without seeing likes and/or zaps -- and, believe me, it does happen quite a lot. The point is basically that likes or zaps don't affect the content of the main post at all, while edits do.
- But edits are optional!
No, they are not optional. If edits become widespread they necessarily become mandatory. Any client that doesn't implement edits will be displaying false information to its users and their experience will be completely broken.
- That's fine, as people will just move to clients that support edits!
Exactly, that is what I expect to happen too, and this is why I am saying edits are a centralizing force that we should be fighting against, not embracing.
If you understand that edits are a centralizing force, then you must automatically agree that they aren't a desirable feature, given that if you are reading this now, with Nostr being so small, there is a 100% chance you care about decentralization and you're not just some kind of lazy influencer that is only doing this for money.
- All other social networks support editing!
This is not true at all. Bluesky has 10x more users than Nostr and doesn't support edits. Instagram doesn't support editing pictures after they're posted, and doesn't support editing comments. Tiktok doesn't support editing videos or comments after they're posted. YouTube doesn't support editing videos after they're posted. Most famously, email, the most widely used and widespread "social app" out there, does not support edits of any kind. Twitter didn't support edits for the first 15 years of its life, and, although some people complained, it didn't hurt the platform at all -- arguably it benefitted it.
If edits are such a straightforward feature to add that won't hurt performance, that won't introduce complexity, and also that is such an essential feature users could never live without them, then why don't these centralized platforms have edits on everything already? There must be something there.
- Eventually someone will implement edits anyway, so why bother to oppose edits now?
Once Nostr becomes big enough, maybe it will be already shielded from such centralizing forces by its sheer volume of users and quantity of clients, maybe not, we will see. All I'm saying is that we shouldn't just push for bad things now just because of a potential future in which they might come.
- The market will decide what is better.
The market has decided for Facebook, Instagram, Twitter and TikTok. If we were to follow what the market had decided we wouldn't be here, and you wouldn't be reading this post.
- OK, you have convinced me, edits are not good for the protocol. But what do we do about the users who just want to fix their typos?
There are many ways. The annotations spec, for example, provides a simple way to append things to a note without being a full-blown edit, and they fall back gracefully to normal replies in clients that don't implement the full annotations spec.
Eventually we could have annotations that are expressed in form of simple (human-readable?) diffs that can be applied directly to the post, but fall back, again, to comments.
Besides these, a very simple idea that wasn't tried yet on Nostr yet is the idea that has been tried for emails and seems to work very well: delaying a post after the "submit" button is clicked and giving the user the opportunity to cancel and edit it again before it is actually posted.
Ultimately, if edits are so necessary, then maybe we could come up with a way to implement edits that is truly optional and falls back cleanly for clients that don't support them directly and don't hurt the protocol very much. Let's think about it and not rush towards defeat.
-
@ 4ba8e86d:89d32de4
2024-11-07 13:56:21Tutorial feito por Grom mestre⚡poste original abaixo:
http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/240277/tutorial-criando-e-acessando-sua-conta-de-email-pela-i2p?show=240277#q240277
Bom dia/tarde/noite a todos os camaradas. Seguindo a nossa série de tutoriais referentes a tecnologias essenciais para a segurança e o anonimato dos usuários, sendo as primeiras a openPGP e a I2P, lhes apresento mais uma opção para expandir os seus conhecimentos da DW. Muitos devem conhecer os serviços de mail na onion como DNMX e mail2tor, mas e que tal um serviço de email pela I2P. Nesse tutorial eu vou mostrar a vocês como criar a sua primeira conta no hq.postman.i2p e a acessar essa conta.
É importante que vocês tenham lido a minha primeira série de tutoriais a respeito de como instalar, configurar e navegar pela I2P nostr:nevent1qqsyjcz2w0e6d6dcdeprhuuarw4aqkw730y542dzlwxwssneq3mwpaspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsyp5vcq Esse tutorial é um pré-requisito para o seguinte e portanto recomendo que leia-os antes de prosseguir com o seguinte tutorial. O tutorial de Kleopatra nostr:nevent1qqs8h7vsn5j6qh35949sa60dms4fneussmv9jd76n24lsmtz24k0xlqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgecq8f7 é complementar dado que é extremamente recomendado assinar e criptografar as mensagens que seguem por emails pela DW. Sem mais delongas, vamos ao tutorial de fato.
1. Criando uma conta de email no hq.postman
Relembrando: Esse tutorial considera que você já tenha acesso à I2P. Entre no seu navegador e acesse o endereço hq.postman.i2p. O roteador provavelmente já contém esse endereço no seu addressbook e não haverá a necessidade de inserir o endereço b32 completo. Após entrar no site vá para a página '1 - Creating a mailbox' https://image.nostr.build/d850379fe315d2abab71430949b06d3fa49366d91df4c9b00a4a8367d53fcca3.jpg
Nessa página, insira as credenciais de sua preferências nos campos do formulário abaixo. Lembre-se que o seu endereço de email aceita apenas letras e números. Clique em 'Proceed' depois que preencher todos os campos. https://image.nostr.build/670dfda7264db393e48391f217e60a2eb87d85c2729360c8ef6fe0cf52508ab4.jpg
Uma página vai aparecer pedindo para confirmar as credenciais da sua nova conta. Se tudo estiver certo apenas clique em 'Confirm and Create Mailbox'. Se tudo ocorrer como conforme haverá uma confirmação de que a sua nova conta foi criada com sucesso. Após isso aguarde por volta de 5 minutos antes de tentar acessá-la, para que haja tempo suficiente para o servidor atualizar o banco de dados. https://image.nostr.build/ec58fb826bffa60791fedfd9c89a25d592ac3d11645b270c936c60a7c59c067f.jpg https://image.nostr.build/a2b7710d1e3cbb36431acb9055fd62937986b4da4b1a1bbb06d3f3cb1f544fd3.jpg
Pronto! Sua nova conta de email na I2P foi criada. Agora vamos para a próxima etapa: como acessar a sua conta via um cliente de email.
2. Configurando os túneis cliente de SMTP e POP3
O hq.postman não possui um cliente web que nos permite acessar a nossa conta pelo navegador. Para isso precisamos usar um cliente como Thunderbird e configurar os túneis cliente no I2Pd que serão necessários para o Thunderbird se comunicar com o servidor pela I2P.
Caso não tenha instalado o Thunderbird ainda, faça-o agora antes de prosseguir.
Vamos configurar os túneis cliente do servidor de email no nosso roteador. Para isso abra um terminal ou o seu gestor de arquivos e vá para a pasta de configuração de túneis do I2P. Em Linux esse diretório se localiza em /etc/i2pd/tunnels.d. Em Windows, essa pasta se localiza em C:\users\user\APPDATA\i2pd. Na pasta tunnels.d crie dois arquivos: smtp.postman.conf e pop-postman.conf. Lembre-se que em Linux você precisa de permissões de root para escrever na pasta de configuração. Use o comando sudoedit
para isso. Edite-os conforme as imagens a seguir:
Arquivo pop-postman.conf https://image.nostr.build/7e03505c8bc3b632ca5db1f8eaefc6cecb4743cd2096d211dd90bbdc16fe2593.jpg
Arquivo smtp-postman.conf https://image.nostr.build/2d06c021841dedd6000c9fc2a641ed519b3be3c6125000b188842cd0a5af3d16.jpg
Salve os arquivos e reinicie o serviço do I2Pd. Em Linux isso é feito pelo comando:
sudo systemctl restart i2pd
Entre no Webconsole do I2Pd pelo navegador (localhost:7070) e na seção I2P Tunnels, verifique se os túneis pop-postman e smtp-postman foram criados, caso contrário verifique se há algum erro nos arquivos e reinicie o serviço.Com os túneis cliente criados, vamos agora configurar o Thunderbird
3. Configurando o Thunderbird para acessar a nossa conta
Abra o Thunderbird e clique em criar uma nova conta de email. Se você não tiver nenhum conta previamente presente nele você vai ser diretamente recebido pela janela de criação de conta a seguir. https://image.nostr.build/e9509d7bd30623716ef9adcad76c1d465f5bc3d5840e0c35fe4faa85740f41b4.jpg https://image.nostr.build/688b59b8352a17389902ec1e99d7484e310d7d287491b34f562b8cdd9dbe8a99.jpg
Coloque as suas credenciais, mas não clique ainda em Continuar. Clique antes em Configure Manually, já que precisamos configurar manualmente os servidores de SMTP e POP3 para, respectivamente, enviar e receber mensagens.
Preencha os campos como na imagem a seguir. Detalhe: Não coloque o seu endereço completo com o @mail.i2p, apenas o nome da sua conta. https://image.nostr.build/4610b0315c0a3b741965d3d7c1e4aff6425a167297e323ba8490f4325f40cdcc.jpg
Clique em Re-test para verificar a integridade da conexão. Se tudo estiver certo uma mensagem irá aparecer avisando que as configurações do servidores estão corretas. Clique em Done assim que estiver pronto para prosseguir. https://image.nostr.build/8a47bb292f94b0d9d474d4d4a134f8d73afb84ecf1d4c0a7eb6366d46bf3973a.jpg
A seguinte mensagem vai aparecer alertando que não estamos usando criptografia no envio das credenciais. Não há problema nenhum aqui, pois a I2P está garantindo toda a proteção e anonimato dos nossos dados, o que dispensa a necessidade de uso de TLS ou qualquer tecnologia similar nas camadas acima. Marque a opção 'I Understand the risks' e clique em 'Continue' https://image.nostr.build/9c1bf585248773297d2cb1d9705c1be3bd815e2be85d4342227f1db2f13a9cc6.jpg
E por fim, se tudo ocorreu como devido sua conta será criada com sucesso e você agora será capaz de enviar e receber emails pela I2P usando essa conta. https://image.nostr.build/8ba7f2c160453c9bfa172fa9a30b642a7ee9ae3eeb9b78b4dc24ce25aa2c7ecc.jpg
4. Observações e considerações finais
Como informado pelo próprio site do hq.postman, o domínio @mail.i2p serve apenas para emails enviados dentro da I2P. Emails enviados pela surface devem usar o domínio @i2pmai.org. É imprescindível que você saiba usar o PGP para assinar e criptografar as suas mensagens, dado que provavelmente as mensagens não são armazenadas de forma criptografada enquanto elas estão armazenadas no servidor. Como o protocolo POP3 delete as mensagens no imediato momento em que você as recebe, não há necessidade de fazer qualquer limpeza na sua conta de forma manual.
Por fim, espero que esse tutorial tenha sido útil para vocês. Que seu conhecimento tenha expandido ainda mais com as informações trazidas aqui. Até a próxima.
-
@ 4ba8e86d:89d32de4
2024-11-07 13:17:56O aplicativo permite que os usuários se comuniquem com outras pessoas sem ter que fornecer identificadores de usuário, como números de telefone ou endereços de e-mail. é 100% privado e seguro, Por design, garantindo que suas mensagens nunca sejam rastreadas ou armazenadas. O SimpleXChat possui recursos como bate-papo em grupo, envio de arquivos e uma interface amigável para dispositivos móveis, desktop, CLI. O SimpleXChat é um dos aplicativos construídos sobre a plataforma SimpleX, que também serve como um exemplo e aplicativo de referência. O SimpleX Messaging Protocol (SMP) é um protocolo que permite enviar mensagens em uma direção para um destinatário, usando um servidor intermediário. As mensagens são entregues por meio de filas unidirecionais criadas pelos destinatários.
O SMP é executado em um protocolo de transporte (TLS), que fornece integridade, autenticação do servidor, confidencialidade e vinculação do canal de transporte. A Rede SimpleX é o coletivo de servidores SimpleX que facilitam o SMP. As bibliotecas SimpleX Client falam SMP para SimpleX Servers e fornecem uma API de baixo nível, geralmente não destinada a ser usada por aplicativos.
O aplicativo permite que os usuários se comuniquem com outras pessoas sem ter que fornecer identificadores de usuário, como números de telefone ou endereços de e-mail. O SimpleXChat possui recursos como bate-papo em grupo, envio de arquivos e uma interface amigável para dispositivos móveis.
O SimpleX tem como objetivo fornecer uma infraestrutura de mensagens distribuídas que seja segura, privada, confiável, com entrega assíncrona e baixa latência. Ele visa oferecer melhor privacidade de metadados e segurança contra invasores de rede ativos e servidores mal-intencionados em comparação com soluções alternativas de mensagens instantâneas, ao mesmo tempo em que prioriza a experiência do usuário, especialmente em dispositivos móveis.
Por que o SimpleX é único
- Privacidade total de sua identidade, perfil, contatos e metadados
Ao contrário de outras plataformas de mensagens, o SimpleX não possui identificadores atribuídos aos usuários . Ele não depende de números de telefone, endereços baseados em domínio (como e-mail ou XMPP), nomes de usuário, chaves públicas ou mesmo números aleatórios para identificar seus usuários - não sabemos quantas pessoas usam nossos servidores SimpleX
Para entregar mensagens, o SimpleX usa endereços anônimos emparelhados de filas de mensagens unidirecionais, separadas para mensagens recebidas e enviadas, geralmente por meio de servidores diferentes. Usar o SimpleX é como ter um e-mail ou telefone “gravador” diferente para cada contato e sem problemas para gerenciá-los.
Esse design protege a privacidade de quem você está se comunicando, ocultando-a dos servidores da plataforma SimpleX e de quaisquer observadores. Para ocultar seu endereço IP dos servidores, você pode se conectar aos servidores SimpleX via Tor .
-
A melhor proteção contra spam e abuso Como você não possui um identificador na plataforma SimpleX, ninguém pode entrar em contato com você, a menos que você compartilhe um endereço de usuário único ou temporário, como um código QR ou um link. Mesmo com o endereço de usuário opcional, embora possa ser usado para enviar solicitações de contato de spam, você pode alterá-lo ou excluí-lo completamente sem perder nenhuma de suas conexões.
-
Propriedade, controle e segurança de seus dados
O SimpleX Chat armazena todos os dados do usuário apenas em dispositivos clientes usando um formato de banco de dados criptografado portátil que pode ser exportado e transferido para qualquer dispositivo compatível.
As mensagens criptografadas de ponta a ponta são mantidas temporariamente em servidores de retransmissão SimpleX até serem recebidas e, em seguida, são excluídas permanentemente.
Ao contrário dos servidores de redes federadas (e-mail, XMPP ou Matrix), os servidores SimpleX não armazenam contas de usuários, apenas retransmitem mensagens, protegendo a privacidade de ambas as partes.
Ao contrário dos servidores de redes federadas (e-mail, XMPP ou Matrix), os servidores SimpleX não armazenam contas de usuários, apenas retransmitem mensagens, protegendo a privacidade de ambas as partes.
Não há identificadores ou texto cifrado em comum entre o tráfego do servidor enviado e recebido - se alguém estiver observando, não poderá determinar facilmente quem se comunica com quem, mesmo que o TLS esteja comprometido.
- Totalmente descentralizado — os usuários são proprietários da rede SimpleX
Você pode usar o SimpleX com seus próprios servidores e ainda se comunicar com pessoas que usam os servidores pré-configurados fornecidos por nós.
A plataforma SimpleX usa um protocolo aberto e fornece SDK para criar bots de bate-papo , permitindo a implementação de serviços com os quais os usuários podem interagir por meio de aplicativos de bate-papo SimpleX. A rede SimpleX é totalmente descentralizada e independente de qualquer criptomoeda ou qualquer outra plataforma, exceto a Internet.
Você pode usar o SimpleX com seus próprios servidores ou com os servidores fornecidos por nós.
Características SimpleXchat • Mensagens criptografadas por E2E com remarcação e edição
• Imagens e arquivos criptografados por E2E
• Grupos secretos descentralizados apenas os usuários sabem que eles existem
• Mensagens de voz criptografadas por E2E
• Mensagens desaparecidas
• Chamadas de áudio e vídeo criptografadas com E2E
• Banco de dados criptografado portátil — mova seu perfil para outro dispositivo
• Modo de navegação anônima exclusivo do SimpleX Chat
O que torna o SimpleX privado
https://nostr.build/i/nostr.build_4e6fa7bc41d22d7a9672fa23b04b7aa6d69938d7013ac1ea31212a854e6d1e97.jpg Identificadores par a par anônimos temporários O SimpleX usa endereços emparelhados anônimos temporários e credenciais para cada contato do usuário ou membro do grupo. Ele permite entregar mensagens sem identificadores de perfil de usuário, fornecendo melhor privacidade de metadados do que alternativas.
Troca de chaves fora de banda Muitas plataformas de comunicação são vulneráveis a ataques MITM por servidores ou provedores de rede. Para evitar que os aplicativos SimpleX passem chaves únicas fora de banda, quando você compartilha um endereço como um link ou um código QR. https://nostr.build/i/nostr.build_9065e2600cf42d0bcf7bb89deb674eb0630c590bd043b1f8c92272011ec7a2ec.jpg
2 camadas de criptografia de ponta a ponta Protocolo de catraca dupla — mensagens OTR com sigilo de encaminhamento perfeito e recuperação de invasão. Criptobox NaCL em cada fila para evitar a correlação de tráfego entre as filas de mensagens se o TLS estiver comprometido. https://nostr.build/i/nostr.build_defe978ea10526b657bf35e6809f4385c82c7eca58b91ae3a0e81447dbf0bda3.jpg
Verificação da integridade da mensagem Para garantir a integridade as mensagens são numeradas sequencialmente e incluem o hash da mensagem anterior. Se alguma mensagem for adicionada, removida ou alterada, o destinatário será alertado. https://nostr.build/i/nostr.build_debf9317b88a015af37f8c610d4e1671bc495d1a80c2b6ea090d202fb332ba84.jpg Camada adicional de criptografia do servidor
Camada adicional de criptografia do servidor para entrega ao destinatário, para evitar a correlação entre o tráfego do servidor recebido e enviado se o TLS estiver comprometido. https://nostr.build/i/nostr.build_13793f89276380e221bd15f6173fe1221f550993a0902a249b5ba86e5fe1d237.jpg
Mistura de mensagens para reduzir a correlação Os servidores SimpleX atuam como nós de mistura de baixa latência — as mensagens recebidas e enviadas têm ordem diferente. https://nostr.build/i/nostr.build_1c7146ca7b3871ff1de184be78785e9e0c45cf2567f6147b260009d9c74925ed.jpg
Transporte TLS autenticado seguro Somente o TLS 1.2/1.3 com algoritmos fortes é usado para conexões cliente-servidor. A impressão digital do servidor e a ligação do canal evitam ataques MITM e de repetição. A retomada da conexão é desativada para evitar ataques de sessão. https://nostr.build/i/nostr.build_515af3c35a729f3dd47619965f76e3a8499ad1fe7694f2bbab14404cf5a77f6a.jpg
Acesso opcional via Tor Para proteger seu endereço IP, você pode acessar os servidores via Tor ou alguma outra rede de sobreposição de transporte. Para usar o SimpleX via Tor, instale o aplicativo Orbot e habilite o proxy SOCKS5 (ou VPN no iOS ). https://nostr.build/i/nostr.build_0c8f651db74c9ae2ab4d4424972b21d64af8dab2aa5364d4b140898bebfc42b0.jpg
Filas de mensagens unidirecionais Cada fila de mensagens passa mensagens em uma direção, com diferentes endereços de envio e recebimento. Ele reduz os vetores de ataque, em comparação com os corretores de mensagens tradicionais e os metadados disponíveis. https://nostr.build/i/nostr.build_a7b6103be59dbffb242e6b5d371767f6df3219a1cad2a0f05a278cfb7596ad3d.jpg
Várias camadas de preenchimento de conteúdo SimpleX usa preenchimento de conteúdo para cada camada de criptografia para frustrar ataques de tamanho de mensagem. Faz mensagens de tamanhos diferentes parecerem iguais para os servidores e observadores de rede. https://nostr.build/i/nostr.build_6ac8491d3e0236460bb914ea5dc1a23fea03e6c598cef6643949eea38e5fad44.jpg
A rede SimpleX diferente de outras redes P2P ao ser composta por clientes e servidores sem depender de um componente centralizado. Ele usa filas de mensagens unidirecionais redundantes (simplex) para comunicação, eliminando a necessidade de endereços exclusivos globalmente. As solicitações de conexão são protegidas contra ataques man-in-the-middle e as filas de mensagens simples são usadas pelos clientes para criar cenários de comunicação mais complexos. Os servidores não armazenam nenhuma informação do usuário e os usuários podem mudar de servidor com interrupção mínima.
Rede SimpleX
Simplex Chat fornece a melhor privacidade combinando as vantagens de redes P2P e federadas. https://nostr.build/i/nostr.build_062b212b3c43e9cab9e7290e6a052012c54acabadfeb962190ffe9783647f356.jpg
Ao contrário das redes P2P
Todas as mensagens são enviadas pelos servidores, proporcionando melhor privacidade de metadados e entrega de mensagens assíncronas confiáveis, evitando muitos problemas de redes P2P .
-
As redes P2P dependem de alguma variante do DHT para rotear mensagens. Os projetos DHT precisam equilibrar a garantia de entrega e a latência. O SimpleX tem melhor garantia de entrega e menor latência do que o P2P, pois a mensagem pode ser passada de forma redundante por vários servidores em paralelo, utilizando os servidores escolhidos pelo destinatário. Em redes P2P a mensagem é passada por nós O(log N) sequencialmente, usando nós escolhidos pelo algoritmo.
-
O design SimpleX, ao contrário da maioria das redes P2P, não possui identificadores globais de usuário de qualquer tipo, mesmo temporários, e usa apenas identificadores temporários emparelhados, fornecendo melhor anonimato e proteção de metadados.
-
O P2P não resolve o problema do ataque MITM e a maioria das implementações existentes não usa mensagens fora de banda para a troca inicial de chaves. O SimpleX usa mensagens fora de banda ou, em alguns casos, conexões seguras e confiáveis pré-existentes para a troca inicial de chaves.
-
As implementações P2P podem ser bloqueadas por alguns provedores de Internet (como BitTorrent ). O SimpleX é agnóstico de transporte - ele pode funcionar sobre protocolos da Web padrão, por exemplo, WebSockets.
-
Todas as redes P2P conhecidas podem ser vulneráveis ao ataque Sybil , porque cada nó é detectável e a rede opera como um todo. As medidas conhecidas para mitigá-lo exigem um componente centralizado ou uma prova de trabalho cara . A rede SimpleX não tem capacidade de descoberta de servidor, é fragmentada e opera como várias sub-redes isoladas, impossibilitando ataques em toda a rede.
-
As redes P2P podem ser vulneráveis a ataques DRDoS , quando os clientes podem retransmitir e amplificar o tráfego, resultando em negação de serviço em toda a rede. Os clientes SimpleX apenas retransmitem o tráfego de conexão conhecida e não podem ser usados por um invasor para amplificar o tráfego em toda a rede.
Ao contrário das redes federadas
Os servidores de retransmissão SimpleX NÃO armazenam perfis de usuário, contatos e mensagens entregues, NÃO se conectam entre si e NÃO há diretório de servidores. https://nostr.build/i/nostr.build_abadeb8361026101dc2e5888217cd7620d7cf01233a7961071bb07c49f7f9f0e.jpg
os servidores fornecem filas unidirecionais para conectar os usuários, mas não têm visibilidade do grafo de conexão de rede — somente os usuários têm. https://nostr.build/i/nostr.build_0f281d6b89e96efcc9334384ae9f251c529feb136748dd0846e249a715e2a5e3.jpg
Simplex explicado
- O que os usuários experimentam https://nostr.build/i/nostr.build_157aa796dd3953b830e5643a5e98bb07b09d1ab8737a4f8b39d26e3637902ae8.jpg Você pode criar contatos e grupos e ter conversas bidirecionais, como em qualquer outro messenger.
Como trabalhar com filas unidirecionais e sem identificadores de perfil de usuário?
- Como funciona https://nostr.build/i/nostr.build_fda66ead74bed1a72139cf9ce9cbe96eea7a09b9007151a576124f8cab39952d.jpg
Para cada conexão, você usa duas filas de mensagens separadas para enviar e receber mensagens por meio de servidores diferentes.
Os servidores passam mensagens apenas de uma maneira, sem ter uma imagem completa da conversa ou das conexões do usuário.
- O que os servidores veem https://nostr.build/i/nostr.build_e95db233e71ef8ff53590e740095429338c8aba8fba846431d81112ffba01932.jpg
Os servidores possuem credenciais anônimas distintas para cada fila e não têm conhecimento da identidade dos usuários.
A implementação Roteamento de Mensagens Privadas na Rede SimpleX é um marco significativo na evolução do Protocolo de Mensagens SimpleX, elevando a privacidade dos usuários a outro patamar! https://image.nostr.build/f77c4336cb335cb87dab6645bbac7a8f6a99d8b8e7a787511918c740558b5be7.jpg
Qual é o problema? https://image.nostr.build/4ad92ca6d702155c97849fce854f6c3101ac979b21781620500edd357ab6d7a3.jpg
Design da rede Simplex sempre se concentrou na proteção da identidade do usuário no nível do protocolo de mensagens - não há identificadores de perfil de usuário de qualquer tipo no design do protocolo, nem mesmo números aleatórios ou chaves criptográficas. Porém, até este lançamento, a rede SimpleX não tinha proteção integrada de identidades de transporte de usuários - endereços IP. Como anteriormente os usuários só podiam escolher quais retransmissores de mensagens usar para receber mensagens, esses retransmissores poderiam observar os endereços IP dos remetentes e, se esses retransmissores fossem controlados pelos destinatários, os próprios destinatários também poderiam observá-los - seja modificando o código do servidor ou simplesmente rastreando todos os endereços IP conectados.
Para contornar essa limitação, muitos usuários se conectaram a retransmissores de rede SimpleX via Tor ou VPN – para que os retransmissores dos destinatários não pudessem observar os endereços IP dos usuários quando eles enviassem mensagens. Ainda assim, foi a limitação mais importante e mais criticada da rede SimpleX pelos usuários.
O que é roteamento de mensagens privadas e como funciona?
O roteamento de mensagens privadas é um marco importante para a evolução da rede SimpleX. É um novo protocolo de roteamento de mensagens que protege os endereços IP dos usuários e as sessões de transporte dos retransmissores de mensagens escolhidos por
Seus contatos. O roteamento de mensagens privadas é, efetivamente, um protocolo de roteamento cebola de 2 saltos inspirado no design do Tor, mas com uma diferença importante - o primeiro retransmissor (encaminhamento) é sempre escolhido pelo remetente da mensagem e o segundo (destino) - pelo destinatário da mensagem. Desta forma, nenhum lado da conversa pode observar o endereço IP ou a sessão de transporte do outro.
Ao mesmo tempo, os retransmissores escolhidos pelos clientes remetentes para encaminhar as mensagens não conseguem observar para quais conexões (filas de mensagens) as mensagens são enviadas, devido à camada adicional de criptografia ponta a ponta entre o remetente e o retransmissor de destino, semelhante ao funcionamento do roteamento cebola na rede Tor, e também graças ao design do protocolo que evita quaisquer identificadores repetidos ou não aleatórios associados às mensagens, que de outra forma permitiriam correlacionar as mensagens enviadas para diferentes conexões como enviadas pelo mesmo usuário. Cada mensagem encaminhada para o retransmissor de destino é adicionalmente criptografada com uma chave efêmera única, para ser independente das mensagens enviadas para diferentes conexões.
O protocolo de roteamento também evita a possibilidade de ataque MITM pelo retransmissor de encaminhamento, que fornece ao certificado as chaves de sessão do servidor de destino para o cliente remetente que são assinadas criptograficamente pelo mesmo certificado que está incluído no endereço do servidor de destino, para que o cliente possa verifique se as mensagens são enviadas para o destino pretendido e não interceptadas.
O diagrama abaixo mostra todas as camadas de criptografia usadas no roteamento de mensagens privadas: https://image.nostr.build/c238546e47b00dfea742ab1fc008ff51811240025a603dfbcc94b5bc14b5aa88.jpg
e2e - duas camadas de criptografia ponta a ponta entre clientes remetentes e receptores, uma das quais usa algoritmo de catraca dupla E2EE Post-quantum. Essas camadas de criptografia também estão presentes na versão anterior do protocolo de roteamento de mensagens.
s2d - criptografia entre o cliente remetente e o retransmissor de destino do destinatário . Essa nova camada de criptografia oculta os metadados da mensagem (endereço de conexão de destino e sinalizador de notificação de mensagem) da retransmissão de encaminhamento.
f2d - nova camada de criptografia adicional entre retransmissores de encaminhamento e destino , protegendo contra correlação de tráfego caso o TLS seja comprometido - não há identificadores ou texto cifrado em comum entre o tráfego de entrada e saída de ambos os retransmissores dentro da conexão TLS.
d2r - camada de criptografia adicional entre o retransmissor de destino e o destinatário, protegendo também da correlação de tráfego caso o TLS seja comprometido.
TLS - criptografia de transporte TLS 1.3. Para que o roteamento privado funcione, tanto a retransmissão de encaminhamento quanto a de destino devem suportar o protocolo de mensagens atualizado - ele é compatível com a versão 5.8 das retransmissões de mensagens.
https://image.nostr.build/2edbb7721c3ccf8a21274e96e25ee076c3522323870d92b73dbd1f6bda66fce8.jpg
Passo a passo do aplicativo nostr:nprofile1qqsvnx99ww0sfall7gpv2jtz4ftc9v6wevgdd7g4hh7awkpfvwlezugpzdmhxue69uhhqatjwpkx2urpvuhx2ue0chkv5c
Backup e Recuperação de Dados:
-
instalação do aplicativo.
-
Exportação do banco de dados Backup.
-
Importação do Backup do banco de dados.
-
Baixe e Instale o Aplicativo:
-
baixar o SimpleXchat no F-droid ou Obtainium.
F-droid
https://simplex.chat/fdroid/
https://f-droid.org/packages/chat.simplex.app/
Obtainium.
https://github.com/simplex-chat/simplex-chat
- Faça o download e instale o aplicativo em seu dispositivo móvel.
Criando seu perfil:
-
Criar perfil:
-
Clique em “CRIE SEU PERFIL”, contatos e mensagens são armazenados localmente em seu dispositivo.
https://image.nostr.build/e109c9fd5ea327640f0af2d6396aaa7e7d85594c6b20fd6ed426a558195a0021.jpg
-
Nome de Exibição exemplo: Alex teste :-)
-
Toque em "Criar" para configurar seu perfil e começar a usar o SimpleXchat.
https://image.nostr.build/96a1c59d370d554ada31e91301857825af7975b29eb82fe8fcb5cbba9d40bf23.jpg
-
Endereço SimpleX:
-
Clique no nome “Criar endereço SimpleX “
-
clicar em " continuar "
Ou Clicar em " Não criar endereço " pode criá-lo mais tarde.
https://image.nostr.build/cb91c0c1d43ce6c1a310cf2547cc88510529db3c2a5ce17ca79ec5d9269cb58e.jpg
https://image.nostr.build/47595ab6c17183c267fab2892a8d188b2e9fe29f067c8d96afec2ddbb9feda95.jpg
-
Notificação privadas
-
Escolha o tipo de notificação que prefere 3 opções.
Escolha a opção aberta em “ USAR BATE- PAPO “
https://image.nostr.build/96027dc0c47bdcb8a9c5017592bd6828f8e2d752883c826c08105aec340f1d81.jpg
• Backup e Recuperação de Dados:
- Cópia de segurança. “Clicar no canto superior lado esquerdo na foto de perfil“
Selecione a opção “Senha e Exportação de Banco de Dados“
https://image.nostr.build/7918c90aec373af57ccdcb1194e9277ab85aabadf83ac1d35065ec2a9f2b0aef.jpg
Desabilite a opção “O bate-papo está em execução ”
Clique em “parar”
https://image.nostr.build/8473fac2cef41d35451abcf8b40101630caf92b30f01e51767df1cc428dd8a70.jpg
https://image.nostr.build/bdd691b738712f98107c7da404d693d9cccce58c2afb89a2d6f649190e13a3e2.jpg
Seu banco de dados de bate-papo tem 4 opções.
-
Senha do banco de dados
-
Exportar banco de dados
-
Importar banco de dados
-
Excluir banco de dados
Clique na primeira opção " Senha do banco de dados "
- O Banco de Dados tem seus contatos e grupos e é protegido por sua senha que criptografa o banco de dados. Recomenda-se trocar essa senha padrão.
https://image.nostr.build/91859f269fbca9d02009652f2f9b3f76abcaa9de8647b48b5d20bee291e32ba3.jpg
Clicar na primeira opção " Senha de banco de dados "
Lembre-se de usar uma senha forte.
Após adicionar senha clique em “Atualizar senha do banco de dados”
https://image.nostr.build/3d84eb9954080589ea79050420300baa7e095f1dfc37c925ec4abf7abb047675.jpg
Vai aparecer um aviso.
Alterar senha do banco de dados? A senha de criptografia do banco de dados será atualizada e armazenada no keystore. Guarde a senha em um local seguro, você NÃO poderá alterá-la se a perder.
https://image.nostr.build/61dcdfdb82764df8855ef9e15c453b42d9c87fd23ea9e797ea066ad31f94fd61.jpg
Só clique em “Atualizar” demora 1 minuto aparece a mensagem “banco de dados criptografado!” Só clique em “ok”
https://image.nostr.build/8c303857ae63b803792f71273b4891f7adcfdbc3d0a428ecde2abbfef168781d.jpg
• Clique na opção 2.
Exportar banco de dados.
https://image.nostr.build/91859f269fbca9d02009652f2f9b3f76abcaa9de8647b48b5d20bee291e32ba3.jpg
Tem duas poções para salvar na memória do Celular, Pendrive, componentes externos de sua preferência.
-
Por padrão Vai abrir a memória do celular para salvar o arquivo backup criptografado na pasta de sua escolha.
-
Pra guardei no pendrive é necessário um cabo OTG para salvar o backup criptografado. Conecte um cabo OTG no celular, alguns celulares já confirmam automaticamente e entram diretamente na pasta do seu pendrive outros aparece um aviso pra aceitar pendrive. Depois basta selecionar o pendrive e salvar o backup.
https://image.nostr.build/c3bd4ca72270d651f4ea7125ac697cd11cb47316e4f0d18e8dfef732579ae77b.jpg
• Clique na opção
- Importar banco de dados.
https://image.nostr.build/91859f269fbca9d02009652f2f9b3f76abcaa9de8647b48b5d20bee291e32ba3.jpg
-
Caso você perca seu celular, você não tem acesso ao backup. Mas se você tiver salvo no pendrive ou componentes externos, basta seguir as etapas a seguir.
-
Faça a instalação do aplicativo e crie uma nova conta, selecione a opção "Senha e Exportação de Banco de Dados" e desabilite a opção "Chat em Execução". Isso permitirá que você faça a importação do backup.
Clique na opção Importar banco de dados.
Selecione o artigo do backup no pendrive ou na pasta dentro do novo celular só basta clicar no arquivo.
https://image.nostr.build/47cac70f4ba0520c060da98b4b3559f621757d98b4f963b1b1fd2cc522eafa45.jpg
Vai aparecer um aviso.
Importa banco de dados de Chat?
Seu banco de dados do Chat atual será EXCLUÍDO ou SUBSTITUÍDO pelo importado.
Essa ação não pode ser desfeita - Seu perfil, contatos, mensagens e arquivos serão perdidos de forma irreversível.
Só clique em "importar"
https://image.nostr.build/fdfa5e4ba2b6cd1a2b9116633da3f8a7cf91f41dd6d5739582f4e112ae384f7a.jpg
Vai aparecer um aviso.
Banco de dados de chat Importado.
Reinicie o aplicativo para usar o banco de dados do chat Importado.
Só clique em "ok"
Depois Habilite a opção "o bate-papo está parado"
https://image.nostr.build/1f261f36262d5a6cf593b5cb09abdb63ace7bf63f0e66bee7b949850972b3f92.jpg
A senha do banco de dados é necessária para abrir o Chat.
Digite a senha do seu banco de dados.
Depois é só clicar em "salvar senha e abrir Chat"
Pronto foi feita a recuperação de todos os meus dados, incluindo contatos, mensagens e grupos✅️
https://image.nostr.build/28f13ac654c68c890495cbf9689d09946b7af1ecc00a796b9ffd6d64059f4516.jpg
https://image.nostr.build/aae866f7577995bda6735e0a5e4683770bac2af845ae8b552da6526c4f589f08.jpg
Protegendo sua Privacidade no SimpleX Chat.
https://image.nostr.build/88fe0bf337105a3be94754c64bedfbe17d35c586714aa225d0179a379f9a1f71.jpg
Recentemente, tive uma experiência interessante ao explorar as opções de privacidade e segurança no SimpleX Chat. Uma funcionalidade que me chamou a atenção foi a opção de senha de auto destruição, que oferece uma camada adicional de proteção aos dados sensíveis.
Ao configurar o SimpleX Chat para usar senha de auto destruição, percebi o quão poderosa essa ferramenta pode ser para proteger minha privacidade. Após ativar essa opção, qualquer tentativa de acessar meu perfil precisa da senha escolhida por mim. E, se alguém tentasse forçar a abertura do aplicativo, eu posso simplesmente digitar a senha de auto destruição seria apresentado um perfil vazio, sem histórico de conversas. Essa função e bem útil em situações extremas.
A configuração da senha de auto destruição é simples mas poderosa.
Basta acessar as configurações de privacidade e segurança.
https://image.nostr.build/4fb6166656b544c645f316dfc4dad3b9e787b280745992dab30786b0bd0c2ee5.jpg
Aberta na opção de bloqueio SimpleX.
https://image.nostr.build/b866d08644b64884101aae6d011248a3557ac80bcc6e442ae8f62bdb3ee69776.jpg
mudar para a opção de senha. Em seguida, é possível escolher se deseja ativar a senha de auto destruição e inserir a senha desejada.
https://image.nostr.build/867d375825640721ee888e524455fb539df50be87df901dcf0ccfa19f2267576.jpg
Só basta adicionar a senha.
https://image.nostr.build/5bfb500816f814eab189283a64086ad47f32671d8e42558f3f911676ff4df741.jpg
https://image.nostr.build/59323fa6900d4f3b27b39b032f7c2cffdbf379a77c53ed9180c0ace0ca903950.jpg
Pronto. Está Ativado a senha de auto destruição.
https://image.nostr.build/511f82832d1e72d0363cfc5b7b201aaba56f65cfa00360d1c1f4d8d188bb3cdf.jpg
Uma vez configurada, a senha de auto destruição garante que todos os dados, incluindo backups, sejam eliminados permanentemente se a senha de auto destruição for inserida ao desbloquear o aplicativo.
Tenha um backup no pendrive ou em outro local guardado.
https://image.nostr.build/dfbbc5ef805194cc00a09fb690fc76896ada9a9d3f98e8b141f52c72342e2625.jpg
https://image.nostr.build/32a771a0ba2bae47f45f900fc765ffbeae0374724a1a0140c0f2cef83a2e5c2f.jpg
Essa funcionalidade oferece uma tranquilidade adicional ao utilizar o SimpleX Chat, pois sei que meus dados estão protegidos contra acesso não autorizado. Além disso, a capacidade de criar um perfil vazio para ocultar a identidade real é uma ferramenta valiosa em situações críticas , proteger meus dados sensíveis e manter minha privacidade intacta.
https://medium.com/@alexemidio/o-simplexchat-%C3%A9-uma-plataforma-de-mensagens-revolucion%C3%A1rias-que-redefinem-a-privacidade-sendo-o-4690f2a1b2d4
Podcast muito bom no @optoutpod com o criador @epoberezkin https://youtu.be/LrLsS7-woN0
Site : https://simplex.chat/
Protocolo de bate-papo: https://github.com/simplex-chat/simplex-chat/blob/stable/docs/protocol/simplex-chat.md
Whitepaper, incluindo modelagem de ameaças: https://github.com/simplex-chat/simplexmq/blob/stable/protocol/overview-tjr.md
Execute seu próprio servidor SimpleX SMP: https://github.com/simplex-chat/simplexmq
https://play.google.com/store/apps/details?id=chat.simplex.app
Como auto-hospedar servidor Simplexchat
https://youtu.be/p1NF68KIt7M?si=Nhwa8ZajmAvke6lW
https://youtu.be/p1NF68KIt7M?si=uZqOtVu0sLWLXBJX
https://simplex.chat/docs/server.html
https://github.com/simplex-chat/simplexmq
-
@ 4ba8e86d:89d32de4
2024-11-07 12:05:00SISTEMA OPERACIONAL MÓVEIS
GrapheneOS : nostr:nevent1qqs8t76evdgrg4qegdtyrq2rved63pr29wlqyj627n9tj4vlu66tqpqpzdmhxue69uhk7enxvd5xz6tw9ec82c30qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqppcqec9
CalyxOS : nostr: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
LineageOS : nostr:nevent1qqsgw7sr36gaty48cf4snw0ezg5mg4atzhqayuge752esd469p26qfgpzdmhxue69uhhwmm59e6hg7r09ehkuef0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpnvm779
SISTEMA OPERACIONAL DESKTOP
Tails : nostr:nevent1qqsf09ztvuu60g6xprazv2vxqqy5qlxjs4dkc9d36ta48q75cs9le4qpzemhxue69uhkummnw3ex2mrfw3jhxtn0wfnj7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz34ag5t
Qubes OS : nostr:nevent1qqsp6jujgwl68uvurw0cw3hfhr40xq20sj7rl3z4yzwnhp9sdpa7augpzpmhxue69uhkummnw3ezumt0d5hsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshsz9thwden5te0dehhxarj9ehhsarj9ejx2a30qyg8wumn8ghj7mn09eehgu3wvdez7qg4waehxw309aex2mrp0yhxgctdw4eju6t09uqjxamnwvaz7tmwdaehgu3dwejhy6txd9jkgtnhv4kxcmmjv3jhytnwv46z7qgwwaehxw309ahx7uewd3hkctcpremhxue69uhkummnw3ez6er9wch8wetvd3hhyer9wghxuet59uj3ljr8
Kali linux : nostr:nevent1qqswlav72xdvamuyp9xc38c6t7070l3n2uxu67ssmal2g7gv35nmvhspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswt9rxe
Whonix : nostr:nevent1qqs85gvejvzhk086lwh6edma7fv07p5c3wnwnxnzthwwntg2x6773egpydmhxue69uhkummnw3ez6an9wf5kv6t9vsh8wetvd3hhyer9wghxuet59uq3qamnwvaz7tmwdaehgu3wd4hk6tcpzemhxue69uhkummnw3ezucnrdqhxu6twdfsj7qfywaehxw309ahx7um5wgh8ymm4dej8ymmrdd3xjarrda5kuetjwvhxxmmd9uq3wamnwvaz7tmzw33ju6mvv4hxgct6w5hxxmmd9uq3qamnwvaz7tmwduh8xarj9e3hytcpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qg7waehxw309ahx7um5wgkkgetk9emk2mrvdaexgetj9ehx2ap0sen9p6
Kodachi : nostr:nevent1qqsf5zszgurpd0vwdznzk98hck294zygw0s8dah6fpd309ecpreqtrgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszgmhwden5te0dehhxarj94mx2unfve5k2epwwajkcmr0wfjx2u3wdejhgtcpremhxue69uhkummnw3ez6er9wch8wetvd3hhyer9wghxuet59uq3qamnwvaz7tmwdaehgu3wd4hk6tcpzamhxue69uhkyarr9e4kcetwv3sh5afwvdhk6tcpzpmhxue69uhkumewwd68ytnrwghszfrhwden5te0dehhxarj9eex7atwv3ex7cmtvf5hgcm0d9hx2unn9e3k7mf0qyvhwumn8ghj7mn0wd68ytnzdahxwcn0denjucm0d5hszrnhwden5te0dehhxtnvdakz7qgkwaehxw309ahx7um5wghxycmg9ehxjmn2vyhsz9mhwden5te0wfjkccte9ehx7um5wghxyctwvshs94a4d5
PGP
Openkeychain : nostr:nevent1qqs9qtjgsulp76t7jkquf8nk8txs2ftsr0qke6mjmsc2svtwfvswzyqpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs36mp0w
Kleopatra : nostr:nevent1qqspnevn932hdggvp4zam6mfyce0hmnxsp9wp8htpumq9vm3anq6etsppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpuaeghp
Pgp : nostr:nevent1qqsggek707qf3rzttextmgqhym6d4g479jdnlnj78j96y0ut0x9nemcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgptemhe
Como funciona o PGP? : nostr:nevent1qqsz9r7azc8pkvfmkg2hv0nufaexjtnvga0yl85x9hu7ptpg20gxxpspremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy259fhs
Por que eu escrevi PGP. - Philip Zimmermann.
nostr:nevent1qqsvysn94gm8prxn3jw04r0xwc6sngkskg756z48jsyrmqssvxtm7ncpzamhxue69uhhyetvv9ujumn0wd68ytnzv9hxgtchzxnad
VPN
Vpn : nostr:nevent1qqs27ltgsr6mh4ffpseexz6s37355df3zsur709d0s89u2nugpcygsspzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqshzu2fk
InviZible Pro : nostr:nevent1qqsvyevf2vld23a3xrpvarc72ndpcmfvc3lc45jej0j5kcsg36jq53cpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy33y5l4
Orbot: nostr:nevent1qqsxswkyt6pe34egxp9w70cy83h40ururj6m9sxjdmfass4cjm4495stft593
I2P
i2p : nostr:nevent1qqsvnj8n983r4knwjmnkfyum242q4c0cnd338l4z8p0m6xsmx89mxkslx0pgg
Entendendo e usando a rede I2P : nostr:nevent1qqsxchp5ycpatjf5s4ag25jkawmw6kkf64vl43vnprxdcwrpnms9qkcppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpvht4mn
Criando e acessando sua conta Email na I2P : nostr:nevent1qqs9v9dz897kh8e5lfar0dl7ljltf2fpdathsn3dkdsq7wg4ksr8xfgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpw8mzum
APLICATIVO 2FA
Aegis Authenticator : nostr:nevent1qqsfttdwcn9equlrmtf9n6wee7lqntppzm03pzdcj4cdnxel3pz44zspz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqscvtydq
YubiKey : nostr:nevent1qqstsnn69y4sf4330n7039zxm7wza3ch7sn6plhzmd57w6j9jssavtspvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzueyvgt
GERENCIADOR DE SENHAS
KeepassDX: nostr:nevent1qqswc850dr4ujvxnmpx75jauflf4arc93pqsty5pv8hxdm7lcw8ee8qpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpe0492n
Bitwaden: nostr:nevent1qqs0j5x9guk2v6xumhwqmftmcz736m9nm9wzacqwjarxmh8k4xdyzwgpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpwfe2kc
KeePassXC: nostr:nevent1qqsgftcrd8eau7tzr2p9lecuaf7z8mx5jl9w2k66ae3lzkw5wqcy5pcl2achp
CHAT MENSAGEM
SimpleXchat : nostr:nevent1qqsds5xselnnu0dyy0j49peuun72snxcgn3u55d2320n37rja9gk8lgzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgmcmj7c
Briar : nostr:nevent1qqs8rrtgvjr499hreugetrl7adkhsj2zextyfsukq5aa7wxthrgcqcg05n434
Element Messenger : nostr:nevent1qqsq05snlqtxm5cpzkshlf8n5d5rj9383vjytkvqp5gta37hpuwt4mqyccee6
Pidgin : nostr:nevent1qqsz7kngycyx7meckx53xk8ahk98jkh400usrvykh480xa4ct9zlx2c2ywvx3
E-MAIL
Thunderbird: nostr:nevent1qqspq64gg0nw7t60zsvea5eykgrm43paz845e4jn74muw5qzdvve7uqrkwtjh
ProtonMail : nostr:nevent1qqs908glhk68e7ms8zqtlsqd00wu3prnpt08dwre26hd6e5fhqdw99cppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpeyhg4z
Tutonota : nostr:nevent1qqswtzh9zjxfey644qy4jsdh9465qcqd2wefx0jxa54gdckxjvkrrmqpz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs5hzhkv
k-9 mail : nostr:nevent1qqs200g5a603y7utjgjk320r3srurrc4r66nv93mcg0x9umrw52ku5gpr3mhxue69uhkummnw3ezuumhd9ehxtt9de5kwmtp9e3kstczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgacflak
E-MAIL-ALIÁS
Simplelogin : nostr:nevent1qqsvhz5pxqpqzr2ptanqyqgsjr50v7u9lc083fvdnglhrv36rnceppcppemhxue69uhkummn9ekx7mp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqp9gsr7m
AnonAddy : nostr:nevent1qqs9mcth70mkq2z25ws634qfn7vx2mlva3tkllayxergw0s7p8d3ggcpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs6mawe3
NAVEGADOR
Navegador Tor : nostr:nevent1qqs06qfxy7wzqmk76l5d8vwyg6mvcye864xla5up52fy5sptcdy39lspzemhxue69uhkummnw3ezuerpw3sju6rpw4ej7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdp0urw
Mullvap Browser : nostr:nevent1qqs2vsgc3wk09wdspv2mezltgg7nfdg97g0a0m5cmvkvr4nrfxluzfcpzdmhxue69uhhwmm59e6hg7r09ehkuef0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpj8h6fe
LibreWolf : nostr:nevent1qqswv05mlmkcuvwhe8x3u5f0kgwzug7n2ltm68fr3j06xy9qalxwq2cpzemhxue69uhkummnw3ex2mrfw3jhxtn0wfnj7q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzuv2hxr
Cromite : nostr:nevent1qqs2ut83arlu735xp8jf87w5m3vykl4lv5nwkhldkqwu3l86khzzy4cpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs3dplt7
BUSCADORES
Searx : nostr:nevent1qqsxyzpvgzx00n50nrlgctmy497vkm2cm8dd5pdp7fmw6uh8xnxdmaspr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqp23z7ax
APP-STORE
Obtainium : nostr:nevent1qqstd8kzc5w3t2v6dgf36z0qrruufzfgnc53rj88zcjgsagj5c5k4rgpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqyarmca3
F-Droid : nostr:nevent1qqst4kry49cc9g3g8s5gdnpgyk3gjte079jdnv43f0x4e85cjkxzjesymzuu4
Droid-ify : nostr:nevent1qqsrr8yu9luq0gud902erdh8gw2lfunpe93uc2u6g8rh9ep7wt3v4sgpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsfzu9vk
Aurora Store : nostr:nevent1qqsy69kcaf0zkcg0qnu90mtk46ly3p2jplgpzgk62wzspjqjft4fpjgpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzrpmsjy
RSS
Feeder : nostr:nevent1qqsy29aeggpkmrc7t3c7y7ldgda7pszl7c8hh9zux80gjzrfvlhfhwqpp4mhxue69uhkummn9ekx7mqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgsvzzjy
VIDEOO CONFERENCIA
Jitsi meet : nostr:nevent1qqswphw67hr6qmt2fpugcj77jrk7qkfdrszum7vw7n2cu6cx4r6sh4cgkderr
TECLADOS
HeliBoard : nostr:nevent1qqsyqpc4d28rje03dcvshv4xserftahhpeylu2ez2jutdxwds4e8syspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsr8mel5
OpenBoard : nostr:nevent1qqsf7zqkup03yysy67y43nj48q53sr6yym38es655fh9fp6nxpl7rqspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswcvh3r
FlorisBoard : nostr:nevent1qqsf7zqkup03yysy67y43nj48q53sr6yym38es655fh9fp6nxpl7rqspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqswcvh3r
MAPAS
Osmand : nostr:nevent1qqsxryp2ywj64az7n5p6jq5tn3tx5jv05te48dtmmt3lf94ydtgy4fgpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs54nwpj
Organic maps : nostr:nevent1qqstrecuuzkw0dyusxdq7cuwju0ftskl7anx978s5dyn4pnldrkckzqpr4mhxue69uhkummnw3ezumtp0p5k6ctrd96xzer9dshx7un8qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpl8z3kk
TRADUÇÃO
LibreTranslate : nostr:nevent1qqs953g3rhf0m8jh59204uskzz56em9xdrjkelv4wnkr07huk20442cpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzeqsx40
REMOÇÃO DOS METADADOS
Scrambled Exif : nostr:nevent1qqs2658t702xv66p000y4mlhnvadmdxwzzfzcjkjf7kedrclr3ej7aspyfmhxue69uhk6atvw35hqmr90pjhytngw4eh5mmwv4nhjtnhdaexcep0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpguu0wh
ESTEGANOGRAFIA
PixelKnot: nostr:nevent1qqsrh0yh9mg0lx86t5wcmhh97wm6n4v0radh6sd0554ugn354wqdj8gpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqyuvfqdp
PERFIL DE TRABALHO
Shelter : nostr:nevent1qqspv9xxkmfp40cxgjuyfsyczndzmpnl83e7gugm7480mp9zhv50wkqpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdnu59c
PDF
MuPDF : nostr:nevent1qqspn5lhe0dteys6npsrntmv2g470st8kh8p7hxxgmymqa95ejvxvfcpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs4hvhvj
Librera Reader : nostr:nevent1qqsg60flpuf00sash48fexvwxkly2j5z9wjvjrzt883t3eqng293f3cpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz39tt3n
QR-Code
Binary Eye : nostr:nevent1qqsz4n0uxxx3q5m0r42n9key3hchtwyp73hgh8l958rtmae5u2khgpgpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzdmn4wp
Climático
Breezy Weather : nostr:nevent1qqs9hjz5cz0y4am3kj33xn536uq85ydva775eqrml52mtnnpe898rzspzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgpd3tu8
ENCRYPTS
Cryptomator : nostr:nevent1qqsvchvnw779m20583llgg5nlu6ph5psewetlczfac5vgw83ydmfndspzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsx7ppw9
VeraCrypt : nostr:nevent1qqsf6wzedsnrgq6hjk5c4jj66dxnplqwc4ygr46l8z3gfh38q2fdlwgm65ej3
EXTENSÕES
uBlock Origin : nostr:nevent1qqswaa666lcj2c4nhnea8u4agjtu4l8q89xjln0yrngj7ssh72ntwzql8ssdj
Snowflake : nostr:nevent1qqs0ws74zlt8uced3p2vee9td8x7vln2mkacp8szdufvs2ed94ctnwchce008
CLOUD
Nextcloud : nostr:nevent1qqs2utg5z9htegdtrnllreuhypkk2026x8a0xdsmfczg9wdl8rgrcgg9nhgnm
NOTEPAD
Joplin : nostr:nevent1qqsz2a0laecpelsznser3xd0jfa6ch2vpxtkx6vm6qg24e78xttpk0cpr4mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmp0qgsyh28gd5ke0ztdeyehc0jsq6gcj0tnzatjlkql3dqamkja38fjmeqrqsqqqqqpdu0hft
Standard Notes : nostr:nevent1qqsv3596kz3qung5v23cjc4cpq7rqxg08y36rmzgcrvw5whtme83y3s7tng6r
MÚSICA
RiMusic : nostr:nevent1qqsv3genqav2tfjllp86ust4umxm8tr2wd9kq8x7vrjq6ssp363mn0gpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqg42353n
ViMusic : nostr:nevent1qqswx78559l4jsxsrygd8kj32sch4qu57stxq0z6twwl450vp39pdqqpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzjg863j
PODCAST
AntennaPod : nostr:nevent1qqsp4nh7k4a6zymfwqqdlxuz8ua6kdhvgeeh3uxf2c9rtp9u3e9ku8qnr8lmy
VISUALIZAR VIDEO
VLC : nostr:nevent1qqs0lz56wtlr2eye4ajs2gzn2r0dscw4y66wezhx0mue6dffth8zugcl9laky
YOUTUBE
NewPipe : nostr:nevent1qqsdg06qpcjdnlvgm4xzqdap0dgjrkjewhmh4j3v4mxdl4rjh8768mgdw9uln
FreeTube : nostr:nevent1qqsz6y6z7ze5gs56s8seaws8v6m6j2zu0pxa955dhq3ythmexak38mcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqs5lkjvv
LibreTube : nostr:nevent1qqstmd5m6wrdvn4gxf8xyhrwnlyaxmr89c9kjddvnvux6603f84t3fqpz4mhxue69uhhyetvv9ujumt0wd68ytnsw43qygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsswwznc
COMPARTILHAMENTO DE ARQUIVOS
OnionShare : nostr:nevent1qqsr0a4ml5nu6ud5k9yzyawcd9arznnwkrc27dzzc95q6r50xmdff6qpydmhxue69uhkummnw3ez6an9wf5kv6t9vsh8wetvd3hhyer9wghxuet59uq3uamnwvaz7tmwdaehgu3dv3jhvtnhv4kxcmmjv3jhytnwv46z7qgswaehxw309ahx7tnnw3ezucmj9uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcpzamhxue69uhkyarr9e4kcetwv3sh5afwvdhk6tcpzemhxue69uhkummnw3ezucnrdqhxu6twdfsj7qgswaehxw309ahx7um5wghx6mmd9uqjgamnwvaz7tmwdaehgu3wwfhh2mnywfhkx6mzd96xxmmfdejhyuewvdhk6tcppemhxue69uhkummn9ekx7mp0qythwumn8ghj7un9d3shjtnwdaehgu3wvfskuep0qyv8wumn8ghj7un9d3shjtnrw4e8yetwwshxv7tf9ut7qurt
Localsend : nostr:nevent1qqsp8ldjhrxm09cvvcak20hrc0g8qju9f67pw7rxr2y3euyggw9284gpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzuyghqr
Wallet Bitcoin
Ashigaru Wallet : nostr:nevent1qqstx9fz8kf24wgl26un8usxwsqjvuec9f8q392llmga75tw0kfarfcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgvfsrqp
Samourai Wallet : nostr:nevent1qqstcvjmz39rmrnrv7t5cl6p3x7pzj6jsspyh4s4vcwd2lugmre04ecpr9mhxue69uhkummnw3ezucn0denkymmwvuhxxmmd9upzqjagapkjm9ufdhynxlp72qrfrzfawvt4wt7cr795rhw6tkyaxt0yqvzqqqqqqy3rg4qs
CÂMERA
opencamera : nostr:nevent1qqs25glp6dh0crrjutxrgdjlnx9gtqpjtrkg29hlf7382aeyjd77jlqpzpmhxue69uhkumewwd68ytnrwghsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqssxcvgc
OFFICE
Collabora Office : nostr:nevent1qqs8yn4ys6adpmeu3edmf580jhc3wluvlf823cc4ft4h0uqmfzdf99qpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsj40uss
TEXTOS
O manifesto de um Cypherpunk : nostr:nevent1qqsd7hdlg6galn5mcuv3pm3ryfjxc4tkyph0cfqqe4du4dr4z8amqyspvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqzal0efa
Operations security ( OPSEC) : nostr:nevent1qqsp323havh3y9nxzd4qmm60hw87tm9gjns0mtzg8y309uf9mv85cqcpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz8ej9l7
O MANIFESTO CRIPTOANARQUISTA Timothy C. May – 1992. : nostr:nevent1qqspp480wtyx2zhtwpu5gptrl8duv9rvq3mug85mp4d54qzywk3zq9gpvemhxue69uhkv6tvw3jhytnwdaehgu3wwa5kuef0dec82c330g6x6dm8ddmxzdne0pnhverevdkxxdm6wqc8v735w3snquejvsuk56pcvuurxaesxd68qdtkv3nrx6m6v3ehsctwvym8q0mzwfhkzerrv9ehg0t5wf6k2q3qfw5wsmfdj7ykmjfn0sl9qp533y7hx96h9lvplz6pmhd9mzwn9hjqxpqqqqqqz5wq496
Declaração de independência do ciberespaço
- John Perry Barlow - 1996 : nostr:nevent1qqs2njsy44n6p07mhgt2tnragvchasv386nf20ua5wklxqpttf6mzuqpzpmhxue69uhkummnw3ezumt0d5hsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsukg4hr
The Cyphernomicon: Criptografia, Dinheiro Digital e o Futuro da Privacidade. escrito por Timothy C. May -Publicado em 1994. :
Livro completo em PDF no Github PrivacyOpenSource.
https://github.com/Alexemidio/PrivacyOpenSource/raw/main/Livros/THE%20CYPHERNOMICON%20.pdf Share
-
@ 9ca8f9b2:70031a71
2024-11-07 09:43:51Opinion about Phoenix Wallet (iphone)
Personally, I love this App! The developers of this app have worked so hard over the years to make the UI of this app as simple and smoothe as it can possibly be as a non custodial wallet.
WalletScrutiny #nostrOpinion
-
@ a012dc82:6458a70d
2024-11-07 08:55:21Table Of Content
-
Unveiling Bitcoin's Legacy Amid Debt Ceiling Debates
-
Bitcoin's Decentralized Nature
-
Bitcoin as a Store of Value
-
Bitcoin's Role in International Remittances
-
Regulatory Challenges and Opportunities
-
Bitcoin and Financial Inclusion
-
Conclusion
-
FAQ
In today's fast-paced digital age, cryptocurrencies have taken the world by storm. Among them, Bitcoin stands tall as the pioneer and most prominent cryptocurrency. As financial systems evolve and debt ceiling debates continue to shape economic policies, it is crucial to examine the legacy of Bitcoin and its impact on the financial landscape. This article aims to delve into the intricacies of Bitcoin's legacy and how it intertwines with the ongoing discussions surrounding debt ceilings. By exploring the factors contributing to the money in motion phenomenon and understanding the role of Bitcoin, we can gain valuable insights into the future of finance.
Unveiling Bitcoin's Legacy Amid Debt Ceiling Debates
The concept of money in motion refers to the dynamic nature of funds circulating within an economy. It encompasses various financial transactions, investments, and movements that shape economic activities. When exploring the legacy of Bitcoin amid debt ceiling debates, it is essential to recognize the unique characteristics that set it apart from traditional currencies.
Bitcoin's Decentralized Nature
One of the key aspects that define Bitcoin's legacy is its decentralized nature. Unlike traditional currencies that are controlled by central banks and governments, Bitcoin operates on a decentralized network known as blockchain. This decentralized structure provides several advantages, including enhanced security, transparency, and the ability to bypass traditional financial intermediaries. As debt ceiling debates raise concerns about the stability of traditional financial systems, Bitcoin's decentralized nature offers a potential solution to mitigate these risks.
Bitcoin as a Store of Value
Bitcoin's emergence as a store of value has been instrumental in shaping its legacy. With a limited supply capped at 21 million coins, Bitcoin exhibits scarcity, making it an attractive option for individuals seeking to preserve their wealth. Amid debt ceiling debates, where economic uncertainties prevail, Bitcoin's status as a decentralized store of value becomes even more appealing. Investors can hedge against inflation and potential economic downturns by allocating a portion of their portfolio to Bitcoin.
Bitcoin's Role in International Remittances
Remittances, the act of sending money across borders, play a significant role in global economies. Traditional remittance channels often involve hefty fees and slow transaction times. Bitcoin has emerged as a viable alternative, offering faster, more cost-effective international transfers. By utilizing Bitcoin's decentralized network, individuals can send and receive funds with reduced friction, bypassing intermediaries and lowering transaction costs. In the context of debt ceiling debates, Bitcoin's role in facilitating seamless cross-border transactions becomes increasingly relevant.
Regulatory Challenges and Opportunities
Bitcoin's legacy also includes its interaction with regulatory frameworks worldwide. As cryptocurrencies gained popularity, governments and regulatory bodies have been grappling with how to incorporate them into existing financial systems. Debt ceiling debates often shed light on the need for effective regulations to address economic challenges. While regulations can provide stability and protect consumers, they should also foster innovation and maintain the core principles of decentralization that define cryptocurrencies like Bitcoin. Striking the right balance is crucial to harnessing the potential benefits of cryptocurrencies while mitigating risks.
Bitcoin and Financial Inclusion
Financial inclusion, the accessibility and availability of financial services to individuals and businesses, remains a pressing global challenge. Bitcoin's legacy intertwines with the pursuit of financial inclusion by providing an alternative financial system that is accessible to anyone with an internet connection. This opens up opportunities for the unbanked and underbanked populations to participate in economic activities and access financial services. Amid debt ceiling debates, where financial systems' stability is under scrutiny, Bitcoin's potential to foster financial inclusion gains even greater significance.
Conclusion
The legacy of Bitcoin amid debt ceiling debates encompasses its decentralized nature, role as a store of value, facilitation of international remittances, interaction with regulatory frameworks, and potential for financial inclusion. As the world grapples with economic uncertainties, Bitcoin's unique characteristics offer solutions and opportunities for individuals and the financial system as a whole. By embracing the potential of cryptocurrencies like Bitcoin, we can pave the way for a more inclusive, efficient, and resilient financial future.
FAQ
What is Bitcoin's role in the legacy of money in motion amid debt ceiling debates? Bitcoin plays a significant role in the legacy of money in motion amid debt ceiling debates. Its decentralized nature, ability to serve as a store of value, facilitation of international remittances, and interaction with regulatory frameworks all contribute to shaping the future of finance in the midst of these discussions.
How does Bitcoin's decentralized nature impact its legacy amid debt ceiling debates? Bitcoin's decentralized nature ensures that it is not subject to the control of central banks or governments. This characteristic provides a potential solution to the risks associated with debt ceiling debates and offers enhanced security, transparency, and the ability to bypass traditional financial intermediaries.
Why is Bitcoin considered a store of value amid debt ceiling debates? Bitcoin's limited supply and scarcity make it an attractive option for individuals seeking to preserve their wealth amid debt ceiling debates. As economic uncertainties prevail, Bitcoin's status as a decentralized store of value provides a hedge against inflation and potential economic downturns.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-