-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-20 13:49:55Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
Conclusion of the Technical Debate
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
Conclusion of the Debate
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
Summary of Consequences
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 349d6b82:12b2a5b1
2024-11-21 15:35:49Наши отечественные ученные наконец доработали и внедрили первого Android-учителя в учебный процесс у школьников 11 класса в школе МАОУ СОШ№27 - это весьма значимый шаг в области образования и технологий.
Цели и задачи, которые поставили ученные для робота-андроида, - это повышение эффективности обучения и индивидуализации образовательного процесса. Это позволит адаптировать учебные материалы под нужды каждого ученика, учитывая их уровень подготовки и интересы.
Технологические особенности Android-учителя представляют собой интерактивное устройство, которое может выполнять функции преподавателя, предоставляя доступ к учебным материалам, организуя тестирование и обеспечивая обратную связь. Это устройство интегрирует различные образовательные приложения, что способствует более глубокому пониманию учебного материала.
В реализацию этого проекта также входит использование специальных планшетов или других мобильных устройств, на которых установлено программное обеспечение для взаимодействия с Android-учителем. Вскоре все это будет выдано всему рабочему персоналу школы.
Для успешной интеграции этой технологии в учебный процесс - будут проводиться обучения для педагогов, чтобы они могли эффективно использовать новые инструменты и технологии в своей работе. Это обучение включает в себя как технические аспекты, так и методические рекомендации по использованию Android-учителя в классе.
Правительством ожидается, что внедрение Android-учителя приведет к повышению мотивации учащихся, улучшению успеваемости и более активному участию школьников в учебном процессе. Кроме того, такая технология может помочь в подготовке учащихся к будущей профессиональной деятельности, где цифровые навыки играют важную роль для будущего нашего города.
Во избежание неблагоприятных инцидентов, подобных как на Надеждинском Металлургическом Заводе, ученные установили на поздних доработках специальный электрочип, который обеспечит полное выключение андроида, если вдруг произойдет сбой его программы.
-
@ f8a5df57:b7a58cd4
2024-11-21 15:26:06Содержание сюжета:
Московские учёные Дмитрий Соколов и Александр Белкин создали инновационную космическую капсулу, которая обладает рядом уникальных характеристик и возможностей. Эта капсула предназначена для безопасного возвращения астронавтов на Землю после длительных космических миссий.
Одной из ключевых особенностей капсулы является её способность к автоматической посадке. Благодаря этой функции, астронавты смогут приземляться без необходимости использования дополнительных средств или участия специалистов на Земле.
Кроме того, капсула оснащена системой активного теплообмена, которая позволяет поддерживать оптимальную температуру внутри капсулы во время полёта и при посадке. Это обеспечивает комфортные условия для астронавтов и снижает риск возникновения проблем со здоровьем.
Разработка московских учёных также включает в себя систему аварийного спасения, которая активируется в случае возникновения нештатных ситуаций в космосе. Это гарантирует безопасность астронавтов даже в самых сложных обстоятельствах.
Ожидается, что использование инновационной космической капсулы позволит значительно повысить безопасность и эффективность космических полётов, а также расширить возможности исследования космоса.
Автор: Дарья Воронина
-
@ ac8bb9b0:70278acc
2024-11-21 15:14:11Chef's notes
If you’d like to make this soup part of your rotation and want to shave off a little time for the next time around, double the recipe for the meatballs and freeze half. That way, all you’ll have to do is make the soup and add the meatballs as directed in the recipe. (They may take a few extra minutes to warm through if you add them directly from the freezer.)
The soup can be frozen for up to 3 months but wait until you reheat the soup to add the pasta. Defrost the soup in the refrigerator for 12 hours and then reheat it on the stovetop over medium heat until simmering, add the pasta, and cook until the pasta is tender.
Details
- ⏲️ Prep time: 50
- 🍳 Cook time: 30
- 🍽️ Servings: 8
Ingredients
- 1 large egg
- 3 tablespoons finely chopped fresh chives
- 2 teaspoons finely chopped fresh sage
- 2 cloves garlic, minced
- ¾ lb 85 or 90% lean ground beef
- ½ lb sweet or hot Italian sausage, removed from the casings
- ½ cup grated Parmigiano Reggiano
- ⅓ cup Italian seasoned bread crumbs
- ¼ teaspoon salt
- 2 tablespoons extra virgin olive oil
- 1 medium yellow onion, diced
- 2 large carrots, diced
- 2 stalks celery, diced
- 6 cups high-quality chicken broth
- 2 cups high-quality beef broth
- 2 cups water
- ½ cup dry white wine
- 1 bay leaf
- ½ teaspoon salt
- ¼ teaspoon white pepper (okay to use black pepper)
- 1 cup small dittalini pasta
- 4 oz fresh spinach, stems trimmed and roughly chopped (once prepped, you should have about 3 packed cups)
- Parmigiano Reggiano, for serving
Directions
- Make the meatballs: Preheat the oven to 350°F. Line a baking sheet with aluminum foil and set an oven-proof roasting rack over top. Spray the rack generously with nonstick cooking spray.
- In a large bowl, beat the egg with the chives, sage and garlic. Add the remaining meatball ingredients and mash with your hands until evenly combined. Roll the mixture into tablespoon-size balls, about 1 inch in diameter (it will make approximately 50 meatballs), and place on the prepared rack. Bake for 15 to 18 minutes, or until lightly browned and cooked through. Set aside.
- Meanwhile, start the soup. In a large soup pot or Dutch oven over medium heat, heat the olive oil. Add the onions, carrots, and celery and cook, stirring frequently, until the vegetables are softened, about 8 minutes. Add the chicken broth, beef broth, water, wine, bay leaf, salt and pepper and bring to a boil. Add the pasta and cook, uncovered, at a gentle boil until the pasta is al dente, 8 to 10 minutes (or according to package directions). Taste the soup and adjust the seasoning, if necessary. Reduce the heat to low and add the spinach and meatballs. Simmer for a few minutes, until the spinach is wilted and the meatballs are warmed through. Ladle into bowls and serve with grated Parmigiano Reggiano.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ f8a5df57:b7a58cd4
2024-11-21 12:26:23В преддверии проведения Петербургского международного экономического форума - 2041 , в котором примут участие наши ведущие экономисты Москвы, коллектив редакции "Москва информ" решил провести анализ экономики города за 2040 год:
-
Москва стала важным хабом для стартапов и технологических компаний. Сильная поддержка со стороны правительства в виде инвестиций в научные исследования и разработки, а также создание специализированных технопарков и инкубаторов способствовали росту сектора высоких технологий. Искусственный интеллект, биотехнологии и зеленые технологии стали основными драйверами экономического роста.
-
Город активно внедряет концепции устойчивого развития, что включает в себя проекты по улучшению городской инфраструктуры, экологии и общественного транспорта. Экологические инициативы, такие как переход на возобновляемые источники энергии и программы по снижению выбросов углерода, положительно сказываются на качестве жизни и создают новые рабочие места.
-
Культура и туризм стали важными секторами экономики. Москва привлекает миллионы туристов благодаря своим историческим достопримечательностям, культурным мероприятиям и фестивалям. Развитие туристической инфраструктуры, включая отели, транспорт и услуги, создает новые рабочие места и способствует экономическому росту.
-
Образование и кадры. Качество образования в Москве значительно возросло благодаря реформам в системе образования и активному сотрудничеству с международными учебными заведениями. Подготовка квалифицированных кадров для различных секторов экономики стала приоритетом, что способствует повышению конкурентоспособности города на глобальной арене.
Рост экономики Москвы в 2040 году — это результат комплексного подхода к развитию, основанного на инновациях, устойчивом развитии, международном сотрудничестве и высоком качестве жизни. Глядя в будущее, Москва продолжает стремиться к новым достижениям, укрепляя свои позиции как один из ведущих мировых мегаполисов.
Автор: Рината Ситникова
-
-
@ f8a5df57:b7a58cd4
2024-11-21 12:12:32На пересечении искусства и технологий в столице России появился первый в своем роде "Театр будущего", где актеры — это не люди, а высокотехнологичные машины. Этот проект стал настоящей революцией в мире сценического искусства и привлек внимание зрителей со всего мира. Роботы-актеры способны не только воспроизводить текст, но и имитировать эмоции, движения и даже взаимодействовать с публикой. Каждое представление — это захватывающее зрелище, где сливаются современные технологии, искусственный интеллект и театральное мастерство. Создатель театра - режиссер-постановщик Александр Иванов уверен, что такой формат не только расширяет границы искусства, но и открывает новые горизонты для творчества. Первые отзывы зрителей уже поступили, и они полны восторга! Многие отмечают, что роботы-актеры привносят в спектакли особую атмосферу и оригинальность. Не упустите возможность стать частью этого исторического события! Приходите в новый театр и убедитесь сами, что будущее уже здесь! 🎉🤩
ТеатрБудущего #РоботыАктеры #Москва #ИскусствоИтехнологии
Автор: Рината Ситникова
-
@ a39d19ec:3d88f61e
2024-11-21 12:05:09A state-controlled money supply can influence the development of socialist policies and practices in various ways. Although the relationship is not deterministic, state control over the money supply can contribute to a larger role of the state in the economy and facilitate the implementation of socialist ideals.
Fiscal Policy Capabilities
When the state manages the money supply, it gains the ability to implement fiscal policies that can lead to an expansion of social programs and welfare initiatives. Funding these programs by creating money can enhance the state's influence over the economy and move it closer to a socialist model. The Soviet Union, for instance, had a centralized banking system that enabled the state to fund massive industrialization and social programs, significantly expanding the state's role in the economy.
Wealth Redistribution
Controlling the money supply can also allow the state to influence economic inequality through monetary policies, effectively redistributing wealth and reducing income disparities. By implementing low-interest loans or providing financial assistance to disadvantaged groups, the state can narrow the wealth gap and promote social equality, as seen in many European welfare states.
Central Planning
A state-controlled money supply can contribute to increased central planning, as the state gains more influence over the economy. Central banks, which are state-owned or heavily influenced by the state, play a crucial role in managing the money supply and facilitating central planning. This aligns with socialist principles that advocate for a planned economy where resources are allocated according to social needs rather than market forces.
Incentives for Staff
Staff members working in state institutions responsible for managing the money supply have various incentives to keep the system going. These incentives include job security, professional expertise and reputation, political alignment, regulatory capture, institutional inertia, and legal and administrative barriers. While these factors can differ among individuals, they can collectively contribute to the persistence of a state-controlled money supply system.
In conclusion, a state-controlled money supply can facilitate the development of socialist policies and practices by enabling fiscal policies, wealth redistribution, and central planning. The staff responsible for managing the money supply have diverse incentives to maintain the system, further ensuring its continuation. However, it is essential to note that many factors influence the trajectory of an economic system, and the relationship between state control over the money supply and socialism is not inevitable.
-
@ 07804b78:c375c543
2024-11-21 11:37:37Chef's notes
- The Premium Juku Curry comes individually packaged in single-serving portions, so it's convenient for using small amounts like in this recipe.
- Use your favorite spicy level of hot bean-curd soup base/curry roux.
Details
- 🍽️ Servings: 4
Ingredients
- 1 box of “Cook Do®” (Chinese seasoning mix) for Szechuan-style Mapo Tofu
- 2 servings of Premium Juku Curry
- 500g tofu
- 400g cut tomatoes
- 200g minced meat
- 80g garlic sprouts
- 100ml water
- 1 tablespoon sesame oil
- Cooked rice, enough for the number of people
Directions
- Slice the garlic shoots diagonally into 3-4cm pieces. Cut the tofu into bite-sized pieces.
- Heat the sesame oil in a frying pan and fry the minced meat over a medium heat.
- When the meat is about 80% cooked, add the garlic shoots and continue to fry, stirring, until the meat is fully cooked.
- Turn off the heat and add the Cook Do® Sichuan-style Mapo Tofu seasoning, and mix well.
- Turn the heat back on to medium, add the cut tomatoes and water, and bring to the boil, stirring gently.
- When it comes to a boil, turn the heat down to low, add the Premium Juku Curry, and stir well to dissolve.
- Once the curry has dissolved, add the tofu and cook until the tofu is warmed through.
-
@ 8d5ba92c:c6c3ecd5
2024-11-21 11:07:37Looks like I need to add proper kids' socks to my designs 😋. Though my little guests didn’t mind the larger sizing, either! We Are All Satoshi.
https://i.nostr.build/qhzhGmidYjxDNVrp.jpg
TLDR: I started producing Bitcoin/Nostr-themed socks to help orange-pill people, to remind us of one of the first companies to accept Bitcoin back in 2011, and to bring smiles to people's faces. (More details can be found in the article on Habla News "Bitcoin ZOO + The Story of My Wardrobe!")
https://i.nostr.build/pChpYJzHtlWgOMfz.jpg
Until Adopting Bitcoin 2024, I hadn’t considered that kids might love them too. But during Bitcoin Para Niños, some amazing young participants noticed my bag full of designs. Among all the options, they chose the orange-and-blue "We Are All Satoshi" socks. Coincidence? Maybe 😋...
https://i.nostr.build/TXhI4g32RMCoVg4v.jpg
They didn’t mind the adult sizing and put them on immediately, which looked especially hilarious on the tiniest kids 😂
https://i.nostr.build/KT3FYbrxglHUvdD7.jpg
**This reminded me once again that kids are honest and curious in their choices. They don’t let small obstacles stop them and act with the purity of their hearts. ** 🧡⚡
https://i.nostr.build/DYWy3AfCUSVIKNfD.jpg
-
@ b17c5987:85d68928
2024-11-21 10:24:16Our nation was founded on the basic idea that the people we elect run the government. That isn’t how America functions today. Most legal edicts aren’t laws enacted by Congress but “rules and regulations” promulgated by unelected bureaucrats—tens of thousands of them each year. Most government enforcement decisions and discretionary expenditures aren’t made by the democratically elected president or even his political appointees but by millions of unelected, unappointed civil servants within government agencies who view themselves as immune from firing thanks to civil-service protections.
Our nation was founded on the basic idea that the people we elect run the government. That isn’t how America functions today. Most legal edicts aren’t laws enacted by Congress but “rules and regulations” promulgated by unelected bureaucrats—tens of thousands of them each year. Most government enforcement decisions and discretionary expenditures aren’t made by the democratically elected president or even his political appointees but by millions of unelected, unappointed civil servants within government agencies who view themselves as immune from firing thanks to civil-service protections.
This is antidemocratic and antithetical to the Founders’ vision. It imposes massive direct and indirect costs on taxpayers. Thankfully, we have a historic opportunity to solve the problem. On Nov. 5, voters decisively elected Donald Trump with a mandate for sweeping change, and they deserve to get it.
President Trump has asked the two of us to lead a newly formed Department of Government Efficiency, or DOGE, to cut the federal government down to size. The entrenched and ever-growing bureaucracy represents an existential threat to our republic, and politicians have abetted it for too long. That’s why we’re doing things differently. We are entrepreneurs, not politicians. We will serve as outside volunteers, not federal officials or employees. Unlike government commissions or advisory committees, we won’t just write reports or cut ribbons. We’ll cut costs.
This is antidemocratic and antithetical to the Founders’ vision. It imposes massive direct and indirect costs on taxpayers. Thankfully, we have a historic opportunity to solve the problem. On Nov. 5, voters decisively elected Donald Trump with a mandate for sweeping change, and they deserve to get it.
President Trump has asked the two of us to lead a newly formed Department of Government Efficiency, or DOGE, to cut the federal government down to size. The entrenched and ever-growing bureaucracy represents an existential threat to our republic, and politicians have abetted it for too long. That’s why we’re doing things differently. We are entrepreneurs, not politicians. We will serve as outside volunteers, not federal officials or employees. Unlike government commissions or advisory committees, we won’t just write reports or cut ribbons. We’ll cut costs.
We are assisting the Trump transition team to identify and hire a lean team of small-government crusaders, including some of the sharpest technical and legal minds in America. This team will work in the new administration closely with the White House Office of Management and Budget. The two of us will advise DOGE at every step to pursue three major kinds of reform: regulatory rescissions, administrative reductions and cost savings. We will focus particularly on driving change through executive action based on existing legislation rather than by passing new laws. Our North Star for reform will be the U.S. Constitution, with a focus on two critical Supreme Court rulings issued during President Biden’s tenure.
In West Virginia v. Environmental Protection Agency (2022), the justices held that agencies can’t impose regulations dealing with major economic or policy questions unless Congress specifically authorizes them to do so. In Loper Bright v. Raimondo (2024), the court overturned the Chevron doctrine and held that federal courts should no longer defer to federal agencies’ interpretations of the law or their own rulemaking authority. Together, these cases suggest that a plethora of current federal regulations exceed the authority Congress has granted under the law.
DOGE will work with legal experts embedded in government agencies, aided by advanced technology, to apply these rulings to federal regulations enacted by such agencies. DOGE will present this list of regulations to President Trump, who can, by executive action, immediately pause the enforcement of those regulations and initiate the process for review and rescission. This would liberate individuals and businesses from illicit regulations never passed by Congress and stimulate the U.S. economy.
When the president nullifies thousands of such regulations, critics will allege executive overreach. In fact, it will be correcting the executive overreach of thousands of regulations promulgated by administrative fiat that were never authorized by Congress. The president owes lawmaking deference to Congress, not to bureaucrats deep within federal agencies. The use of executive orders to substitute for lawmaking by adding burdensome new rules is a constitutional affront, but the use of executive orders to roll back regulations that wrongly bypassed Congress is legitimate and necessary to comply with the Supreme Court’s recent mandates. And after those regulations are fully rescinded, a future president couldn’t simply flip the switch and revive them but would instead have to ask Congress to do so.
A drastic reduction in federal regulations provides sound industrial logic for mass head-count reductions across the federal bureaucracy. DOGE intends to work with embedded appointees in agencies to identify the minimum number of employees required at an agency for it to perform its constitutionally permissible and statutorily mandated functions. The number of federal employees to cut should be at least proportionate to the number of federal regulations that are nullified: Not only are fewer employees required to enforce fewer regulations, but the agency would produce fewer regulations once its scope of authority is properly limited. Employees whose positions are eliminated deserve to be treated with respect, and DOGE’s goal is to help support their transition into the private sector. The president can use existing laws to give them incentives for early retirement and to make voluntary severance payments to facilitate a graceful exit.
Conventional wisdom holds that statutory civil-service protections stop the president or even his political appointees from firing federal workers. The purpose of these protections is to protect employees from political retaliation. But the statute allows for “reductions in force” that don’t target specific employees. The statute further empowers the president to “prescribe rules governing the competitive service.” That power is broad. Previous presidents have used it to amend the civil service rules by executive order, and the Supreme Court has held—in Franklin v. Massachusetts (1992) and Collins v. Yellen (2021) that they weren’t constrained by the Administrative Procedures Act when they did so. With this authority, Mr. Trump can implement any number of “rules governing the competitive service” that would curtail administrative overgrowth, from large-scale firings to relocation of federal agencies out of the Washington area. Requiring federal employees to come to the office five days a week would result in a wave of voluntary terminations that we welcome: If federal employees don’t want to show up, American taxpayers shouldn’t pay them for the Covid-era privilege of staying home.
Finally, we are focused on delivering cost savings for taxpayers. Skeptics question how much federal spending DOGE can tame through executive action alone. They point to the 1974 Impoundment Control Act, which stops the president from ceasing expenditures authorized by Congress. Mr. Trump has previously suggested this statute is unconstitutional, and we believe the current Supreme Court would likely side with him on this question. But even without relying on that view, DOGE will help end federal overspending by taking aim at the $500 billion plus in annual federal expenditures that are unauthorized by Congress or being used in ways that Congress never intended, from $535 million a year to the Corporation for Public Broadcasting and $1.5 billion for grants to international organizations to nearly $300 million to progressive groups like Planned Parenthood.
The federal government’s procurement process is also badly broken. Many federal contracts have gone unexamined for years. Large-scale audits conducted during a temporary suspension of payments would yield significant savings. The Pentagon recently failed its seventh consecutive audit, suggesting that the agency’s leadership has little idea how its annual budget of more than $800 billion is spent. Critics claim that we can’t meaningfully close the federal deficit without taking aim at entitlement programs like Medicare and Medicaid, which require Congress to shrink. But this deflects attention from the sheer magnitude of waste, fraud and abuse that nearly all taxpayers wish to end—and that DOGE aims to address by identifying pinpoint executive actions that would result in immediate savings for taxpayers.
With a decisive electoral mandate and a 6-3 conservative majority on the Supreme Court, DOGE has a historic opportunity for structural reductions in the federal government. We are prepared for the onslaught from entrenched interests in Washington. We expect to prevail. Now is the moment for decisive action. Our top goal for DOGE is to eliminate the need for its existence by July 4, 2026—the expiration date we have set for our project. There is no better birthday gift to our nation on its 250th anniversary than to deliver a federal government that would make our Founders proud.
Mr. Musk is CEO of SpaceX and Tesla. Mr. Ramaswamy, a businessman, is author, most recently, of “Truths: The Future of America First” and was a candidate for the 2024 Republican presidential nomination. President-elect Trump has named them co-heads of the Department of Government Efficiency.
We are assisting the Trump transition team to identify and hire a lean team of small-government crusaders, including some of the sharpest technical and legal minds in America. This team will work in the new administration closely with the White House Office of Management and Budget. The two of us will advise DOGE at every step to pursue three major kinds of reform: regulatory rescissions, administrative reductions and cost savings. We will focus particularly on driving change through executive action based on existing legislation rather than by passing new laws. Our North Star for reform will be the U.S. Constitution, with a focus on two critical Supreme Court rulings issued during President Biden’s tenure.
In West Virginia v. Environmental Protection Agency (2022), the justices held that agencies can’t impose regulations dealing with major economic or policy questions unless Congress specifically authorizes them to do so. In Loper Bright v. Raimondo (2024), the court overturned the Chevron doctrine and held that federal courts should no longer defer to federal agencies’ interpretations of the law or their own rulemaking authority. Together, these cases suggest that a plethora of current federal regulations exceed the authority Congress has granted under the law.
DOGE will work with legal experts embedded in government agencies, aided by advanced technology, to apply these rulings to federal regulations enacted by such agencies. DOGE will present this list of regulations to President Trump, who can, by executive action, immediately pause the enforcement of those regulations and initiate the process for review and rescission. This would liberate individuals and businesses from illicit regulations never passed by Congress and stimulate the U.S. economy.
When the president nullifies thousands of such regulations, critics will allege executive overreach. In fact, it will be correcting the executive overreach of thousands of regulations promulgated by administrative fiat that were never authorized by Congress. The president owes lawmaking deference to Congress, not to bureaucrats deep within federal agencies. The use of executive orders to substitute for lawmaking by adding burdensome new rules is a constitutional affront, but the use of executive orders to roll back regulations that wrongly bypassed Congress is legitimate and necessary to comply with the Supreme Court’s recent mandates. And after those regulations are fully rescinded, a future president couldn’t simply flip the switch and revive them but would instead have to ask Congress to do so.
A drastic reduction in federal regulations provides sound industrial logic for mass head-count reductions across the federal bureaucracy. DOGE intends to work with embedded appointees in agencies to identify the minimum number of employees required at an agency for it to perform its constitutionally permissible and statutorily mandated functions. The number of federal employees to cut should be at least proportionate to the number of federal regulations that are nullified: Not only are fewer employees required to enforce fewer regulations, but the agency would produce fewer regulations once its scope of authority is properly limited. Employees whose positions are eliminated deserve to be treated with respect, and DOGE’s goal is to help support their transition into the private sector. The president can use existing laws to give them incentives for early retirement and to make voluntary severance payments to facilitate a graceful exit.
Conventional wisdom holds that statutory civil-service protections stop the president or even his political appointees from firing federal workers. The purpose of these protections is to protect employees from political retaliation. But the statute allows for “reductions in force” that don’t target specific employees. The statute further empowers the president to “prescribe rules governing the competitive service.” That power is broad. Previous presidents have used it to amend the civil service rules by executive order, and the Supreme Court has held—in Franklin v. Massachusetts (1992) and Collins v. Yellen (2021) that they weren’t constrained by the Administrative Procedures Act when they did so. With this authority, Mr. Trump can implement any number of “rules governing the competitive service” that would curtail administrative overgrowth, from large-scale firings to relocation of federal agencies out of the Washington area. Requiring federal employees to come to the office five days a week would result in a wave of voluntary terminations that we welcome: If federal employees don’t want to show up, American taxpayers shouldn’t pay them for the Covid-era privilege of staying home.
Finally, we are focused on delivering cost savings for taxpayers. Skeptics question how much federal spending DOGE can tame through executive action alone. They point to the 1974 Impoundment Control Act, which stops the president from ceasing expenditures authorized by Congress. Mr. Trump has previously suggested this statute is unconstitutional, and we believe the current Supreme Court would likely side with him on this question. But even without relying on that view, DOGE will help end federal overspending by taking aim at the $500 billion plus in annual federal expenditures that are unauthorized by Congress or being used in ways that Congress never intended, from $535 million a year to the Corporation for Public Broadcasting and $1.5 billion for grants to international organizations to nearly $300 million to progressive groups like Planned Parenthood.
The federal government’s procurement process is also badly broken. Many federal contracts have gone unexamined for years. Large-scale audits conducted during a temporary suspension of payments would yield significant savings. The Pentagon recently failed its seventh consecutive audit, suggesting that the agency’s leadership has little idea how its annual budget of more than $800 billion is spent. Critics claim that we can’t meaningfully close the federal deficit without taking aim at entitlement programs like Medicare and Medicaid, which require Congress to shrink. But this deflects attention from the sheer magnitude of waste, fraud and abuse that nearly all taxpayers wish to end—and that DOGE aims to address by identifying pinpoint executive actions that would result in immediate savings for taxpayers.
With a decisive electoral mandate and a 6-3 conservative majority on the Supreme Court, DOGE has a historic opportunity for structural reductions in the federal government. We are prepared for the onslaught from entrenched interests in Washington. We expect to prevail. Now is the moment for decisive action. Our top goal for DOGE is to eliminate the need for its existence by July 4, 2026—the expiration date we have set for our project. There is no better birthday gift to our nation on its 250th anniversary than to deliver a federal government that would make our Founders proud.
Mr. Musk is CEO of SpaceX and Tesla. Mr. Ramaswamy, a businessman, is author, most recently, of “Truths: The Future of America First” and was a candidate for the 2024 Republican presidential nomination. President-elect Trump has named them co-heads of the Department of Government Efficiency.
-
@ e373ca41:b82abcc5
2024-11-21 09:50:06The last few years are unlikely to evoke positive associations for most people: corona madness, climate and trans ideology, a few wars in between and now the weather is also going crazy. You feel more reminded of the biblical plagues and the apocalypse than motivated to make positive changes to the system. It seems as if the world is in the hands of fanatical do-gooders and globalist social engineers. But the world is always in the hands of everyone. There is no responsibility for the future in the hands of some kind of “elite”, unless the citizens voluntarily leave it to them. Apocalypse literally means “unveiling”. In times of crisis, the core of reality is peeled out and all illusions fall away.
Golden times for system explorers
In turbulent times like these, unbreakable forest dwellers and resisters, prognosticators, esotericists and also system busters cavort. This is also a constant in history: times of crisis were often times of new beginnings. In knowledge revolutions, new knowledge inevitably mixed with new technology and also a new spiritual orientation towards the world. Before the outside world is created, it must be conceived internally. Around 500 years ago, the plague repeatedly cut new swathes through Europe, while at the same time Venice began its rise as a major trading power, the Medici banking system began to flourish and, a little later, so did art. This boom was preceded by something that at first glance seemed “boring”, such as the invention of double-entry bookkeeping by the monk Luca Pacioli at the end of the 15th century.
In the following century, the thinker Giordano Bruno moved from city to city in search of employment, and in the end, the system-breaker was burned as a heretic on the Campo de' Fiori in Rome. Meanwhile, astronomers, magicians, artists and alchemists bustled about at the court of the Habsburg Rudolf II in Prague. Some talked to angels, others tried their hand at producing gold. Those who ridicule alchemical experiments today as heresies should at least google how phosphorus and porcelain were discovered.
To be outmoded and unworldly means to be in search of something different. Great visionaries from Rudolf Steiner to Albert Einstein, Nikola Tesla and Richard Buckminster-Fuller have always known that the best way to change the system is to go outside the system and create something new from there. You don't change the old by fighting it. The best way to replace it is to think in new forms that make the old forms obsolete, said Buckminster-Fuller.
Brains moved the world more than the guillotine
Working on the old is like dancing with zombies. Creating the new, on the other hand, inevitably brings the old into competition with the system. If the new is better, the old system is obsolete. “Video killed the Radio Star” sang the Buggles in 1979 (the first clip of the MTV era) and they were just as right as Steve Jobs, who threw several industries overboard with the iPhone. What you previously needed 20 devices for, from dictation machines to telephones and “Walkmans”, you now had in your pocket. Thinking outside the system, which you don't learn within the system, combined with technology, is the sharpest knife in history when it comes to change. Brains moved more than the guillotine.
In today's world, everyone is a potential system changer. There has never been a time when the tools of change have been available to as many people as they are today. At the same time, we live in a time in which fewer people than ever before determine the fate of everyone. How does this fit together? There is an infinite systematic potential for change, and this lies solely with the people who have not yet made use of the available tools. But this wave is irreversibly set in motion; it is rolling and no one knows when it will turn into a tsunami. Free speech and critical journalism are under massive attack. With the Pareto Project we want to make censorship-resistant publishing the new standard. Today, we have the opportunity to consign the phenomenon of censorship to the landfill of history. Are you thinking along similar lines? What should the journalism of the future look like? Help us as a tester, migrate your content as a journalist or as a publication, support us as a developer or contribute your ideas: Kontakt@idw-europe.org
The great transformation
We are living in the midst of a quiet revolution, with quiet revolutionaries. Pavel Durov from Telegram would certainly have got on well with Giordano Bruno. Bitcoin inventor Satoshi Nakamoto might have felt at home at the court of Rudolf II in the past.
The path to change follows similar patterns of transformation. In the past, the power of the individual was seen as being sand in the gears of the system. “Man of labor, wake up! And recognize your power! All wheels stand still when your strong arm wills it,” wrote Georg Herwegh. Today, anyone can create their own little system. With Bitcoin, uncensorable money is already in circulation. The next big battle is over the uncensorability of information and it is currently underway. The best way to share centralized power, whether it's media power or a central bank cartel, is to distribute power through decentralized systems. This is essentially a feudalistic redistribution: the old feudal system is being replaced by the reassertion of power for the individual. What role will Switzerland, the country of countless inventions, play in this development? Hardly any other country is so innovative and therefore so well positioned for this system transformation. The most successful Bitcoin app in Europe already comes from Switzerland. The Relai app is an application for secure self-custody of Bitcoin, without the influence of others. Relai AG was recently voted the best crypto startup and second-best financial startup in the country, and is rushing from one growth success to the next. The company is currently preparing to conquer the European market even more effectively.
Gaining control for the individual means losing control for the old (money) system. This principle also applies in other sectors. For example, iVault AG from Thalwil is currently working on opening up the “sharing economy” market. Anyone who wants to easily rent out their e-bike, car or lawnmower to others, for example, can do so via the ivault.io app and benefit directly from their own sustainability. Here too, old centralized platforms are being disempowered and individuals are taking their fate into their own hands.
It's always the same pattern and principle: if you don't want to be managed by others, you have to manage yourself. This applies to money, information and even lawnmowers and e-bikes.
Want to learn more about the Pareto Project? We build a publishing ecosystem on Nostr for citizen-journalism, starting with a client for blogging and newsletter distribution. Zap me, if you want to contribute (all Zaps go to the project).
-
@ 705605d9:b4324038
2024-11-21 09:35:23Ежегодная Горноправдинская экологическая ярмарка, ставшая визитной карточкой высокоразвитой окружной столицы молочной промышленности, приняла сегодня высокопоставленных гостей из Китая. Делегация во главе с Чрезвычайным и Полномочным Послом КНР в России посетила выставку, продемонстрировавшую передовые технологии в сфере экологически чистого производства молочной продукции и устойчивого развития региона.
В ходе визита китайская делегация ознакомилась с работой крупнейших молочных предприятий Горноправдинска, провела переговоры с местными производителями и представителями администрации города. Стороны обсудили возможности экспорта высококачественной горноправдинской молочной продукции на китайский рынок и перспективы сотрудничества в сфере внедрения «зеленых» технологий. Ожидается, что в ближайшее время будут подписаны ряд важных соглашений о взаимовыгодном сотрудничестве.
Посол КНР, г-н Ли Вэй, высоко оценил достижения Горноправдинска в области экологической ответственности и инноваций в молочной промышленности. "Мы впечатлены масштабами и эффективностью вашего экологического проекта, - заявил г-н Ли на пресс-брифинге. - Горноправдинск служит прекрасным примером того, как можно сочетать экономический рост с заботой об окружающей среде. Мы заинтересованы в налаживании тесных торговых отношений и обмене опытом в области экологически чистого производства молочных продуктов".
-
@ 9ff58691:0bf6c134
2024-11-21 07:34:06Друзья, подводим итоги насыщенного культурного сезона в нашем любимом городе Кургане! 2040 год стал настоящим триумфом для местной арт-сцены.
✨ Выставочный сезон в Курганском музее современного искусства побил все рекорды посещаемости. Жители и гости города с восторгом приняли экспозиции, посвященные цифровому искусству и технологиям виртуальной реальности. Особенно популярной стала выставка "Киберпанк: город будущего", где посетители могли погрузиться в завораживающие миры, созданные при помощи ИИ-генераторов изображений.
🎨 Настоящим украшением города стали новые арт-объекты, появившиеся благодаря конкурсу среди молодых архитекторов. Победителем стал Максим Ветров с его концептуальной скульптурой "Связь поколений", сочетающей в себе элементы классической архитектуры и футуристические 3D-компоненты.
"Для меня большая честь, что мой проект был выбран для воплощения в Кургане. Я хотел создать арт-объект, который бы отражал преемственность традиций и устремленность в будущее нашего города", - комментирует Максим.
🏆 Кульминацией года стал международный конкурс на лучший дизайн-проект нового культурного центра Кургана. Жюри высоко оценило смелые идеи и технологичные решения, представленные участниками. Победителем стала команда молодых архитекторов из Москвы, которые предложили концепцию "умного" здания, адаптирующегося под нужды посетителей с помощью ИИ-систем.
Культурная жизнь Кургана с каждым годом становится все ярче и разнообразнее. Мы с нетерпением ждем новых свершений в 2041 году!
Автор: Елизавета Медведева
-
@ 9ff58691:0bf6c134
2024-11-21 07:32:1515 ноября 2024 года в Центральном парке Кургана прошел долгожданный "Велопробег Будущего", который собрал более 300 участников всех возрастов. Это мероприятие стало настоящим праздником здоровья и велоспорта, объединив людей, стремящихся к активному образу жизни.
С самого утра парк наполнился энергией и позитивом. Участники регистрировались, получали номерки и информационные материалы о велоспорте и здоровом питании. Приветственное слово организаторов и местных властей задало тон всему мероприятию, подчеркивая важность физической активности для здоровья и экологии.
В 10:30 стартовал сам велопробег на дистанции 10 км. Участники, разделенные на группы по уровню подготовки, с энтузиазмом отправились в путь. Живописные маршруты парка, наполненные зеленью и свежим воздухом, создали идеальные условия для активного отдыха.
После пробега на участниках ждали станции здоровья, где они могли пройти тестирование на уровень физической активности, получить советы по правильному питанию от диетологов и поучаствовать в мини-тренировках. Фестиваль здоровья, который последовал за этим, стал настоящим хитом: местные производители здорового питания и спортивного инвентаря представили свои товары, а мастер-классы по ремонту велосипедов привлекли множество желающих.
В завершение мероприятия состоялось награждение победителей в различных номинациях, что добавило нотку соревнования и веселья. Участники делились впечатлениями и планами на следующий год, обсуждая, как важно продолжать поддерживать активный образ жизни.
Мы взяли комментарий у одного из участников, 28-летнего велосипедиста Ивана Петрова, который принял участие в пробеге:
"Это было невероятно! Я участвую в велопробегах уже несколько лет, но этот был особенным. Атмосфера была просто потрясающей, и я рад, что так много людей пришло поддержать здоровый образ жизни. Велоспорт — это не только спорт, но и возможность встретить единомышленников и насладиться природой. Я с нетерпением жду следующего года!"
"Велопробег Будущего" стал не только успешным мероприятием, но и важным шагом к созданию сообщества, заинтересованного в активном и здоровом образе жизни. Мы надеемся, что в следующем году количество участников только увеличится, и мероприятие станет еще более масштабным и запоминающимся!
Автор: Налобина Александра
-
@ fd208ee8:0fd927c1
2024-11-21 07:24:34The motherhood illusion
Growing up, I was always told that women wanted children, whilst men wanted sex. So, marriage was created, to unite these two urges, and men and women don't otherwise particularly differ. But, it turns out, that women want protection and sex, and men want children and sex.
This is why women tend to be attracted to more masculine men (they're associated with protection) and men tend to be attracted to more feminine women (they're associated with motherhood). Women who are attracted to men, who aren't overtly masculine, are looking for a different aspect of protection (reliability, steady income or wealth, emotional security, etc.)
This wasn't readily apparent, in earlier generations, as widespread, youthful marriage meant that there weren't any real decisions being made by the participants. Almost all women got married and had kids, and almost all men got married and had sex. Math checks out. But the number of women who could protect and provide for themselves was low, and the men marrying were often very young and libidinous, and not yet contemplating their own legacy.
Feminism, easy abortion, deindustrialization, delayed marriage, and reliable contraception have dissolved this illusion, completely. Millions of Western women quickly turned into cougars, careerists, party girls, and e-girls, and an entire army of childless men and sidelined dads bubbled up and began to make their pain known. Humanity's dirty underbelly has been exposed.
Women aren't as sweet, as we thought, and men are much sweeter.
Women also want children, but not as intensely. In fact, they seem to often viscerally dislike children, and are jealous of the protection they are to give them. So, they are prone to offing their offspring because they are averse to having any in-house competition.
If you just left women up to their own devices and reduced the social pressure, at least a fifth of them wouldn't bother having children, at all, and another quarter will have one and then lose interest or age out. This is not a new phenomenon, as we can see.
The male competition for potential mothers turns out to be absolutely brutal, and more difficult than simply finding a woman to sleep with. And, now, we finally understand why men traditionally jumped through so many hoops, to attain a wife. It wasn't for the sex; we've always had brothels, masturbation, and pornography. It was for the familial comfort, and, especially, for the children.
Good fathers make good mothers
Some women don't know if they are "potential mothers", until they meet a "potential father", and their urge to procreate suddenly kicks in. They didn't want children for their own sake, but now they want some for his sake. All of a sudden, they're imagining themselves rocking the cradle, googling "what to eat, when you're expecting", and find themselves gushing over anything that gives off Hint of Infant.
I'm pregnant! Look what I can do! Look what I can do! For you, darling.
Women married to men they are deeply in love with, are much more likely to desire to become mothers (and be devastated by infertility), and make for better mothers, because children are like individualized presents they can give to their husband.
They want to impress him. Most want to be decent parents in their own right, but the urge to impress seems to raise this to a much higher level because women are vain, and therefore focused on raising their own status and how they appear to others. And the greatest "other", of a happy wife, is her husband.
Because men are narcissistic, and therefore in love with anything associated with themselves (which underpins their obsession with owning property), men have an intense attachment to their children. What is more "yours", than your progeny?
Fathers seem to develop a special attachment to, or fondness for, the mothers of their children, that goes beyond lust or romantic love; they never forgot who gave them this new Mini Me. And they are often quite impressed by their own ability to perform this trick numerous times, which leads to the intense satisfaction they feel at "going into serial production" and churning out more of those Mini Mes until their adoring wife pleads for mercy.
Men want children. Women, who love a man, want to give him those children and gain the fidelity that comes along with those children. This is the actual "trade" underpinning the urge to marry.
-
@ 1123ece2:7d1e00c0
2024-11-21 06:55:31Hey everyone and welcome to Refinery Life Australia.
“The Christ of John’s Gospel” is the theme for the coming Sunday morning teachings that focus on John’s unique portrayal of the Christ.
We will continue this series through to the end of the year.
Today we are discussing, A Meeting with the Master.
Text
John 4:6-7 NKJV
6 Now Jacob’s well was there. Jesus therefore, being wearied from His journey, sat thus by the well. It was about the sixth hour.
7 A woman of Samaria came to draw water. Jesus said to her, “Give Me a drink.”
Scripture Reading
John 4:1-42 NKJV
A Samaritan Woman Meets Her Messiah
1 Therefore, when the Lord knew that the Pharisees had heard that Jesus made and baptized more disciples than John
2 (though Jesus Himself did not baptize, but His disciples),
3 He left Judea and departed again to Galilee.
4 But He needed to go through Samaria.
5 So He came to a city of Samaria which is called Sychar, near the plot of ground that Jacob gave to his son Joseph.
6 Now Jacob’s well was there. Jesus therefore, being wearied from His journey, sat thus by the well. It was about the sixth hour.
7 A woman of Samaria came to draw water. Jesus said to her, “Give Me a drink.”
8 For His disciples had gone away into the city to buy food.
9 Then the woman of Samaria said to Him, “How is it that You, being a Jew, ask a drink from me, a Samaritan woman?” For Jews have no dealings with Samaritans.
10 Jesus answered and said to her, “If you knew the gift of God, and who it is who says to you, ‘Give Me a drink,’ you would have asked Him, and He would have given you living water.”
11 The woman said to Him, “Sir, You have nothing to draw with, and the well is deep. Where then do You get that living water?
12 Are You greater than our father Jacob, who gave us the well, and drank from it himself, as well as his sons and his livestock?”
13 Jesus answered and said to her, “Whoever drinks of this water will thirst again,
14 but whoever drinks of the water that I shall give him will never thirst. But the water that I shall give him will become in him a fountain of water springing up into everlasting life.”
15 The woman said to Him, “Sir, give me this water, that I may not thirst, nor come here to draw.”
16 Jesus said to her, “Go, call your husband, and come here.”
17 The woman answered and said, “I have no husband.” Jesus said to her, “You have well said, ‘I have no husband,’
18 for you have had five husbands, and the one whom you now have is not your husband; in that you spoke truly.”
19 The woman said to Him, “Sir, I perceive that You are a prophet.
20 Our fathers worshiped on this mountain, and you Jews say that in Jerusalem is the place where one ought to worship.”
21 Jesus said to her, “Woman, believe Me, the hour is coming when you will neither on this mountain, nor in Jerusalem, worship the Father.
22 You worship what you do not know; we know what we worship, for salvation is of the Jews.
23 But the hour is coming, and now is, when the true worshipers will worship the Father in spirit and truth; for the Father is seeking such to worship Him.
24 God is Spirit, and those who worship Him must worship in spirit and truth.”
25 The woman said to Him, “I know that Messiah is coming” (who is called Christ). “When He comes, He will tell us all things.”
26 Jesus said to her, “I who speak to you am He.”
The Whitened Harvest
27 And at this point His disciples came, and they marveled that He talked with a woman; yet no one said, “What do You seek?” or, “Why are You talking with her?”
28 The woman then left her waterpot, went her way into the city, and said to the men,
29 “Come, see a Man who told me all things that I ever did. Could this be the Christ?”
30 Then they went out of the city and came to Him.
31 In the meantime His disciples urged Him, saying, “Rabbi, eat.”
32 But He said to them, “I have food to eat of which you do not know.”
33 Therefore the disciples said to one another, “Has anyone brought Him anything to eat?”
34 Jesus said to them, “My food is to do the will of Him who sent Me, and to finish His work.
35 Do you not say, ‘There are still four months and then comes the harvest’? Behold, I say to you, lift up your eyes and look at the fields, for they are already white for harvest!
36 And he who reaps receives wages, and gathers fruit for eternal life, that both he who sows and he who reaps may rejoice together.
37 For in this the saying is true: ‘One sows and another reaps.’
38 I sent you to reap that for which you have not labored; others have labored, and you have entered into their labors.”
The Savior of the World
39 And many of the Samaritans of that city believed in Him because of the word of the woman who testified, “He told me all that I ever did.”
40 So when the Samaritans had come to Him, they urged Him to stay with them; and He stayed there two days.
41 And many more believed because of His own word.
42 Then they said to the woman, “Now we believe, not because of what you said, for we ourselves have heard Him and we know that this is indeed the Christ, the Savior of the world.”
Amen.
One of the significant features of Jesus’ ministry was His meetings with people.
Jesus had an interest in individuals and He still does today.
The Lord was not so preoccupied with the multitudes that he lost concern for individuals.
Jesus met with many people.
One of His most significant meetings with a sinful woman at Jacobs well.
Let us look today at some fascinating facets of this famous interview.
- The perplexing problems.
Jesus’ meeting with the woman of Samaria was full of problems.
Do you understand the difficulties, we must understand some geography and history of Israel.
The pious Jew would not go through the land of Samaria.
Following the northern kingdom of Israel's captivity in 722 BC by the Assyrians, the land was inhabited by Israelites and foreigners.
The intermarried, which was repulsive to Pius Jews, and therefore the Pious Jews avoided Samaria.
Regarding Jesus, John said in John 4:4, But He needed to go through Samaria.
Various barriers existed for Jesus and the woman.
There was an ethnic barrier.
Jews were somewhat tolerant of other races, but the Samaritans were contemptible to the Jews.
When the woman met the Lord, she emphasised this barrier, she said how is it that You, being a Jew, ask a drink of me, a woman of Samaria?
There was a gender barrier.
Rabbis were forbidden to greet a woman in public, but Jesus cross this barrier.
Not only did the Lord cross this barrier, but he chose to talk with a notoriously immoral woman.
And of course there was a religious barrier.
There is a wide religious gap between the Jews and the Samaritans.
The Samaritans worshipped at Mount Ebal, and the Jews worship at Mount Gerizim.
- The Master’s proposal.
Jesus had the interpersonal skills to overcome these barriers.
Let us follow the strategy of the Master in how He made the meeting with the woman meaningful.
Jesus asked for a common necessity.
When the woman came to the well, He asked for a drink.
Jesus was thirsty, and the woman was thirsty.
Even though the two were different in race, gender, and religion, they had a common need to drink.
Jesus aroused the woman’s curiosity.
After He talked about His and her physical thirst, He mentioned something about “living water.”
Immediately the woman began to ask questions.
“From where does the living water come?”
The woman realised that Jesus was speaking of another type of water.
Jesus awakened the woman’s conscience.
The woman did not grasp everything about the living water, so Jesus appealed to her conscience.
“Go call your husband, and come here.”
Jesus wanted the woman to see that He knew the errors of her life.
With her conscience awakened, the woman wanted to talk about her relationship with God.
John 4:19-20 NKJV
19 The woman said to Him, “Sir, I perceive that You are a prophet.
20 Our fathers worshiped on this mountain, and you Jews say that in Jerusalem is the place where one ought to worship.”
Jesus acknowledged Himself as the Messiah.
Skilfully and masterfully, Jesus led the woman to the fact that He was the Messiah.
At the appropriate moment, He made the messianic disclosure, “I who speak to you and He.”
- The woman’s proclamation.
After the interview with Jesus, the woman left for the city of Samaria.
She told the people about the Lord.
John 4:29 NKJV
29 “Come, see a Man who told me all things that I ever did. Could this be the Christ?”
The woman had been changed because of her encounter with Jesus Christ.
A careful study of her attitude and actions reflects a radical change in character.
The woman also had a new concern for her life.
She left the water pots and went into the city.
Her primary concerns had been the sensual things of life.
After her life transforming experience, she was concerned for the spiritual condition of an entire village.
Why don’t you have a meeting with the Master?
Let Him tell you about His character and His ability to change people.
Until next time
Stay in the Blessings
I really want to encourage you to be diligent with your Bible study time, because God has so much more for us than we can get from just going to church once or twice a week and hearing someone else talk about the Word.
When you spend time with God, your life will change in amazing ways, because God is a Redeemer. Theres nothing thats too hard for Him, and He can make you whole, spirit, soul and body!
You’re important to God, and you’re important to us at The Refinery.
When it comes to prayer, we believe that God wants to meet your needs and reveal His promises to you.
So whatever you’re concerned about and need prayer for we want to be here for you! Or even if you just want to say Hi, you can contact us at www.refinerylife.org
2024 IS A YEAR OF DECISIONS AND OPEN DOORS
© www.refinerylife.org 2013-2024 All rights reserved. Except as permitted under the Australian Copyright Act 1968, no part of this Article may be reproduced, stored in a retrieval system, communicated or transmitted in any form or by any means without the prior written permission.
This episode is brought to you by Refinery Life Australia:
If you enjoy The Refinery Life Radio Podcast you can help support The Refinery by doing the following:
Sow an offering: Bitcoin: bc1qqh6720t2zagj72dyfj348az698tdut3hlecaj4
Online: https://www.refinerylife.org/donate/
If you do send an offering then please email us so that we can say thank you
Subscribe on iTunes | Spotify | YouTube | TuneIn | Rumble | Flare | Zap.Stream | Fountain |
Share The Refinery with your friends and family
Subscribe to the newsletter on www.refinerylife.org
Follow The Refinery on Twitter | Nostr | Instagram | Fountain |
-
@ 97fc03df:8bf891df
2024-11-21 06:08:35Qinghuan
2024.11.14.
Abstract
This article provides an in-depth analysis of the evolution of Simplified Payment Verification (SPV) technology from the basic application of the Bitcoin network to the modern blockchain extension layer, paying special attention to its innovative applications in ChainX , BEVM and Super Bitcoin, and discusses the application of SPV technology in A technical solution that maintains decentralization while achieving scalability.
1. SPV Basic Technology Solution
1.1 Technical Principles
1.2 Workflow
Block Header Synchronization Process
Transaction Verification Mechanism - Request the Merkel route for a specific transaction - Verify Merkel Proof - Confirm transaction status
1.3 Why is Bitcoin suitable for SPV?
Technical characteristics
1. The logic on the chain is simple - Pure UTXO status verification - No complex calculations required - Status changes are clear
2. Validate cost stability - Block header fixed size (80 bytes) - Verification complexity is constant - Controllable storage requirements
2. Technology Evolution Progress
2.1 ChainX stage (2018-2020): Cross-chain Verification Innovation
Technical architecture
Core Innovation
- The first SPV verification on the WASM chain
- Realize decentralized cross-chain
- Verification efficiency optimization
2.2 BEVM Phase (2020-2023): Smart Contract Integration
Architecture Upgrade
**Technological Breakthrough **
- Taproot protocol support
- EVM compatibility
- Verify performance improvements
2.3 Super Bitcoin stage (2024-present): Consensus Sharing Innovation
Five-Layer Architecture
3. Technical Comparative Analysis
3.1 Analysis of SPV Applicability of Different Blockchains
3.2 Comparison of Technical Indicators during the Evolution Process
4. Innovative Application Scenarios
4.1 Cross-chain Asset Management
Verification Process
4.2 Smart Contract Interaction
Implementation Mechanism 1. Transaction verification integration 2. State synchronization 3. Contract call
4.3 Layer2 extension
Technical Framework
5. Security Analysis
5.1 Threat Model
Potential Risks 1. Forking attack 2. Double spend attack 3. Data availability
Protective Measures
5.2 Longest Chain Consistency
Guarantee Mechanism
- Multi-point verification
- Consensus check
- State rollback
6. Future Outlook
6.1 Technology Development Direction
1. Verification Mechanism Optimization
- Zero-knowledge proof integration
- Batch verification optimization
- State compression
2. Application Scenario Expansion
- DeFi integration
- Cross-chain interoperability
- Layer2 extension
7. Conclusion
SPV technology has developed from the basic verification mechanism of the Bitcoin network to the present and has experienced an important evolution process:
- Cross-chain feasibility verified in ChainX
- Integration with smart contracts is achieved in BEVM
- Creating a new paradigm of consensus sharing in Super Bitcoin
This evolution demonstrates how SPV technology can adapt to the needs of the modern blockchain ecosystem through continuous innovation while maintaining security and decentralization. In the future, with the further development of technology and the expansion of application scenarios, SPV is expected to play a more important role in blockchain scalability solutions.
-
@ 1bda7e1f:bb97c4d9
2024-11-21 04:17:08Tldr
- Nostr is an open protocol which is interoperable with all kinds of other technologies
- You can use this interoperability to create custom solutions
- Nostr apps define a custom URI scheme handler "nostr:"
- In this blog I use this to integrate Nostr with NFC cards
- I create a Nostr NFC "login card" which allows me to log into Amethyst client
- I create a Nostr NFC "business card" which allows anyone to find my profile with a tap
Inter-Op All The Things!
Nostr is a new open social protocol for the internet. This open nature is very exciting because it means Nostr can add new capabilities to all other internet-connected technologies, from browsers to web applications. In my view, it achieves this through three core capabilities.
- A lightweight decentralised identity (Nostr keys, "npubs" and "nsecs"),
- A lightweight data distribution network (Nostr relays),
- A set of data interoperability standards (The Nostr Improvement Protocols "NIPs"), including the "nostr:" URI which we'll use in this post.
The lightweight nature is its core strength. Very little is required to interoperate with Nostr, which means many existing technologies can be easily used with the network.
Over the next few blog posts, I'll explore different Nostr inter-op ideas, and also deliver my first small open source projects to the community. I'll cover–
- NFC cards integrated with Nostr (in this post),
- Workflow Automations integrated with Nostr,
- AI LLMs integrated with Nostr.
The "Nostr:" URI
One feature of Nostr is it defines a custom URI scheme handler "nostr:". What is that?
A URI is used to identify a resource in a system. A system will have a protocol handler registry used to store such URI's, and if a system has a URI registered, then it knows what to do when it sees it. You are probably already familiar with some URI schemes such as "http:" and "mailto:". For example, when you click an http link, the system knows that it describes an http resource and opens a web browser to fetch the content from the internet.
A nostr: link operates in the same way. The nostr: prefix indicates a custom URI scheme specifically designed for the Nostr protocol. If a system has a Nostr application installed, that application may have registered "nostr:" in the protocol handler registry. On that system when a "nostr:" URI is clicked, the system will know that it describes a nostr resource and open the Nostr client to fetch the content from the nostr relay network.
This inter-op with the protocol handler registry gives us the power to do nice and exciting things with other technologies.
Nostr and NFC
Another technology that uses URIs is NFC cards. NFC (Near Field Communication) is a wireless technology that enables devices to exchange data over a few centimeters. It’s widely used in contactless payments, access control, and information sharing.
NFC tags are small chips embedded in cards or stickers which can store data like plain text, URLs, or custom URIs. They are very cheap (cents each) and widely available (Amazon with next day delivery).
When an NFC tag contains a URI, such as a http: (or nostr:) link, it acts as a trigger. Tapping the tag with an NFC-enabled device launches the associated application and processes the URI. For example, tapping a tag with "nostr:..." could open a Nostr client, directing it to a specific login page, public profile, or event.
This inter-op allows us to bridge the physical world to Nostr with just a tap.
Many useful ideas
There are many interesting ways to use this. Too many for me to explore. Perhaps some of these are interesting for your next side hustle?
- Nostr NFC "login cards" – tap to log into Amethyst on Android,
- Nostr NFC "business cards" – give to connections so they can tap to load your npub,
- Nostr NFC "payment cards" – integrating lightning network or ecash,
- Nostr NFC "doorbells", "punch cards", "drop boxes", or "dead drops" – put a tag in a specific place and tap to open a location-specific message or chat,
- Integrations with other access control systems,
- Integrations with other home automation systems,
- Many more ...
To start with I have built and use the "login card" and "business card" solutions. This blog post will show you how to do the same.
Nostr Login Card
You can use an NFC card to log into your Nostr client.
Most Nostr clients accept a variety of login methods, from posting your nsec into the app (insecure) to using a remote signer (more secure). A less known but more secure method is to sign into a session with a tap of a specially-configured NFC card. Amethyst is a Nostr client on Android which supports this type of login.
- A secure method for logging in
- Optionally keeps no log in history on the device after logout
- Does not require users to know or understand how keys work
- Keys are kept secure on a physically-separated card to reduce risk of compromise
Nostr devs think that this is useful for anti-establishment actors–Fair enough. For me, I am interested in this login card pattern as it could be useful for rolling out identities within an organisation context with less training (office workers are already familiar with door access cards). This pattern potentially abstracts away key management to the IT or ops team who provision the cards.
I first discovered this when Kohei demonstrated it in his video.
Here's how you set it up at a high level–
- Buy yourself some NFC cards
- Get your Nostr key ready in an encrypted, password protected format called "nencryptsec"
- Write the nencryptsec to the NFC card as a custom URI
- Tap to load the login screen, and enter your password to login
Here it is in detail–
Buy yourself some NFC cards
I found no specific requirements. As usual with Nostr so far, I tried to the cheapest possible route and it worked. Generic brand NFC cards shipped from China, I believe it was 50X for $15 from Amazon. Your mileage may vary.
Get your Nostr key ready
Your key will be saved to the NFC card in an encrypted password-protected format called "nencryptsec". Several applications support this. As we'll be using this to login to Amethyst, we will use Amethyst to output the nencryptsec for us.
- Login to Amethyst with your nsec,
- Open the sidebar and click "Backup Keys",
- Enter a password, and click "Encrypt and my secret key",
- It will add the password-protected key to your clipboard in the format "ncryptsec1...",
- Remember to backup your password.
Write the ncryptsec to the NFC card
- Download the free NFC Tools app to your device, and open it,
- Click "Write" and "Add a record", then click "Custom URL / URI",
- Paste your nencryptsec with the nostr URI in front, i.e. "nostr:ncryptsec1..." and click OK,
- Click "Write". NFC Tools will prompt you to "Approach an NFC tag",
- Place your NFC card against your phone, and it will write to the card,
- Your card is ready.
Tap to load the login screen
Tap the card against your phone again, and your phone should open the login screen of Amethyst and prompt you for your password.
Once you enter your password, Amethyst will decrypt your nsec and log you in.
Optionally, you can also set the app to forget you once you log out.
You have created a Nostr NFC "login card".
Nostr Business Card
You can use another NFC card to give anyone you meet a link straight to your Nostr profile.
I attended Peter McCormack's #CheatCode conference in Sydney and gave a few of these out following the Nostr panel, notably to Preston Pysh where it got some cut through and found me my first 100 followers. You can do the same.
To create your Nostr NFC "business card" is even easier than your NFC "login card".
- Buy yourself some NFC cards,
- Download the free NFC Tools app to your device, and open it,
- Click "Write" and "Add a record", then click "Custom URL / URI",
- Write your npub to the NFC card as a custom URI in the format "nostr:npub1..." (e.g. for me this is "nostr:npub1r0d8u8mnj6769500nypnm28a9hpk9qg8jr0ehe30tygr3wuhcnvs4rfsft"),
- Your card is ready.
Give the card to someone who is a Nostr user, and when they tap the card against their phone it will open their preferred Nostr client and go directly to your Nostr profile page.
You have created a Nostr NFC "business card".
What I Did Wrong
I like to share what I did wrong so you don't have to make the same mistakes. This time, this was very easy, and little went wrong. In general
- When password-protecting your nsec, don't forget the password!
- When writing to the NFC card, make sure to use "Custom URI/URL" as this accepts your "nostr:" URI scheme. If you use generic "URI/URL" it won't work.
What's Next
Over my first four blogs I have explored creating a good Nostr setup
- Mined a Nostr pubkey and backed up the mnemonic
- Set up Nostr payments with a Lightning wallet plus all the bells and whistles
- Set up NIP-05 and Lighting Address at my own domain
- Set up a Personal Relay at my own domain
Over the next few blogs I will be exploring different types of Nostr inter-op
- NFC cards integrated with Nostr (this post)
- Workflow Automations integrated with Nostr
- AI LLMs integrated with Nostr
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-
@ 30ceb64e:7f08bdf5
2024-11-21 01:24:36Damn,
I always put too many projects on my plate.
I really need to focus on one at a time or a couple of them.
I'm starting to feel the risk of not doing everything I wanted to accomplish.
I think with a few days hard push, I'd be able to knock out a lot.
- Article Blog
- Cool Shopstr Site
- Nostr Running App
- Podcast with AI reading my Blogs, with wavlake beats playing in the background
- Radio Show
- Music Videos
- Couple more Wavlake Albums (TheWildHustle, and Jayhawk)
- Viny Record
- Short Story
- A brand/npub to release some of my projects, instead of overloading my one npub.
This week I want to hit coding and writing hard.
I need to a hard push will get me to a good place, considering the steps i've already taken.
The start date for my part time job has been moved to December 9th, Its a weekend job working 14 hour shifts on Saturday and Sunday......Ha! I'll be assisting teens with disabilities like downsyndrome and whatnot. I'm looking forward to doing something more than just clicking fiat buttons on the computer and possibly making a direct difference in a freaks life.
I've proofed of work pretty well in the bear. Now I need to execute in this early bull.
How I plan to execute - I'm TheWIldHustle so it behooves me to lean into my sporadic nature - Get alot of work done when I feel the animal spirits take me - Broadcast my actions and rely on negative emotions (me not wanting to be a larp) to motivate my actions and force me into work with an angry ferver. - Try to maintain a constructive mood
More specifically - Autoposting blogposts to nostr would be a good idea, I already have some brain dumps in obsidian i can throw into an llm and edit to get my points across, and the autoposting will consistancy if done right.
-
The radio show is probably just me using zap.stream and streaming all of the beats i've come out with on wavlake so far and so setting up a stream shouldnt be too dificult and i'd iterrate over time with different processes
-
I know where to get the vinyl done, I have an album mixed and mastered with artwork bought from a graphic design artist to use for the front cover just need to hit the buy button and offer it on shopstr when it arrives
-
The running app at this point is about 20 percent away from being released as a noob beta project. I primarily need to work on nostr login, UI/UX and testing.
-
Short story rough outline is done, I'll probably throw the thing into Claude and edit just as I will with the blogposts.
-
The podcast will be a reading of my blog posts with my wavlake beats playing in the background
-
The shopstr site will sell digital projects like my stories ebook, wavlake beats and beat tapes. Will sell physical stuff like vinyl records, Album artwork as posters, printify merch-like stuff.
-
Music videos/Shorts will probably come from AnimalSunrise/Wavlake beats
-
Might want to do some sort of brand consultation with a freak on nostr or fiverr to develop a brand to push out some of this stuff.
Fun times ahead, Thanks for reading, Wish me luck, Hustle
originally posted at https://stacker.news/items/776493
-
@ a012dc82:6458a70d
2024-11-21 00:59:27Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
The fact that cryptocurrencies are subject to price swings is something that is common knowledge at this point. The tales of those who made millions during a crypto upswing make regular headlines, but so do the stories of people who lost everything during the downswings. Both types of stories are often reported in the media.
cryptocurrency gain value Additionally, since there is neither a tangible product nor a centralized organizational body, it is difficult to point to anything and say, "Look, that nice thing occurred; crypto prices will improve immediately." This is because there is no actual product. The question now is, "How does the value of cryptocurrencies increase?"
In this article, we will investigate what factors have an influence on the pricing of cryptocurrencies as well as how they increase in value.
What is cryptocurrency?
A digital asset is the most basic definition of a cryptocurrency. Because it was designed to function as a means of trade in the same manner that we use fiat currencies today, we give it the name "currency" because of its original purpose.
All transactions take place via the internet and are stored on a distributed ledger called a blockchain. The blockchain is used to demonstrate ownership of a unit and displays a history of transactions pertaining to that unit. To better understand digital assets, think of them as digital tokens. These tokens have some kind of significance inside the internal system, and it is possible to program them to record monetary transactions along with other important information.
The most profitable aspect of cryptocurrency is undoubtedly its usage as a kind of digital currency. It gives consumers the ability to transfer bitcoins between parties as payment for products and services offered by those parties. The fact that cryptocurrencies are not governed by any central body confers a number of advantageous characteristics on them. Processing costs are often very low or nonexistent altogether. There is less control and regulation exerted by the government. This translates to the fact that cryptocurrencies are easily transportable, resistant to inflation, and transparent with regard to their transaction histories.
Crypto Trading
Trading cryptocurrencies is a relatively new facet of the cryptocurrency industry that is seeing significant growth. The use of cryptocurrencies as a currency system is distinct from trading. Users instead purchase and sell cryptocurrencies in the same manner that they would purchase and sell shares in a corporation. When you buy shares in a corporation, you are essentially buying ownership in that firm. When you buy a token, however, you are really buying ownership in that coin. The tax treatment of transactions involving cryptocurrencies in the United States is analogous to that of transactions involving stock trading. This mirrors the manner in which the majority of people are generating money in the cryptocurrency market.
The crypto monetary system influences the cost of crypto trading in the same way that the popularity of a company's goods influences the price of the company's stock. The supply of a cryptocurrency, the demand for it on the market, the availability of the cryptocurrency, and the prices of other cryptocurrencies are the primary factors that influence its value.
How does cryptocurrency gain value?
On trading platforms, cryptocurrencies may increase in value. [Cryptocurrency]: The market forces of supply and demand cause a growth in its value.
The availability of a particular cryptocurrency is contingent not only on the rate at which new coins are created but also on the proportion of existing holders who are interested in liquidating their holdings.
The amount of demand for a cryptocurrency is influenced by a wide variety of variables. The more value that may be derived from owning the coins, the higher the demand will be for them. This implies that if the cryptocurrency monetary system functions effectively (i.e., with quick transactions and cheap costs), if smart contracts become more popular, and if more companies start to accept cryptocurrency, then the demand for cryptocurrency will rise. Additionally, there is a growing interest in putting money into cryptocurrencies as a kind of investment and value storage.
How is value added to cryptocurrencies? The value of cryptocurrencies goes up and down, just like the value of everything else on the market, depending on how the market as a whole perceives their worth at any particular moment. These shifts may have their origins in some of the elements related to supply and demand that were discussed before, or they may be the consequence of forces that are concealed in the market.
How Users Increase Crypto Value
There are also a few strategies that consumers may use to boost the value of their bitcoin:
-
Buy cheap and sell high. Users have the ability to grow the value of their cryptocurrency holdings by following the time-tested investing method of purchasing and keeping coins. The purchase drives up demand, which in turn drives up the price of the cryptocurrency.
-
Mining. Mining for Bitcoins or other cryptocurrencies may be lucrative if done correctly. Additionally, it has an effect on the availability of cryptocurrencies.
-
Increasing utility. The usefulness of cryptocurrency will expand as more organizations begin to invest in it and accept it as a means of payment. You, as a user, have the ability to make a contribution to this process. This will, over the course of time, result in a rise in the value of cryptocurrencies.
-
Media coverage. The price of cryptocurrencies moves up and down in response to various media reports. Users have the ability to influence this via their own social media profiles.
What Are the Different Types of Crypto?
There are now dozens, if not hundreds, of distinct cryptocurrencies, and each week a new cryptocurrency is introduced into circulation. The following are some of the most well-known types of cryptocurrencies:
-
Ethereum
-
Cardano
-
Dogecoin
-
Polygon
-
Stellar
-
Tether
-
Shiba Anu
In spite of this, there are now three primary types of cryptocurrencies, which are as follows:
-
Bitcoin
-
Altcoins
-
Tokens
Below, a more in-depth discussion is provided for each of these distinct forms of crypto.
Bitcoin
Bitcoin, the first cryptocurrency ever created, is a limited-supply digital asset. This indicates that after 21 million Bitcoins have been mined, there will be no more mined beyond that point.
Because Bitcoin is a currency whose supply is limited, it may be used as a medium for the storage and management of value. Purchasing a currency that acts as a store of value is analogous to purchasing gold as an investment. Although gold does have some worth when it comes to transactions, its primary function is that of a store of value.
Bitcoin has a mining protocol known as "Proof-of-Work." This indicates that a network of miners is responsible for carrying out the difficult computations required to keep the Bitcoin blockchain operational. Bitcoins that have just been created are the prize given to miners for their labor. Proof-of-Work is a feature that enables Bitcoin's transactional system to have a real-world value attached to it. One bitcoin is equivalent to a predetermined quantity of work done on computers.
Altcoins
Altcoins are essentially Bitcoin clones that have undergone a few tweaks here and there. A bitcoin fork is often the cause of these splits. Alternative cryptocurrencies come in a wide variety of flavors.
The underlying blockchain technology is a key point of differentiation between Bitcoin and other cryptocurrencies. The usage of some alternative cryptocurrencies is altered since the supply of such coins is not limited. A number of alternative cryptocurrencies have sped up the blockchain, which has the effect of accelerating mining as well as transaction times.
Alternate cryptocurrencies may also often be distinguished from one another by the technique of verification that is used to validate transactions. Miners are replaced by validators in alternative cryptocurrencies that employ the proof-of-stake consensus algorithm rather than the proof-of-work method. Mining with a proof-of-stake system uses a lot less energy and a lot fewer resources than mining with a proof-of-work system does, since miners using a proof-of-work system have to put in a lot more "work" in order to mine blocks.
The creation of smart contracts may also be accomplished using altcoins. The terms of these smart contracts may trigger their automated execution in specific circumstances. Because there is no need for the participation of a third party, they may be carried out right away. Because smart contracts may be used for deals as varied as those involving land, stocks, and gas, purchasing them can be a highly intriguing and profitable venture.
Tokens
Tokens are digital assets that may be exchanged for other digital assets or used inside smart contracts. They do not have a blockchain and are used on apps that are decentralized (dApps).
Mining, which results in the creation of a blockchain, serves as the actual embodiment of the money that is represented by crypto currencies. In a manner similar to this, central banks used to keep gold reserves in order to guarantee the value of their fiat currencies.
Tokens, on the other hand, are not meant to stand in for any particular item in the real world. Because they can be used to buy from decentralized applications (dApps) and because they can be used to gain discounts on fees and voting costs, their popularity is growing. A parallel may be drawn between this and the uncoupling of fiat currencies from the gold standard.
Conclusion
The level of participation in the cryptocurrency community, similar to that of any other currency, is what gives cryptocurrencies their value. A cryptocurrency's value increases when there is more demand for it than there is available supply. When a cryptocurrency has practical applications, more individuals will want to hold it, which drives up its demand. People do not want to sell it since they are interested in using it themselves. This indicates that there is more demand than supply, which leads to a rise in price.
FAQ
Does keeping bitcoin in a wallet make it more valuable? When kept in a wallet, the value of your digital currency might fluctuate over time, either increasing or decreasing. The price will fluctuate in accordance with market conditions, meaning that you will come out ahead if the value of this digital money goes up. On the other hand, it is irrelevant whether you keep your bitcoins in your own wallet or on an exchange.
Is it possible to get wealthy by creating your own cryptocurrency? Is it Possible to Earn an Income With Cryptocurrency? Yes, it is possible to generate income using cryptocurrencies. The inherent volatility of crypto assets makes most of them subject to a significant degree of risk, while others require specific education or experience in the relevant field. One way to answer the question "How can I make money with bitcoin?" is to trade cryptocurrencies.
What factors have an impact on the value of cryptocurrency? Like stocks, commodities, securities, and many other asset classes, cryptocurrencies may be traded like any other asset. The level of interest there is on the market in purchasing them, also known as demand, and the amount that is available to purchase, known as supply, are the two primary factors that determine their price. The price is determined by the connection between the two factors.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ ddf03aca:5cb3bbbe
2024-11-20 22:34:52Recently, I have been surrounded by people experimenting with various projects, and a common theme among them is the use of cashu as the payment layer. While this fact alone is already great, the best part is to identify users and implementers needs and combining forces to come up with novel solutions.
Subscriptions with Cashu
One of the most remarkable aspects of cashu is that it is a bearer asset. This hands ownership and control back to the user. Even though mints back the tokens, they have no authority to move a token on behalf of a user or any other party. How cool is that?
However, this also introduces challenges when building subscription-based services. Subscriptions typically require periodic payments, and with cashu, users must renew these manually. Currently, there are two primary approaches to address this:
-
Overpaying:
To minimize the number of interactions, users can pay for longer periods upfront. For example, instead of paying 2,100 sats for one hour, they could pay 6,000 sats for three hours. If they realize they don’t need the full three hours, the excess payment is effectively wasted. -
Full Interactivity:
In this setup, payers and receivers stay connected through a communication channel, and payments are made at small, regular intervals. While this avoids overpayment, it requires constant connectivity. If the connection is lost, the subscription ends.
Enter Locking Scripts
One of the most powerful features of cashu is its locking scripts. Let’s take a quick refresher. A locking script defines the conditions under which a token (or "nut") becomes spendable. In essence, it’s similar to Bitcoin’s spending conditions, but instead of being enforced by the Bitcoin network, these conditions are enforced by the cashu mint alone.
A widely-used locking condition is Pay-to-Public-Key (P2PK). This locks a token to a specific public key, meaning it can only be spent when a valid signature from the key’s owner is provided. This mechanism is what enables NIP-61 nut zaps, where a token can be publicly shared but is only claimable by the intended recipient who holds the private key.
To address situations where a recipient loses access to their keys or simply doesn’t claim the token, P2PK includes additional options: locktime and a refund key. These options allow for the inclusion of a fallback mechanism. If the primary lock expires after a set time, a refund key can reclaim the token.
With these tools, we can now create non-interactive payment streams!
One Missing Piece…
Before diving into payment streams, there’s one more crucial concept to cover: cashu tokens are not singular "things". Instead, they’re composed of multiple proofs, each carrying its own cryptographic data and spendability. For example, if you receive a cashu token made up of five proofs, you could choose to claim only three proofs and leave the other two untouched. This flexibility is rarely utilized but is vital for building payment streams.
The Grand Finale: Payment Streams
Now that we have all the building blocks, let’s construct a payment stream using cashu. By leveraging locking scripts, refund keys, and multiple proofs, we can design a token that enables recipients to claim small portions of the total amount at regular intervals—without requiring any further interaction from the sender.
Even better, as the sender, you retain the ability to cancel the stream at any time and reclaim any unspent portions.
Example: Renting a VPS
Imagine renting a VPS for a week, priced at 1,000 sats per day. Here’s how a payment stream could work:
- Construct a token worth 7,000 sats to cover the entire week.
- Divide the token into 7 proofs, each worth 1,000 sats.
- Lock each proof using a P2PK script, locking to your key and adding the recipients key as a refund key.
- The first proof has a locktime of
now
. - The second proof has a locktime of
now + 1 day
. - The third proof has a locktime of
now + 2 days
, and so on.
When the token is sent, the receiver can immediately claim the first proof since its locktime has expired and the refund key is now able to claim. The second proof becomes claimable after one day, the third after two days, and so on.
At the same time, the sender retains the ability to reclaim any unclaimed proofs by signing with their key. If you decide to stop using the VPS midweek, you can cancel the stream and reclaim the remaining proofs; all without further interaction with the receiver.
With this approach, we can create robust, non-interactive payment streams that combine the autonomy of cashu with the flexibility to reclaim funds.
Thank you for reading. Make sure to leave a nut if you enjoyed this :)
-
-
@ 0e501ec7:de5ef3a4
2024-11-20 21:52:58Deux hommes, fils et père, die graag gaan fietsen. Als echt professionele fietsers natuurlijk, vol in pak, snelle koersfietsen. Ik stond in hun straat te sukkelen met een platte band, ik had geen pomp, en geen vorken om mijn band op te heffen. De vader, Dominique, stopte en zei: t'as le pneu crevé? Monte avec nous! Daar syonden ze te wachten aan de open garagepoort. Ze hadden net 50km gedaan, op het gemak zeiden ze, ze hadden veel gebabbeld. Ze herstelden met veel plezier mijn band, we babbelden wat over mijn tocht, over fietsen, over wat erna. In gebrekkig Frans van mijn kant hé natuurlijk. Gaspard studeert meubelmaker (Menuserie). Dominique vroeg of ik water wou, ik zei eerst nee, dan ja, dan vroeg hij of ik nog iets wou, ik zei eerst nee, dan ja, en hij kwam terug met een zak vol fruit en repen. Ik aanvaarde ze, terugkrabbelen was het te laat voor en ik kon ze echt wel gebruiken. Hij zei: als je nog eens in de buurt bent, kom dan hallo zeggen, ik zei ja dan kunnen we samen een toertje maken. Ze vroegen nog of ik instagram had, en toen vertrok ik weer. Ik voelde me nog slecht over het aanvaarden van zo veel hulp, maar ach, wat een fijne ontmoeting.
-
@ 0e501ec7:de5ef3a4
2024-11-20 21:41:43Ik vertrok eergisteren bij Guillaume en Alice. Ik had niet de tijd om dit af te schrijven, ik werd onderbroken ik weet niet meer waardoor. Dus de dag voor eergisteren vertrok ik bij Guillaume en Alice. Over mijn verblijf daar zal ik later schrijven. Het is ondertussen half 11, 20 november, een maand voor het einde van de Herfst. Ik zit op de trein richting Gent, met fiets en al. Deze reis, of deze etappe van de reis is over. Binnen een uurtje toch. Dan ga ik lekker naar mijn eigen bed, en slaap ik een goeie warme nacht. Het gaat vreemd zijn om weer alleen in een kamer van steen te slapen, al is dat eigenlijk altijd vreemd. Ik ga proberen daar genoeg tijd voor mezelf te pakken, en de dingen die ik geleerd heb niet te vergeten. Ik ga schrijven en voelen ipv te vluchten in Schermtijd. Want ik kan mijn gewoontes veranderen!
Maar nu dus, de laatste dagen van de tocht. Zondag vertrok ik, het was moeilijk afscheid te nemen, ik vind afscheid eigenlijk altijd moeilijk. Maar het is goed om in beweging te blijven, daar ben ik zeker van. Het was dus tijd om te vertrekken, ook omdat ik voelde dat de allergie van het stof (verbouwingen) en de kat mij aan het uitputten was. Tegen dat ik eindelijk op de fiets zat was het al middag, Tim had mij op het laatste nog geholpen om een een verloren bout te kunnen vervangen, mijn zijn daadkracht en improvisatietalent. Het was een mooie fietstocht die dag, en ik heb er zeer van genoten om alleen te fietsen. Ik reed eerst een paar keer mis, en kwam toen bij de bakker aan waar ik baguettes kocht en mijn telefoon liet opladen. Ik dacht veel na, in ontspannen toestand, waarbij ik echt voelde dat ik aan het verwerken was. Soms had ik de neiging om mijn gedachten te proberen onderdrukken, om meer op te letten op de omgeving. Mar onderdrukken is niet leuk, dus probeerde ik gewoon een beetje af te wisselen tussen wegdromen en aandachtig zijn. Dat werkte! Ik schreef zelfs een beetje tijdens de pauzes, wat ik ook heel leuk vond. Op een ander moment wou ik een gedachte of drie echt wel vastleggen tijdens het fietsen, en maakte ik een voice-opname. Eigenlijk was dat ook best leuk :), om zo tegen jezelf te babbelen en weten dat je het binnen onbepaalde tijd weer zal kunnen horen.
Een van mijn pauzes was in een klein associatief cafeetje, dat vroeger een station was (het fietspad was een oud treinspoor, prachtig en rustig fietsen verzekerd!). Ik kocht wat nootjes en dronk een warme choco. Toen ik buitenkwam regende een beetje, en stond de zon laag, zodat het licht geel oranje goud was. Toen ik mij omdraaide zag ik zelfs een regenboog. Toen, en op meerdere momenten, voelde ik echt kriebels in mijn buik voor het landschap en alles dat erbij hoorde. Echt een soort vreugde van samenzijn! Het landschap, de mooie Bocage, en ik.
In de avond kwam ik toe in Caen, het was al donker, en ik had echt een sciencefiction gevoel bij het toekomen in de Woonplaats van de Mens, na de lange tocht door de velden en bossen. De Mens, met zijn gebouwen van Steen, met zijn wegen en drukke verplaatsingen, zijn vele lichtjes. Het voelde vreemd en vertrouwd. Snap je wat ik bedoel? Ik sliep die nacht bij Ilan en zijn familie, Ilan is een jonge low-tech ingenieur die zijn eigen brood bakt en van techno houdt. Echt een top kerel. Ik voelde me goed op mijn gemak daar, en heb veel in het frans gebabbeld!!
-
@ 599f67f7:21fb3ea9
2024-11-20 21:25:38¿Qué es un canal?
Un canal Lightning es simplemente una multifirma 2-de-2 en la cadena. Para abrir un canal, solo enviamos fondos a una transacción multifirma 2-de-2. Esto crea un UTXO y el canal está abierto hasta que este UTXO se gaste. Durante la vida del canal, se crean un montón de transacciones que gastan doblemente la transacción de financiamiento, pero eventualmente una (y solo una) de estas se publicará en la cadena para cerrar el canal. Así que, idealmente, un canal Lightning condensa efectivamente un montón de transacciones en dos transacciones en la cadena: la que lo abre y la que lo cierra. Podríamos decir que así es como Lightning "eleva" las transacciones fuera de la cadena.
Creando un canal
Una transacción de financiamiento para un canal entre Alice y Bob es simplemente una transacción que tiene una salida como sigue:
2 <pubkeyA> <pubkeyB> 2 OP_CHECKMULTISIG
Donde
<pubkeyA>
es la clave pública de Alice y<pubkeyB>
es la de Bob. Entonces, si Alice quiere abrir un canal con Bob, ¿simplemente le envía fondos al script anterior?La respuesta es no, es un poco más complicado que eso. Existe la posibilidad de que Bob desaparezca para siempre y nunca vuelva a firmar ninguna transacción que intente gastar de la transacción de financiamiento. Esto significa que, efectivamente, los fondos de Alice quedarían atrapados en este UTXO para siempre. ¡No es ideal!
Aquí es donde entra una transacción de compromiso. Cubriremos la transacción de compromiso con más detalle en el futuro, pero por ahora lo importante que hay que saber es que una vez que una transacción de financiamiento es confirmada, las transacciones de compromiso definen el estado del canal (es decir, cómo se distribuyen los fondos entre los participantes del canal). Así que, esencialmente, cada transacción de compromiso gasta la transacción de financiamiento como entrada y tiene salidas que definen la distribución de fondos entre los participantes del canal.
Para ver cómo se utilizan estos dos conceptos para negociar la apertura de un canal, se intercambiará una serie de mensajes entre los nodos de Alice y Bob, como se muestra en el diagrama a continuación.
Es un poco como negociar un contrato; cada parte solo firma cuando está contento con los términos. Vamos a revisar cada uno de estos mensajes con más detalle.
open_channel
Alice envía este mensaje a Bob para indicar que quiere abrir un canal con él. Este mensaje contiene varios detalles sobre los requisitos de Alice para el canal. El más importante es
funding_pubkey
. Esta es la clave pública que Alice tiene la intención de usar como su clave pública en el script de la transacción de financiamiento.accept_channel
Si Bob está contento con los requisitos que Alice ha presentado en su oferta de canal, puede enviar de vuelta el mensaje
accept_channel
, que también contiene algunos de sus requisitos junto con sufunding_pubkey
.En este punto, Alice tiene todo lo que necesita para construir la transacción de financiamiento. Sin embargo, aún no tiene garantía de que Bob no desaparecerá, lo que haría que sus fondos no se pudieran gastar. Por lo tanto, aún no transmite la transacción de financiamiento. En cambio, lo que necesita es una transacción de compromiso firmada por Bob que gaste de la transacción de financiamiento y divida el saldo del canal en consecuencia. La transacción de financiamiento podría asignar algunos fondos a Bob también, por lo que Bob también querría una transacción de compromiso válida firmada por Alice, en caso de que ella desaparezca.
Entonces, lo que Alice hace ahora es construir la transacción de financiamiento y enviar a Bob el siguiente mensaje:
funding_created
Este mensaje contiene el TXID de la transacción de financiamiento, el índice de salida relevante de la transacción de financiamiento junto con una firma de la transacción de compromiso de Bob. Alice puede construir la transacción de compromiso exacta de Bob utilizando la información que ya conoce.
Ten en cuenta que Bob no puede hacer nada aún con su transacción de compromiso porque está gastando de una transacción que aún no está en la blockchain.
funding_signed
Si Bob está contento, entonces puede enviar a Alice un mensaje
funding_signed
, que contiene la firma de Bob para la transacción de compromiso de Alice.Ahora, Alice tiene una transacción de compromiso válida firmada por Bob que puede usar para gastar sus fondos de vuelta a sí misma en caso de que Bob desaparezca. Por lo tanto, es seguro para ella transmitir la transacción de financiamiento.
channel_ready
Tanto Alice como Bob estarán ahora observando la blockchain esperando que la transacción de financiamiento alcance el número deseado de confirmaciones. Una vez que cada uno lo vea, se enviarán mutuamente el mensaje
channel_ready
que contiene el ID del canal.¡El canal ahora está abierto y listo para transacciones!
Revisión
Terminaremos con un breve resumen de los conceptos importantes que hemos aprendido en este capítulo. Siéntete libre de volver aquí en el futuro en caso de que necesites un recordatorio.
- canal: un contrato multifirma 2-de-2 en la cadena utilizado para elevar transacciones fuera de la cadena
- transacción de financiamiento: una transacción multifirma 2-de-2 con un script de salida P2WSH que contiene las claves públicas de ambos participantes del canal
- transacción de compromiso: una transacción que define el estado de un canal, es decir, la distribución de fondos entre los participantes del canal
Referencias
- BOLT2
- LN Things Part 1: Creating a channel por nostr:nprofile1qqswrt9pnxatlplu49h6meld8svmwqt87wwvk256rqk07n6eu4qeh5gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dszpfjtz
-
@ 4fcac000:d2b37988
2024-11-20 20:31:04** Двадцать лет назад «Умный город» был лишь амбициозным проектом. Сегодня он стал реальностью. Как бы вы охарактеризовали текущее состояние системы?**
Действительно, путь был долгим, но, как видите, успешным. Сегодня «Умный город» Тюмени — это не просто набор отдельных технологий, а взаимосвязанная экосистема, оптимизирующая все аспекты городской жизни. Мы гордимся результатами: значительным снижением уровня выбросов CO2 благодаря повсеместному внедрению возобновляемых источников энергии и электротранспорта, практически полным отсутствием пробок благодаря интеллектуальной системе управления дорожным движением и, конечно же, повышением уровня жизни горожан за счет удобных цифровых сервисов и доступности информации.
Какие из реализованных проектов вы считаете наиболее успешными и почему?
Несомненно, одним из главных достижений является интеграция системы «Умный дом» во все муниципальные здания и значительную часть частного сектора. Это позволило оптимизировать энергопотребление, повысить безопасность и комфорт жителей.
А что нас ждет в будущем? Какие направления развития системы «Умный город» вы видите в ближайшие десятилетия?
Мы планируем дальнейшее совершенствование существующих систем и внедрение новых инновационных решений в области искусственного интеллекта, больших данных и блокчейна. В центре внимания — совершенствование системы управления транспортом, создание полностью автоматизированной сети общественного транспорта, внедрение персонализированных сервисов в сфере образования, здравоохранения и культуры. Наше главное направление — повышение качества жизни горожан за счет устойчивого и интеллектуального развития Тюмени.
** В чём заключается самая большая польза, которую Тюмень получила от своей инициативы «Умный город»?**
Самым большим преимуществом является заметное улучшение качества жизни жителей, в первую очередь за счёт снижения загруженности дорог и повышения эффективности городских служб. Это приводит к сокращению времени в пути, уменьшению загрязнения окружающей среды и, в конечном счёте, к увеличению свободного времени и улучшению здоровья граждан.
В чем будущее Тюмени?
Будущее Тюмени — в умных технологиях и ответственном подходе к развитию.
-
@ 4874b840:31b0b8c0
2024-11-20 19:10:2111 декабря в центре города произошло ДТП с участием беспилотного такси, запущенного накануне. По предварительным данным, автомобиль столкнулся с легковым транспортным средством на перекрестке.
К счастью, в результате аварии никто не пострадал. Оба автомобиля получили незначительные повреждения. По информации представителей компании "Калининград Авто", инцидент произошел из-за ошибки в алгоритме навигации, которая привела к неправильному определению дорожной ситуации.
Компания уже начала расследование и обещает внести необходимые коррективы в систему, чтобы избежать подобных случаев в будущем. Водители и пассажиры беспилотных такси продолжают пользоваться услугой, несмотря на инцидент.
-
@ 6bae33c8:607272e8
2024-11-20 18:49:54It’s fun to do this when you’re on a roll, but after blowing Q3 with a 1-4 week, I feel like Kamala Harris when she had to pivot to the “Hitler” smears — the joy is gone!Seriously though, there’s nothing else to do but get back on the bull.
Steelers at Browns — I imagine this will be something like Steelers -6.5, but I like the Browns here at home off the short week against a team that just beat its main division rival. I won’t use it though because it’s a Thursday game, and I like to get my picks in Friday night.
Chiefs at Panthers — Chiefs -8.5 is my guess. I’d probably stay away, but if I used it I’d take the Chiefs off their loss to the Bills.
Vikings at Bears — The Bears lost in the most brutal way last week. I’ll say Vikings -1.5 and stay away.
Titans at Texans — I’ll make this Titans +8.5 and probably avoid.
Lions at Colts — Let’s go Lions -8 and probably take the Colts. The Lions are great, but this is a good sell-high.
Patriots at Dolphins — Let’s say Patriots +6.5 and stay away. I like both teams of late.
Buccaneers at Giants — Make it Bucs -6. Tommy DeVito is tank mode. Maybe take the Bucs.
Cowboys +8 at Killer Redskins — This is a stay away, but if I had to pick (which I do in my pool), I’ll probably take the KRs.
Broncos at Raiders — The Broncos are actually decent. I’ll make it -5.5, but probably hold my nose and take the Raiders if pressed.
49ers at Packers — 49ers coming off a brutal loss, Packers a lucky win. This depends somewhat on the statuses of Nick Bosa and George Kittle, so I’ll guess 49ers +1.5 and stay away for now.
Cardinals at Seahawks — I’ll say Cardinals -2.5 and lay the wood. Cardinals are good.
Eagles at Rams — I’d say Eagles -1.5 and probably take the Rams. The Eagles are a sell-high.
Ravens at Chargers — I’d make it Ravens -2.5 and lay the wood. The Ravens should have won last week in Pittsburgh.
-
@ f8a5df57:b7a58cd4
2024-11-20 17:12:45ьт
-
@ f8a5df57:b7a58cd4
2024-11-20 17:11:58ит
-
@ f8a5df57:b7a58cd4
2024-11-20 17:10:13п
-
@ f4bf1fb5:b428f8d5
2024-11-20 17:05:05On DEG Mods, mod creators and enjoyers can benefit from tips, allowing them to earn money directly from those who appreciate their work or comments, and 100% of what's tipped goes to the one being tipped (excluding the processing fee of the transaction, which is extremely negligible). We don't take any percentage of this process, unless you choose to and at whichever amount you like.
Did you discover a mod that you found enjoyable, useful, or intriguing, and you'd like to show your appreciation with a $10 tip? You can do that. Choose to give 100% of your tip directly to the creator, or opt for a 90% share for them, with the remaining 10% supporting DEG Mods. You can also reverse the split if you prefer. It's entirely up to you how you'd like to allocate the tip.
The elephant in the room
Yes, we're using Bitcoin as the main currency and monetary system on the site, and we're aware of the general public's perception of Bitcoin and the general Cryptocurrency space. We have pretty solid reasons why we're utilizing Bitcoin as the monetary infrastructure for DEG Mods instead of traditional payment systems with fiat currency, like USD/EUR, and the banking system, like Visa or Mastercard.
DEG Mods is built around the idea of censorship-resistance and being permissionless, not just anti-censorship, with that in mind, we didn't want to use a system, and in this case a monetary system, where some third party can come in and threat the site, its users and creators, to self-censor or else suffer the consequences of everyone's money frozen, stolen, or not being able to send or receive. There are many examples of such cases.
We wanted to use something where people actually own their money, not have it controlled by anyone, and have people freely transact with anyone they want, whenever they want, with whichever amount they want to utilize, and not worry about any kind of censorship.
That's why why we went with Bitcoin, with the utilization of the Lightning Network. All of this is possible with it. And we didn't go with any other Cryptocurrency, not even create our own currency and massively benefit from it, because we wanted to use the most trusted, verifiably sound, and strongest currency in the world that's the most censorship-resistant one out there, and not a potential one where people would have a higher chance of thinking that its a scam. That's why, generally speaking, many differentiate between 'Bitcoin' and 'Crypto'.
Properly used, you completely own your money, and nobody can take it away from you or stop you from transacting with others. Now, let's get back on topic.
How to set up and enable getting tips
You need to download and install a Bitcoin Lightning Wallet app (suggestions: Lifpay or Wallet of Satoshi) on your mobile device, where where it supports and provides you with a Lightning address. Once you have obtain such an address, you can go ahead and add that to the 'Lightning Address' field in the profile settings page on DEG Mods.
After that, save/publish your changes and you're done. People can now tip you directly on your profile or tip you via your mod posts.
How to exchange your tipped Bitcoin to other currencies like USD/EUR
So you got tipped a few times and feel like you want to exchange what you've received so far into other currencies to spend them. We won't have a full-blown guide on this, at least not now, but the general idea is that you'd go to an exchange site/app (Suggestion: Binance, or if you're in the USA then CashApp or Strike might work better for you), send them there, and have them exchanged there to whatever currency you like, then withdraw it to your bank or payment service that you use (or keep them there if its already the payment system you use already).
You can also go to physical exchange stores if they support the exchange of that currency in your country.
How to tip creators and other users
As a user that wants to tip creators or other users, you'd do that by first having a Bitcoin Lighting Wallet (similar suggestions as shared above), and then you'd need to fill that up, which is basically the reverse process of above, and once you have an amount of Bitcoin (or 'Sats', think 'Cents') in your Wallet app, you can now go ahead and start tipping creators or other users.
You tip others by tapping on the lightning icon you'll see throughout the site, either for a comment, a profile, or a mod post next to the reaction buttons, which will trigger a popup asking you to enter an amount in Sats and then you'd generate the QR code. In your Wallet app, tap the send button and scan that QR and send away. Done.
Keep in mind that other users or creators might tip you, so you don't necessarily have to go through that process of exchanging traditional currencies to Bitcoin/sats, so its definitely worth at least obtaining a Bitcoin Lightning Address and adding it your 'account' here on DEG Mods, in the off chance that someone tips you when you comment on a post for example. Why leave money on the table, as they say.
Questions and Answers
We'll continue updating this blog post when new information comes along, but here are some questions and answers regarding this topic.
Did you really have to use Bitcoin/Crypto? Why couldn't you have PayPay, Stripe, or some other traditional payment method?
This is answered at the start of this post, but in gist: So we, creators, and users, aren't screwed over and be forced to censor ourselves.
Do I have to use Bitcoin?
No, you can use DEG Mods without ever touching it, and you can also add your own payment links (like PayPal, CashApp, Kofi, Patreon, etc) in your profile (we'll be adding a linktree-like system at some point to make this process easy), and people can easily find those link and tip you there, though those tip buttons are only for Bitcoin.
Will there be more ways to get money later, or is it just tipping mod posts and profiles?
Yes, there'll be more ways for creators to acquire money from users in the future, for reasons other than 'thank you creating this mod'.
-
@ ac8bb9b0:70278acc
2024-11-20 16:28:11Chef's notes
Optional: Creamy Cilantro-Basil Ranch: In a blender, blend 1/2 cup plain Greek yogurt or sour cream, 1/3 cup mayo, 2 tablespoons buttermilk, 1 cup fresh cilantro, 1/2 cup fresh basil, 1/4 cup fresh chopped chives, 2 teaspoons Worcestershire, 1 teaspoon garlic powder, 1 teaspoon onion powder, 1/4 teaspoon cayenne, and a pinch each of kosher salt and black pepper. Blend until creamy.
Details
- ⏲️ Prep time: 15
- 🍳 Cook time: 15
Ingredients
- 4 (4-6 ounce) salmon filets, cut into bite-size chunks
- 6 tablespoons extra virgin olive oil
- 1 teaspoon smoked paprika
- salt and black pepper
- 1 bunch asparagus, ends trimmed
- 1/2 cup honey
- 2-3 tablespoons hot sauce
- 1-3 teaspoons cayenne pepper
- 3/4 teaspoon chipotle chili powder
- 1/2 teaspoon garlic powder
- 1/2 teaspoon onion powder
- 3-4 cups cooked rice
- 2 avocados, diced
- 1 serrano or jalapeño, sliced
- 1/2 cup fresh cilantro, chopped
- 2 tablespoons chopped fresh dill
- 1/2 cup crumbled feta cheese
- 2 tablespoons extra virgin olive oil
- 1 tablespoon lemon juice
- 1/3 cup toasted seeds, pumpkin, sesame, sunflower, etc.
Directions
-
- Preheat the oven to 450° F.
-
- On a baking sheet, toss the salmon pieces with 3 tablespoons olive oil, paprika, salt, and pepper. Arrange in a single layer. On the other side of the pan, add the asparagus. Toss with 1 tablespoon olive oil, salt, and pepper. Roast 10-15 minutes or until the salmon is just undercooked to your liking.
-
- Meanwhile, make the hot honey. In a sauce pot, warm together the honey, hot sauce, cayenne, chili powder, onion powder, and garlic powder, plus a pinch of salt.
-
- Spoon some of the hot honey over the salmon. Switch the oven to broil and broil until lightly charred and crispy. Spoon over additional hot honey, to your taste.
-
- To make the avocado salsa. Combine avocados, serrano or jalapeño, cilantro, dill, feta cheese, extra virgin olive oil, lemon juice, and toasted seeds in a bowl and season with salt, gently tossing.
-
- Arrange the salmon and asparagus over bowls of rice. Top with salsa.
-
@ ac8bb9b0:70278acc
2024-11-20 16:25:18Details
- ⏲️ Prep time: 25
- 🍳 Cook time: 20
- 🍽️ Servings: 6
Ingredients
- 1 tablespoon extra virgin olive oil
- 1 medium yellow onion chopped (about 1 1/2 cups)
- 2 teaspoons kosher salt, divided
- 3 tablespoons red curry paste
- 2 tablespoons grated fresh ginger (from a 3-inch piece)
- 3 medium cloves garlic, minced (about 1 tablespoon)
- 4 cups lower-sodium vegetable broth
- 1 1/2 pounds butternut squash, cut into 1 1/2-inch cubes (from 2 [20-ounce] package)
- 1 15.5-ounce can unsweetened coconut milk, well stirred
- 2 tablespoons fresh lime juice (from 1 or 2 limes)
- 6 tablespoons crushed salted peanuts
- Chopped fresh cilantro and crushed red pepper (optional), for serving
Directions
- Heat oil in a large pot over medium. Add onion and 1/2 teaspoon salt; cook, stirring often, until onion starts to brown, 6 to 7 minutes.
- Add curry paste, ginger, and garlic; cook, stirring, until fragrant, about 1 minute. Add broth and 1 teaspoon salt, scraping up browned bits from bottom of pot. Stir in squash. Bring to a simmer over medium-high. Cover and reduce heat to low; simmer until squash is tender, 12 to 15 minutes.
- Remove from heat. Stir in coconut milk, lime juice, and remaining 1/2 teaspoon salt. Use an immersion blender to process until smooth. (Or transfer to a blender, cover with lid, and remove center piece. Place a towel over opening. Process until smooth.)
- Serve sprinkled with peanuts, cilantro, and, if using, crushed red pepper.
-
@ 8d34bd24:414be32b
2024-11-20 16:16:25I’ve been studying a lot about end times prophecy because so much seems to be coming together and I believe our time left is short. I’m listening to a sermon series on Daniel and another on Revelation. I’m doing a Bible study on Revelation with the ladies at my church. In general I think our women’s Bible study curriculum is too focused on symbology and isn’t focused enough on what Revelation means for us and our future, but it has been good at pointing me at verses that have clarified my understanding of Revelation.
When trying to understand end times, I keep going back to “Who is Babylon the Great?” As I’ve been reading, I’ve been seeing things that may be clues. I’ll admit that I am not 100% certain in my interpretations, so I’m open to other interpretations and I don’t want anyone to take what I have to say as set in stone. That being said, when I consider what is happening in the world today and what Scripture predicts, the ideas I am about to present really seems to make sense. Hopefully this study will be useful to you even if you don’t agree with my conclusions. I do try to back all of my speculation with Scripture.
Revelation 17-18
I’ve always read Scripture and wondered, “Why is the US not mentioned?” I’ve usually assumed the US has to either be made unimportant on the world stage or be broken up into smaller countries (which is believable with how divided the nation has become). I’m now starting to wonder if the US is mentioned in end times prophecy, but I didn’t see it because it isn’t how I want to think of my country.
And he carried me away in the Spirit into a wilderness; and I saw a woman sitting on a scarlet beast, full of blasphemous names, having seven heads and ten horns. The woman was clothed in purple and scarlet, and adorned with gold and precious stones and pearls, having in her hand a gold cup full of abominations and of the unclean things of her immorality, and on her forehead a name was written, a mystery, “BABYLON THE GREAT, THE MOTHER OF HARLOTS AND OF THE ABOMINATIONS OF THE EARTH.” (Revelation 17: 3-5)
When reading this passage, the first thought is who or what is “Babylon the Great?” Is it a reincarnation of historical Babylon? Historical Babylon was situated in the center of what is modern Iraq. Does that make sense? It doesn’t to me. Is “Babylon the Great” just a figurative representation of evil? I don’t think so, because there are too many references to literal things for that to make sense. Is “Babylon the Great” a different city or nation? I believe this is the most probably interpretation.
And he said to me, “The waters which you saw where the harlot sits, are peoples and multitudes and nations and tongues. And the ten horns which you saw, and the beast, these will hate the harlot and will make her desolate and naked, and will eat her flesh and will burn her up with fire. For God has put it in their hearts to execute His purpose by having a common purpose, and by giving their kingdom to the beast, until the words of God will be fulfilled. The woman whom you saw is the great city, which reigns over the kings of the earth.” (Revelation 17:15-18) {emphasis mine}
Revelation talks of ten horns, being ten kings/kingdoms, that will then hand their authority over to the beast to rule the whole world. Do the ten kings, who give their kingdoms to the beast turn on Babylon because Babylon doesn’t want to submit to the Beast’s worldwide kingdom, but retain her own power? This passage sounds like the 10 horns and the beast will turn on “Babylon the Great” because Babylon will not join the beast’s system. Will it not join because it hates evil? Definitely not! Babylon is referred to as a harlot. The previous passage says, Babylon has “in her hand a gold cup full of abominations and of the unclean things of her immorality,” and that Babylon is “THE MOTHER OF HARLOTS AND OF THE ABOMINATIONS OF THE EARTH.” Why would Babylon the Great not join the rest of this evil cohort? Would it be that Babylon the Great was the world’s only super power and it doesn’t want to give up that power? Now that sounds very believable.
Now I put forth this premise that I don’t want to be true. What world super power currently exists that is resisting joining in a one world government? That sounds a lot like the US, but let us continue to see if this similarity becomes more obvious.
And he cried out with a mighty voice, saying, “Fallen, fallen is Babylon the great! She has become a dwelling place of demons and a prison of every unclean spirit, and a prison of every unclean and hateful bird. For all the nations have drunk of the wine of the passion of her immorality, and the kings of the earth have committed acts of immorality with her, and the merchants of the earth have become rich by the wealth of her sensuality.”
I heard another voice from heaven, saying, “Come out of her, my people, so that you will not participate in her sins and receive of her plagues; for her sins have piled up as high as heaven, and God has remembered her iniquities. Pay her back even as she has paid, and give back to her double according to her deeds; in the cup which she has mixed, mix twice as much for her. To the degree that she glorified herself and lived sensuously, to the same degree give her torment and mourning; for she says in her heart, ‘I sit as a queen and I am not a widow, and will never see mourning.’ For this reason in one day her plagues will come, pestilence and mourning and famine, and she will be burned up with fire; for the Lord God who judges her is strong. (Revelation 18:2-8) {emphasis mine}
Every time I read Revelation 18, I become more convinced that Babylon the Great is likely to be the US.
Let’s start with “For all the nations have drunk of the wine of the passion of her immorality, and the kings of the earth have committed acts of immorality with her.” The US has used its wealth and power to influence nearly every nation in the world. The US gives “aid,” but always with strings attached. They’ll give aid if the nation will support gay marriage. They’ll give aid if the nation will encourage gender transitions. They’ll give aid if the nation will join in a war against a nation that doesn’t do what the US tells it to do. This money for immorality is rampant, but not obvious to everyone because the media doesn’t advertise these actions.
“and the merchants of the earth have become rich by the wealth of her sensuality.” The US is known for her excesses. The government overspends. Her businesses overspend. Her citizens overspend and they believe they are in absolute poverty if they don’t have a car for every adult, a cell phone for everyone over 6, high speed internet, big screen TVs, etc. Even most of the poor in the US have no idea what real poverty looks like. The US buys tons of stuff from nations around the world and the “merchants of the earth have become rich by the wealth of her sensuality.” Has there ever been a nation throughout all of history that lived so extravagantly?
In the previous passage in Revelation 17, it states, “in her hand a gold cup full of abominations and of the unclean things of her immorality.” Could the golden cup be a reference to all of the blessings given to the US since her founding and how the US was founded on Biblical principles, but instead of using the spiritual, geographic, and economic blessings, the US turned to “abominations and of the unclean things,” all of the evils now pushed by the US government, US schools, and US media?
Sadly, “God has remembered her iniquities,” and “To the degree that she glorified herself and lived sensuously, to the same degree give her torment and mourning.” How much does this following verse sound like the US government and US citizens? “I sit as a queen and I am not a widow, and will never see mourning.” They can’t comprehend that the US will ever be anything other than the most powerful nation in the world — militarily, economically, and even morally.
When Babylon the Great is destroyed, Revelation 18 states:
“And the merchants of the earth weep and mourn over her, because no one buys their cargoes any more— cargoes of gold and silver and precious stones and pearls and fine linen and purple and silk and scarlet, and every kind of citron wood and every article of ivory and every article made from very costly wood and bronze and iron and marble, and cinnamon and spice and incense and perfume and frankincense and wine and olive oil and fine flour and wheat and cattle and sheep, and cargoes of horses and chariots and slaves and human lives. The fruit you long for has gone from you, and all things that were luxurious and splendid have passed away from you and men will no longer find them. The merchants of these things, who became rich from her, will stand at a distance because of the fear of her torment, weeping and mourning, saying, ‘Woe, woe, the great city, she who was clothed in fine linen and purple and scarlet, and adorned with gold and precious stones and pearls; for in one hour such great wealth has been laid waste!’ And every shipmaster and every passenger and sailor, and as many as make their living by the sea, stood at a distance, and were crying out as they saw the smoke of her burning, saying, ‘What city is like the great city?’ And they threw dust on their heads and were crying out, weeping and mourning, saying, ‘Woe, woe, the great city, in which all who had ships at sea became rich by her wealth, for in one hour she has been laid waste!’ (Revelation 18:11-19) {emphasis mine}
The saddest point is how Babylon the Great will be destroyed. What hints do we get? From Revelation 17, we read, “she will be burned up with fire.” From Revelation we read, “in one hour such great wealth has been laid waste!”, “they saw the smoke of her burning,” and again “in one hour she has been laid waste!” What could “lay waste” a great nation “in one hour” “with fire?” If all of the nuclear nations in the world (the ten horns and the beast) turned their nuclear weapons on the US and fired simultaneously, this is exactly what you would see.
We’re going to look at another passage and see what else we can find. This next passage I had not previously associated with Babylon the Great, but now think it does refer to both historical Babylon and Babylon the Great.
Jeremiah 50-51
The prophecies in Jeremiah chapters 50 & 51 seem to be predicting two events. One has already happened (Babylon being conquered by the Persians and Israel returning home after a 70 year exile) and one that has not happened (seems to parallel Revelation and what it says about Babylon the Great). Some of the prophecies against Babylon have clearly happened when Persia conquered Babylon. Some of the prophecies here do not seem to have been fulfilled. There are numerous examples of similar situations in predictions of the coming of the Messiah that predict both the first incarnation of Jesus and the 2nd coming at the end of the age. I believe these passages fit that pattern.
Jeremiah 50 & 51 talks about the mother of Babylon and the daughter of Babylon. My theory is that the mother of Babylon is the historical Babylon on the Euphrates River that conquered Israel and took away its people. My more speculative theory is that the daughter of Babylon is the same as Babylon the Great in Revelation. I also am speculating that the evil spirits that influenced historic Babylon will be influencing Babylon the Great in the end times.
Your mother will be greatly ashamed,\ She who gave you birth will be humiliated.\ Behold, she will be the least of the nations,\ A wilderness, a parched land and a desert.\ Because of the indignation of the Lord she will not be inhabited,\ But she will be completely desolate;\ Everyone who passes by Babylon will be horrified\ And will hiss because of all her wounds.\ Draw up your battle lines against Babylon on every side,\ All you who bend the bow;\ Shoot at her, do not be sparing with your arrows,\ For she has sinned against the Lord.\ Raise your battle cry against her on every side!\ She has given herself up, her pillars have fallen,\ Her walls have been torn down.\ For this is the vengeance of the Lord:\ Take vengeance on her;\ **As she has done to others, so do to her. (Jeremiah 50:12-15) {emphasis mine}
In Revelation 17-18 we read about Babylon the Great being destroyed in an hour with fire. This passage states, “All you who bend the bow; Shoot at her, do not be sparing with your arrows.” If you were writing a prophecy about a nuclear attack, to people back in the 600s B.C., how would you write it? Would you maybe mention arrows and bows because they are shot from a distance? Does “All you who bend the bow; Shoot” suggest all nations with nuclear weapons? Maybe.
“Summon many against Babylon,\ All those who bend the bow:\ Encamp against her on every side,\ Let there be no escape.\ Repay her according to her work;\ According to all that she has done, so do to her;\ For she has become arrogant against the Lord,\ Against the Holy One of Israel.\ Therefore her young men will fall in her streets,\ And all her men of war will be silenced in that day,” declares the Lord.\ “Behold, I am against you, O arrogant one,”\ Declares the Lord God of hosts,\ “For your day has come,\ The time when I will punish you.\ The arrogant one will stumble and fall\ With no one to raise him up;\ And I will set fire to his cities\ And it will devour all his environs.” (Jeremiah 50:29-32) {emphasis mine}
I’ve heard many Americans complain that the French are arrogant. They say this, because the French get upset at loud, self absorbed Americans traveling to France and expecting all of the French to speak English. Shouldn’t the people visiting a country at least make an attempt to speak the language of the nation they are visiting?
Americans are known for their arrogance. It is assumed that everyone will know what is happening in America. It is assumed that everyone will speak English to Americans. It is assumed that everyone will be best off if they have a government and culture exactly like ours. It is assumed that the US will always be the most powerful economically and militarily and that nothing we do will change that. Honestly, I don’t think it is possible for a nation to be more arrogant. As an American, I say all of this with sadness
A sword against their horses and against their chariots\ And against all the foreigners who are in the midst of her,\ And they will become women!\ A sword against her treasures, and they will be plundered!\ A drought on her waters, and they will be dried up!\ For it is a land of idols,\ And they are mad over fearsome idols. (Jeremiah 50:37-38) {emphasis mine}
Historical Babylon brought foreigners, who they conquered, back to Babylon and integrated them into their culture. The US has historically let in foreigners and integrated them into her culture. In the past, the US was referred to as a melting pot. Now the foreigners are coming in, but they frequently are not coming in legally and they are frequently not integrating into American society. Many are coming in for freebies or even to do harm to the US. Whatever the case, the division over what to do with all of the illegal aliens entering is dividing the US.
For most of my life, when I read “they will become women,” I assumed that meant the men would become weak and/or fearful, but could this refer to men actually trying to become women by chemical and surgical means? Maybe. God knew this craziness would occur. It may have surprised me, but it didn’t surprise God.
We don’t normally think of Americans as worshipping idols. They don’t normally worship a manmade statue, but they do worship idols, i.e. politicians, athletes, singers, influencers, media, and worldwide power & influence. Sadly, most Americans worship anything and everything except their creator God.
They seize their bow and javelin;\ They are cruel and have no mercy.\ Their voice roars like the sea;\ And they ride on horses,\ Marshalled like a man for the battle\ Against you, O daughter of Babylon. (Jeremiah 50:42) {emphasis mine}
This passage seems very similar to the Revelation 17:15-18. Many nations will attack from a distance, with “bow and javelin.” They will be “cruel and have no mercy … Against you, O daughter of Babylon.” By referring to “daughter of Babylon,” I believe this passage is not referring to historical Babylon, but a nation yet to come, that I am suggesting may be the US.
I will dispatch foreigners to Babylon that they may winnow her\ And may devastate her land;\ For on every side they will be opposed to her\ In the day of her calamity. (Jeremiah 51:2) {emphasis mine}
Could this passage mean the US will be attacked from within by the mass of foreigners in her land while her enemies from beyond her borders attack militarily and economically? Maybe. We do have illegal aliens, illegally entering the nation and being provided for with the hard earned money of American taxpayers to the point of bringing the economy to the breaking point.
Flee from the midst of Babylon,\ And each of you save his life!\ Do not be destroyed in her punishment,\ For this is the Lord’s time of vengeance;\ He is going to render recompense to her.\ *Babylon has been a golden cup in the hand of the Lord*,\ Intoxicating all the earth.\ The nations have drunk of her wine;\ Therefore the nations are going mad**. (Jeremiah 51:6-7) {emphasis mine}
When I read “The nations have drunk of her wine; Therefore the nations are going mad,” I think of how the nations submit to the insane requests made by the US if the nations want her money, loans, weapons, and friendship. So many of the ungodly evils in our nation are pushed on the nations of the globe through American aid and sanctions. Many nations have turned to promoting anti-God actions in order to receive US aid and protection.
I hate thinking this about my nation. I hate seeing what was started as a God fearing nation based on good principles become the largest purveyor of evil in the world. I don’t want the US to be Babylon the Great, but it at least has a lot in common with Babylon the Great.
One thing I’ve noticed in many of the passages in Revelation and in Jeremiah is the command, “Flee from the midst of Babylon, and each of you save his life!” If America is Babylon the Great, at what point would we be called to flee her? Is the call a call to Christians, or is it a call to Jewish people to return to Israel? There have been many Jews leaving the US (and other nations) to move to Israel because of severe antisemitism, but could this call be a call to all who believe in the one true God?
We applied healing to Babylon, but she was not healed;\ Forsake her and let us each go to his own country,\ For her judgment has reached to heaven\ And towers up to the very skies. (Jeremiah 51:9) {emphasis mine}
Now I will give my most speculative and least certain assumption. If the tribulation is near, if the US is Babylon the Great, and if this passage in Jeremiah is referring to the same Babylon discussed in Revelation, what is this “applied healing?” The US has been turning completely away from God. It has been promoting evil as good and calling good “evil.” We just had an election where the American people rejected this radical evil and claim to want to go back to healthier, more sane America. Could the “applied healing to Babylon” be the election of Donald Trump (I am not saying he is anything close to a savior)?
I was just listening to a sermon by R.C. Sproul entitled “Jesus Heals Many.” In it he commented that Jesus was healing many, then went off alone to pray, was reprimanded by His disciples for leaving when so many people were seeking healing, and then Jesus told them He was leaving for another town to preach His message. Jesus was there to share the Gospel, not to just play doctor. Most of the people following Jesus weren’t doing it because they believed He was God, nor were they doing it because they thought He taught the truth; they were following Him to get personal healing. Jesus was their magic genie. They only wanted Him as much as He gave them what they wanted. They didn’t care about what they actually needed or what Jesus demanded.
In the same way, Richard Dawkins, one of the most famous atheists in the world, recently lamented the loss of Christian culture. He enjoyed the loving attitudes, the Christmas spirit, the honesty, etc., but didn’t actually want anything to do with Jesus. Is God offering a moment of reprieve for us to turn back to Him? Do the people only want the Christian culture and Christian blessing without the repentance and without making Jesus Lord? Is this why we will not be healed?
No matter how much people want him to be, Trump is not a real savior and won’t be able to fix most of what ails America. Sadly most people want a return to God’s blessing, but they aren’t willing to repent and submit to the true Savior.
I don’t know if this was what God was trying to communicate to us from more than two millennia ago, but I do think it is something we need to consider. Are we longing for the Christian culture and the blessings that come with it, while being unwilling to accept and submit to the Jesus through whom all of these blessings come?
Sharpen the arrows, fill the quivers!\ The Lord has aroused the spirit of the kings of the Medes,\ Because His purpose is against Babylon to destroy it;\ For it is the vengeance of the Lord, vengeance for His temple. (Jeremiah 51:11) {emphasis mine}
Now this passage may only refer to historical Babylon and it being conquered by the Medes and Persians. I do find it interesting that the nation of the Medes1 were located in what is now Iran, East Turkey, and Afghanistan. There are many experts saying Iran has everything needed to make several nuclear weapons and they already have the missiles needed to launch them. Iran hates and wants to destroy Israel and the US and is now afraid due to the election of Trump and the people he is nominating for Secretary of Defense, Secretary of State, and Ambassador to Israel. Could this passage refer to Iran completing the creation of nuclear weapons in order to attack the US? Maybe.
Lift up a signal against the walls of Babylon;\ Post a strong guard,\ Station sentries,\ Place men in ambush!\ For the Lord has both purposed and performed\ What He spoke concerning the inhabitants of Babylon.\ O you who dwell by many waters,\ *Abundant in treasures*,\ Your end has come**,\ The measure of your end. (Jeremiah 51:12-13) {emphasis mine}
Although historical Babylon was rich and was located between the Euphrates and Tigris Rivers and had many canals for watering the land, this also sounds like the US. The US is between the Pacific and Atlantic Oceans with the Gulf of Mexico to the South. It is full of large, navigable rivers. There has never been a nation as rich and with as many treasures as the US. Once again, I’m not positive, but it would be a great description for the US.
The portion of Jacob is not like these;\ For the Maker of all is He,\ And of the tribe of His inheritance;\ The Lord of hosts is His name.\ He says, “You are My war-club, My weapon of war;\ And with you I shatter nations,\ And with you I destroy kingdoms. (Jeremiah 51:19-20) {emphasis mine}
This passage is less explicit, but still, I can very much see God saying of the US, “You are My war-club, My weapon of war; and with you I shatter nations.”
“But I will repay Babylon and all the inhabitants of Chaldea for all their evil that they have done in Zion before your eyes,” declares the Lord.\ “Behold, I am against you, O destroying mountain,\ Who destroys the whole earth,” declares the Lord,\ “And I will stretch out My hand against you,\ And roll you down from the crags,\ And I will make you a burnt out mountain.\ They will not take from you even a stone for a corner\ Nor a stone for foundations,\ But you will be desolate forever,” declares the Lord. (Jeremiah 51:24-26) {emphasis mine}
I am currently reading a book, “Eye to Eye,” that goes through the actions of Bush Sr, Clinton, and Bush Jr to divide Israel into a two state solution and the natural disasters in America that happened within days of each of the US’s major actions. Will the US help divide Israel leading to her destruction? Has there ever been a nation throughout history that you could really say, “O destroying mountain, who destroys the whole earth?” Before modern times, the empires didn’t affect the whole earth. Great Britain did have influence on the majority of it, but I don’t think you could call it a “destroying mountain” or say it “destroys the whole earth.” The US truly influences every nation on earth, through aid/sanctions and through threat of force.
Once again we see a reference to fire, “I will make you a burnt out mountain.” Will US hegemony be destroyed by a nuclear attack? What else could make it, or any other nation, into “a burnt out mountain.”
The mighty men of Babylon have ceased fighting,\ They stay in the strongholds;\ Their strength is exhausted,\ They are becoming like women;\ Their dwelling places are set on fire,\ The bars of her gates are broken. (Jeremiah 51:30) {emphasis mine}
Is the reason we don’t see the US in end times prophecy because it has “ceased fighting,” stays “in the strongholds,” “is exhausted,” (especially financially) is “becoming like women,” (literally?) and finally “Their dwelling places are set on fire?”(nuclear?)
It makes sense, but it is also possible I am reading too much into it. Even if the US isn’t THE Babylon the Great, just as there are antichrists and THE AntiChrist, I think the US is at least a form of Babylon.
Indeed Babylon is to fall for the slain of Israel,\ As also for Babylon the slain of all the earth have fallen.\ You who have escaped the sword,\ Depart! Do not stay!\ Remember the Lord from afar,\ And let Jerusalem come to your mind*. (Jeremiah 49-50) {emphasis mine}
Once again, I wonder, if this refers to all who trust God or if this call is specifically for the Jews. I don’t feel confident in the answer, but will continue to study Scripture and listen to the Holy Spirit.
Whether you agree or disagree with my conclusions and speculations, I hope this article has made you think and blessed you. I’d love feedback, especially if you have Scripture that either supports or denies my conclusions.
Because end times prophecy is not as clear as the historical parts of the Bible, I know my interpretations have changed as the world has changed and I see how God’s word may be fulfilled. I do believe my understanding is getting closer and closer to what God is trying to tell us as I see things that made zero sense suddenly seem immediately possible as new technologies are created, as national alliances change. and as culture changes. I am looking forward to going home to heaven to be with my God and creator soon. I hope to see you there.
Trust Jesus.\ \ your sister in Christ,
NOTE: Because of some uncertainty in this interpretation, after writing this article, I did a little research before posting. This websites has some interesting information on Babylon the Great.
This site furthers my argument that US is Babylon the Great and brings up some additional arguments that are very good and goes into when Babylon the Great is likely destroyed. I’d recommend reading it.
The only description of Babylon the Great that doesn’t fully seem to correspond to the US is “And in her was found the blood of prophets and of saints and of all who have been slain on the earth.” (Revelation 18:24) The rest of the arguments for why the US isn’t Babylon the Great were either arguments regarding America’s past godliness, not America’s current situation, or Americans that just seemed to not want the US to be Babylon the Great. Sometimes we all fail to see uncomfortable truths.
It is true that Christians are not “slain” in the US. It is also true that when the US has gone to war with many nations, such as Iraq, their actions have led to the end of the church in that nation. There had been a Christian church in Iraq for \~2,000 years, but after the US “liberated” Iraq, the Christian church was basically wiped out in a way that it had not been even under a tyrannical Muslim leader. Similar things have happened elsewhere. It is also true that persecution of Jews and Christians has been getting worse and worse in the US. Will this progression continue to the point of putting believers to death? I hope not, but it is possible.
I’m guessing most of us will eventually see who or what Babylon the Great is before too long, so we will see. Hopefully you will use this to get you thinking about end times and it will spur you on to live a life fully devoted to Jesus.
-
@ 2775fb0f:887f8193
2024-11-20 15:48:37В нашем городе, который в последние годы активно развивается и меняется, культура и искусство играют важную роль в формировании общественного сознания. Мы встретились с известным местным художником, Виктором Синицыным, чьи работы стали символом Новодвинска и его творческого потенциала.
Виктор, привет! Расскажите, как вы начали свой путь в искусстве и что вас вдохновляет?
— Здравствуйте! Мой путь в искусстве начался еще в детстве. Я всегда любил рисовать и выражать свои мысли через краски. Вдохновение я черпаю из окружающего мира: природы, людей и, конечно, нашего города. Новодвинск — это уникальное место, и его история, архитектура и природа всегда находят отражение в моих работах.
Вы упомянули о природе. Как она влияет на ваше творчество?
— Природа Новодвинска действительно вдохновляет. Я часто гуляю вдоль реки Северной Двины, наблюдаю за изменениями сезонов и стараюсь передать эту красоту на холсте. Мои последние работы посвящены весне и пробуждению природы, и я надеюсь, что зрители смогут почувствовать ту атмосферу, которую я испытал.
Как вы оцениваете культурную жизнь Новодвинска в 2040 году?
— Я вижу, что Новодвинск активно развивается в культурном плане. У нас появляются новые галереи, арт-пространства и творческие объединения. Люди заинтересованы в искусстве, и это радует. Я также участвую в организации выставок и мастер-классов, чтобы вдохновить молодежь и привлечь ее к творчеству.
Как вы считаете, какую роль играют художники в обществе?
— Художники — это своего рода «зеркало» общества. Мы можем показать, что происходит вокруг, выразить эмоции и идеи, которые волнуют людей. Искусство помогает нам понять друг друга и создает пространство для диалога. Я считаю, что художники должны активно участвовать в общественной жизни и вносить свой вклад в развитие культуры.
Что бы вы хотели сказать молодым художникам, которые только начинают свой путь?
— Не бойтесь экспериментировать и искать свой стиль. Главное — это искренность в творчестве. Делайте то, что вам действительно нравится, и не стесняйтесь делиться своими работами с миром. Новодвинск полон возможностей, и я уверен, что у каждого из вас есть шанс стать частью этой удивительной культурной жизни.
Спасибо, Виктор, за интересное интервью! Желаем вам творческих успехов и вдохновения!
— Спасибо! Надеюсь, что искусство будет продолжать развиваться в нашем городе и вдохновлять людей на новые свершения.
Таким образом, Новодвинск в 2040 году становится не только центром культурной жизни, но и местом, где художники, такие как Виктор Синицын, продолжают вдохновлять и объединять людей через искусство.
-
@ 06639a38:655f8f71
2024-11-20 15:16:42Nostr-PHP
- Added generic
setTags()
andsetTag()
function to Filter object to be used in request messages from clients to relays. - Did some small improvements in the relay response handling in the websocket client code.
- Trying to send closeMessages trying to the relay to get a close response back. But not any response came back from the relays I’ve tested with.
- I published a new release
1.5.0
Changelog: https://github.com/nostrver-se/nostr-php/compare/1.4.2...1.5.0 - I set up a new relay with transpher at chat.nostr-php.dev. The main goal of the relay is to replace the current Nostr-PHP Telegram group with a relay based chat group (NIP-29). Repo: https://github.com/nostrver-se/chat.nostr-php.dev
- Work in progress, handling TLV with NIP-19 encoded entities: https://github.com/nostrver-se/nostr-php/pull/68
Other stuff
- We received a message from FOSDEM that our submission for a Nostr stand at the conference is accepted! So during the weekend 1st & 2nd of February I will attend FOSDEM volunteering at the Nostr stand with four other Nostriches.
- Testing things out with chachi.cat and with different relays (NIP-29).
- Did some work on a proof-of-concept at /nostrides around this NIP proposal for physical activities: https://github.com/nostr-protocol/nips/pull/1423
- Added generic
-
@ 9ff58691:0bf6c134
2024-11-20 15:03:12С каждым годом фермерство становится все более важным аспектом нашей жизни, особенно в условиях глобальных изменений и вызовов, с которыми сталкивается сельское хозяйство.
Технологические инновации Cегодня с фермерских полей урожай собирают роботы, а дроны следят за состоянием растений. Автоматизация и высокие технологии делают процесс ведения сельского хозяйства более эффективным и менее трудоемким.
Устойчивое сельское хозяйство С учетом изменений климата и необходимости сохранения экосистемы, фермеры используют экологически чистые методы, такие как агролесоводство и органическое земледелие. Это не только помогает сохранить природу, но и повышает качество продуктов.
Адаптация к климатическим изменениям С изменением климата фермеры внедряют устойчивые к засухе и болезням сорта растений, что позволяет им адаптироваться к новым условиям и обеспечивать стабильный урожай.
Городское фермерство и локальные рынки С увеличением населения и урбанизацией, городское фермерство наиболее популярно. Вертикальные фермы и местные рынки будут предлагают свежие продукты, поддерживают местных производителей и сокращают углеродный след.
Генетические технологии ГМО станут важным инструментом для повышения урожайности и устойчивости к вредителям, что поможет обеспечить продовольственную безопасность.
Чтобы узнать мнение практикующего фермера, мы обратились к Сергею Ивановичу, владельцу фермерского хозяйства в Кургане:
"Мы уже видим, как дроны и автоматизация входят в нашу жизнь. Но важно не забывать о традиционных методах и уважении к земле. Я надеюсь, что большинство фермеров найдут баланс между инновациями и природой."
Автор: Александра Налобина
-
@ 9ff58691:0bf6c134
2024-11-20 14:48:28Студенты Курганского государственного университета активно участвуют в акции «Чистый город», очищая реку Тобол в Центральном парке культуры и отдыха.
Эта инициатива направлена на улучшение экологической ситуации в регионе и привлечение внимания к проблемам загрязнения водоемов.
Многие из студентов уже не первый год помогают городу, принимая участие в различных экологических мероприятиях. Их усилия способствуют созданию чистой и комфортной городской среды, подчеркивая важность общественной активности в охране природы.
Автор: Эвелина Тимирбаева
-
@ 9ff58691:0bf6c134
2024-11-20 14:46:33В нашем городе реализуются масштабные программы по очистке и восстановлению водных источников. Это важнейшая задача для обеспечения экологической безопасности и улучшения качества жизни курганцев. ![1]https://sun9-42.userapi.com/impg/fOFN6VwFwDOUvK0JIQAe6GlJC6DLMl7085VmGw/RxiJGl46bYU.jpg?size=1120x1120&quality=96&sign=a4f8125af92f584ecaac4f9c88a1c948&type=album()
Одним из ключевых проектов стала модернизация городских очистных сооружений. Здесь внедряются новейшие технологии глубокой очистки, позволяющие удалять из сточных вод даже микропластик и фармацевтические препараты. Например, установлены мембранные биореакторы, которые с высокой эффективностью очищают воду от широкого спектра загрязнений. Кроме того, применяются передовые методы обеззараживания, такие как ультрафиолетовое облучение и озонирование, полностью исключающие использование хлора.
Особое внимание уделяется восстановлению малых рек и прудов. С помощью инновационных технологий гидромеханической очистки со дна водоемов извлекаются многолетние отложения ила и донных отложений. Это позволяет не только улучшить качество воды, но и создать благоприятные условия для возрождения водной флоры и фауны.
Кроме того, ведется масштабная расчистка и благоустройство берегов. Здесь высаживаются устойчивые к городским условиям деревья и кустарники, укрепляющие берега и выполняющие роль природных фильтров. Также оборудуются зоны отдыха с пляжами, спортивными и детскими площадками. Важную роль играют и программы по сохранению водоохранных зон. Здесь запрещено размещение вредных производств, а также ведется активная высадка деревьев и кустарников, укрепляющих берега.
Кроме того, активно развиваются образовательные программы для детей и молодежи, направленные на повышение осведомленности о значении чистой воды и ответственном отношении к природным ресурсам. Школы и университеты участвуют в проектах, которые включают экопроекты, экскурсии на очистные сооружения и мастер-классы по правильным привычкам обращения с водой. Это создает у молодого поколения понимание важности охраны окружающей среды.
Содействие местных жителей также является важным элементом в реализации данных программ. Создаются инициативные группы, которые активно участвуют в акциях по очистке берегов рек и озер, а также помогают в мониторинге состояния водоемов. Совместные усилия граждан и властей способствуют формированию культуры бережного отношения к ресурсам.
Важным аспектом наряду с экологическими инициативами является также создание новых рабочих мест. Растущая сфера экологических технологий открывает возможности для трудоустройства местных жителей, что, в свою очередь, укрепляет экономику региона.
Таким образом, реализуемые проекты по очистке воды в Кургане в 2040 году являются гармоничным сочетанием технологий, экологии и активного участия сообщества, что способствует созданию комфортной и безопасной городской среды для будущих поколений.
Автор: София Багирова
-
@ 04d9fac9:5bec0e6c
2024-11-20 13:50:45С гордостью объявляем, что в нашем городе Воркута появился новый творческий коллектив — танцевального ансамбля "Завод 2044"!
Этот проект объединяет талантливых и страстных танцоров, стремящихся к самовыражению и развитию в мире танца.
Приглашаем всех желающих присоединиться к нам! Вместе мы будем создавать уникальные хореографические номера, участвовать в конкурсах и радовать зрителей яркими выступлениями.
Следите за новостями и не упустите возможность стать частью дружной команды нашего коллектива и завода!
-
@ 04d9fac9:5bec0e6c
2024-11-20 13:46:35В Воркуте, 20 ноября 2044 года, состоялось долгожданное открытие новой школы, ставшей символом образовательных инноваций и современных технологий. Школа расположена в центральном районе города и рассчитана на 1200 учащихся. Она была построена в рамках программы «Современное образование», направленной на улучшение условий для обучения и воспитания детей. Новая школа оснащена современными учебными классами, лабораториями и специализированными кабинетами для изучения STEM-дисциплин. В учебном заведении также предусмотрены зоны для творчества и отдыха, что создает комфортную атмосферу для учеников. Одной из главных особенностей школы является открытие детского технопарка, который предлагает учащимся возможность участвовать в научных проектах и конкурсах. На торжественной церемонии открытия присутствовали представители местной администрации, родители, ученики и педагоги. Директор школы отметила важность данного события для города: «Мы стремимся создать пространство, где каждый ребенок сможет развивать свои таланты и достигать успехов в учебе».
-
@ 04d9fac9:5bec0e6c
2024-11-20 13:44:51В Воркуте, 19 ноября 2044 года, состоялось торжественное открытие нового городского парка, ставшего важной частью городской инфраструктуры и центром общественной жизни. Парк расположен в центральной части города и занимает площадь более 15 гектаров, предлагая жителям разнообразные зоны для отдыха и активного времяпрепровождения.
Новый городской парк оборудован современными спортивными площадками, детскими игровыми зонами и уютными местами для пикников в теплое время года. Важной особенностью парка является его экологическая направленность: здесь высажены тысячи деревьев и кустарников, способствующие поддержанию биоразнообразия. Парк стал примером устойчивого развития городской среды.
На открытии присутствовали представители местной администрации, жители города и гости. Мэр Воркуты подчеркнул значимость нового парка для улучшения качества жизни горожан: «Этот парк — не просто зеленая зона, это место для общения, спорта и семейного отдыха. Мы стремимся создать комфортные условия для всех жителей нашего города».
-
@ ced4158e:f2a74519
2024-11-20 13:25:32Заводы закупили новые станки, зарплаты рабочих поднялись до небес, экологическая чистота – на уровне японских садов. Теперь на каждом заводе перед началом смены звучат вступительные песни из аниме, а работники трудятся за станками в костюмах любимых персонажей с улыбками и мечтами о новом сезоне. А чтобы тебя взяли на работу, обязательно нужно пройти тест «Кто ты из аниме?» Так что не удивляйтесь, если увидите сварщика в костюме Наруто или токаря, мечтающего стать Саске. И не забывай об экологии, ведь главное: теперь вместо стружек на полу оставляют только цветы и конфеты!
45news
Курган2040
https://psv4.userapi.com/s/v1/d/2p2cFTAnzE2-AlWCQr6dm-ZiiGo0KqBy8QPUlp7fAAYrUwNIsk74hel539t2vY8Ij00CcrpwuGCO_KFu4InLKCCcOBeQeAEPB4t8-442-BJ6Z3owNQV0PQ/futuristic-factories-a-glimpse-into-modern-industrial-innovation.mp4
-
@ ced4158e:f2a74519
2024-11-20 13:24:27Курган уверенно занимает лидирующие позиции в школьном образовании на Урале и в Сибири. Благодаря внедрению современных технологий и активного развития в национальные проекты, наш город становится настоящим центром образовательных инноваций.
-
Проект «Урок цифр» Курганская область активно реализует проект «Урок цифр», который позволяет школьникам с раннего возраста осваивать информационные технологии. Этот проект стал одним из лидеров среди регионов России, который обеспечил высокий уровень подготовки и заинтересованности учащихся в цифровых навыках.
-
Цифровая инфраструктура В рамках национального проекта «Цифровая экономика» в Кургане создана современная цифровая инфраструктура. Школы и другие образовательные учреждения получают доступ к высокоскоростному интернету и современному оборудованию. Это позволяет проводить уроки с использованием интерактивных технологий и онлайн-ресурсов.
-
Образовательные центры В Кургане открываются новые образовательные центры, которые предоставляют учащимся возможность изучения STEM-направления (наука, технологии, инженерия и математика). Эти центры оборудованы современными лабораториями и мастерскими, что позволяет детям развивать практические навыки.
-
Сотрудничество с вузами Школы Кургана налаживают сотрудничество с университетами и современными учреждениями. Это открывает старшеклассникам возможности для участия в научных проектах и конкурсах, а также помогает им определиться с выбором будущей профессии.
45news
Курган2040
-
-
@ ced4158e:f2a74519
2024-11-20 13:22:17Зимой 2041 года в Кургане продолжается активный ремонт дорог. На этом уровне запланированы обновления на нескольких ключевых участках, что значительно улучшит транспортную инфраструктуру города. Давайте рассмотрим, какие дороги будут отремонтированы.
-
Улица Коли Мяготина На улице Коли Мяготина завершится укладка верхнего слоя асфальта. Этот участок пройдет от улицы Красина до улицы Кремлева и станет более безопасным и комфортным для автомобилистов и пешеходов.
-
Проспект Конституции Капитальный ремонт моста по проспекту Конституции также завершится в этом зимнем сезоне. Это срочный маршрут, который соединяет разные районы города и обеспечивает удобный доступ к району Энергетиков.
-
Улица Анфиногенова Ремонт улицы Анфиногенова на участке от улицы Карбышева в библиотеке имени Маршака улучшит условия для движения в этом районе. Обновление дорог позволит снизить уровень шума и повысить безопасность.
-
Улица Дзержинского На улице Дзержинского будет проведен ремонт от улицы Омской до «Дзержинского кольца». Это важная транспортная артерия, и ее обновление поможет разгрузить движение в часы пик.
-
Трасса Курган — Половинное Запланирован ремонт более 16 км по трассе Курган — Половинное, включая подъезды к деревням Северное, Снежная и селу Иковка. Это улучшит связь между населенными пунктами и повысит безопасность на дороге.
-
Мосты на улице Бурова-Петрова. В этом сезоне также будут отремонтированы два моста на улице Бурова-Петрова, что положительно скажется на транспортной доступности в этом районе.
Обновленные ключевые элементы повышают безопасность и комфорт для всех участников дорожного движения. Мы будем следить за ходом работы и информировать вас о новых изменениях в городе! Мы надеемся, что когда-то укладка асфальта закончится!
45news
Курган2040
-
-
@ e31e84c4:77bbabc0
2024-11-20 13:08:51The Matrix of Modern Education
For many of us, The Matrix is more than just a movie; it is a cinematic masterpiece that vividly reflects the injustices and ills of modern society. When Neo first meets Morpheus, he receives a haunting revelation: For many of us, The Matrix is more than just a movie; it is a cinematic masterpiece that vividly reflects the injustices and ills of modern society. When Neo first meets Morpheus, he receives a haunting revelation:
"The Matrix is everywhere. It is all around us. Even now, in this very room. You can see it when you look out your window or when you turn on your television. You can feel it when you go to work, when you go to church, when you pay your taxes. It is the world that has been pulled over your eyes to blind you from the truth…Like everyone else you were born into bondage. Into a prison that you cannot taste or see or touch. A prison for your mind."
It’s often said that the mind, once stretched by an idea, never returns to its original dimensions. But what happens to it when it’s imprisoned by an idea? An idea so insidious, yet so subtle, that it reshapes your identity and compels you to act against your own interests. Is redemption even possible for such a mind? Before answering that, we must first ask: how does one’s mind become imprisoned?
Whenever you believe a lie, your mind becomes shackled. Each action taken based on that false belief strengthens those chains, locking you further into a reality that serves not your interests, but those of others.
Every culture is a set of programs—norms, beliefs, and acceptable behaviors—handed down to us by the gatekeepers of society, as well as the families in which we are raised. These programs, especially during our formative years, determine our language, mindset, values, and aspirations. When formal schooling is added to the equation, our minds are often hijacked by "the Matrix" under the guise of education.
For most of the year, students of all age groups undergo rigorous learning exercises allegedly designed to mould them into productive members of society. The canary in the coal mine, however, is that the state, no matter the country, determines what these students are taught. As with many other aspects of life, most parents defer to the so-called "experts" (i.e. an elite group of central planners) at the Department of Education, assuming they know what’s best for their children. After all, these experts must have the students’ best interests at heart, right?
While I’m not at all suggesting that children shouldn’t receive an education, I do question whether the current model is truly preparing them to be productive members of society—or merely creating more tax slaves.
The Architecture of Compliance
In his book The Underground History of American Education, the late John Taylor Gatto presents a compelling argument that the American education system, in its current form, was designed to suppress creativity, critical thinking, and independent thought. Gatto traces the origins of compulsory schooling in the U.S., asserting that it was modeled after the Prussian system, which emphasized strict discipline, obedience to authority, centralized control, and a curriculum tailored to prepare students for a hierarchical, industrial society. Key aspects of this Prussian model, which eventually spread worldwide, include state-mandated compulsory education, standardized curricula, the grade-level system (where students are divided by age and assessed by a uniform curriculum), and the establishment of state-run seminaries for teacher training.
Powerful industrialists like Andrew Carnegie and John D. Rockefeller played a major role in shaping this education system, as it met the labor needs of an emerging industrial economy. Their ultimate goal was the creation of a nation of passive citizens, trained to follow orders rather than think independently. This aim is perhaps best captured in a quote widely attributed to Rockefeller: "I do not want a nation of thinkers, but a nation of workers." Through Rockefeller’s General Education Board (GEB), which influenced educational policy nationally through philanthropy, this vision has been realized—not just in the U.S., but globally as well.
From preschool to university, our education system, while teaching essential skills like literacy and numeracy, is also loaded with a fleet of "mind viruses" that stifle independent thought and obscure the ability to “connect the dots” where it matters the most. Critical thinking and intellectual curiosity are exterminated, replaced by blind deference to authority. Truth is no longer an objective reality, but instead is twisted into whatever Orwellian narrative the powers that be choose to impose. These "mind viruses" activate, locking individuals into compliance, as soon as the gaslighting begins—a prison for the mind, indeed.
Corporate media serves as both the trigger and enforcer of these "mind viruses," ensuring the masses stay in lockstep with the state's narrative. Day after day, "experts" parade across our screens, dispensing opinions on everything from health to economics. The grim reality is that most of these so-called experts are merely mouthpieces for the state, earning their keep by keeping public discourse firmly within the narrow confines of the Overton window.
With their reassuring smiles and silver-tongued rhetoric, these talking heads lecture us non-stop on issues like; Bitcoin is going to boil the oceans, why an annual inflation rate of 2% is a good thing, how increased government spending is the key to a thriving economy, real estate always goes up, why saturated fats cause heart disease, or how paying more taxes is the magic bullet for combating climate change. Oh and don’t forget to get your annual flu shot while you are there. As these messages repeat, the majority of the audience—unconsciously compliant—download these “mental software updates,” reinforcing the conditioning instilled by the education system. Soon after, they regurgitate these narratives verbatim at the next family gathering or social event. In essence, the media picks up right where the school system leaves off.
The Pandemic Paradigm
The COVID-19 pandemic revealed society's ingrained compliance. What began as temporary measures evolved into indefinite restrictions, with public health officials becoming tyrants overnight. A prime example is Dr. Lothar Wieler, the former head of the Robert Koch Institute (Germany’s equivalent of the CDC), who made this striking declaration without any significant public pushback: The COVID-19 pandemic revealed society's ingrained compliance. What began as temporary measures evolved into indefinite restrictions, with public health officials becoming tyrants overnight. A prime example is Dr. Lothar Wieler, the former head of the Robert Koch Institute (Germany’s equivalent of the CDC), who made this striking declaration without any significant public pushback:
\ “We will have to abide by these rules (the COVID-19 protocols) for months to come. They must be the standard. They must never be questioned … So that’s the basic rule, nobody should question it anymore, we should just do it.”
Wieler was not alone in making such proclamations. Public health leaders, including the Director General of the WHO, echoed similar sentiments. The public’s response was largely uniform: no pushback, just widespread compliance. Despite obvious contradictions—from dancing medical staff videos to government officials violating their own restrictions—public compliance remained steadfast. Even when these rules harmed their businesses, damaged their children's mental health, led to the neglect of the elderly, or negatively affected their own well-being. We literally lived through a larger-scale version of the Milgram experiment. This widespread passivity also reveals a deeper issue: the learned helplessness and "compliance mind viruses" instilled by the school system and continually reinforced by corporate media.
This phenomenon is even more evident in the financial sector, where the same patterns emerge. Financial literacy is a subject that modern education consistently avoids, even for those pursuing careers in finance. Many of these individuals end up being financial advisors who simply parrot conventional advice to their clients about investing for the long term in a diversified portfolio of stocks, bonds, and mutual funds. Ironically, this "safe" strategy is almost guaranteed to never outperform the market and is a sure-fire way to get hammered by inflation over time. Would it be far-fetched to think that this is actually a self-serving strategy for financial firms to increase their assets under management?
Breaking Free
As a Bitcoiner, I've often reflected on the vast amount I was unaware of and, more importantly, what I had to unlearn after embarking on my Bitcoin journey. The deeper I ventured down the proverbial rabbit hole, the more I recognized the mental conditioning—particularly regarding the nature of money—that had been ingrained in me. Bitcoin's whitepaper reveals a fundamental truth: trusted third parties are flawed and corruptible. This notion runs counter to the indoctrination we received in school, which teaches us to trust the system and its gatekeepers. Breaking free from this programmed blind faith in authorities is the first step in overcoming the invisible prison of the mind.
Unfortunately, many never transcend this stage, particularly those with traditional finance backgrounds. Groupthink-driven mind viruses blind them to the truth, which explains why most failed to foresee the 2008 financial crisis. Their allegiance to the fiat system and its incentives keeps them tethered to the "matrix." As Morpheus aptly says during Neo's training:
“The Matrix is a system, Neo. That system is our enemy. You have to understand, most of these people are not ready to be unplugged. And many of them are so inert, so hopelessly dependent on the system that they will fight to protect it.”
Crony capitalism thrives by colonizing individual minds and reshaping them into a collective mass focused on consumption over production. This conditioning starts early, in pre-kindergarten and elementary school, where the emphasis is on compliance rather than intellectual development. To counter this indoctrination, parents must take a proactive role in their children's education. This goes beyond providing extra lessons—it requires fundamentally redesigning the education system from the ground up. Just as Bitcoin was invented to eliminate third-party intermediaries in financial transactions, the education sector must be decentralized in a similar way.
Building educational initiatives on a Bitcoin standard is long overdue, but true reform comes from decentralizing education itself. As Bitcoin separates money from the state, we must similarly work to separate education from state influence. This parallel revolution—in both money and minds—can foster a society where independent thinking thrives, where individuals question rather than conform, and where future generations inherit not only sound money but also sound thinking. After all, sound money can only be appreciated and used efficiently by individuals who have a sound mind.
True liberation requires breaking free from both financial and mental bondage. Bitcoin represents a paradigm shift that challenges everything we've been conditioned to accept about money, value, and trust in centralized authorities. By rejecting state-controlled fiat currency, we also reject the programming that compels us to comply with other forms of institutional control. The path to mental sovereignty begins by recognizing the prisons of the mind, and Bitcoin offers both the blueprint and the tools for our escape.
The Educational Mind Virus was Written By Kudzai Kutukwa. If you enjoyed this article then support his writing, directly, by donating to his lightning wallet: muggyarch11@walletofsatoshi.com
-
@ a012dc82:6458a70d
2024-11-20 12:12:12Since the beginning of 2021, Bitcoin and other cryptocurrencies have been all the rage, and a record number of investors are beginning to get caught up in the excitement of the market. And although the opponents do raise a lot of fascinating points about the sustainability of cryptocurrencies in the long run, it cannot be denied that some people have amassed enormous fortunes via the use of cryptocurrencies. However, one of the aspects of crypto investing that has been largely ignored is the risk associated with owning crypto investments. This is not the risk of experiencing a loss of capital, which has received a lot of attention, but rather the risk of falling victim to a scam, being tricked, or having your investment stolen entirely. In this article, we'll look at some of the biggest cyber risks that come with investing in cryptocurrencies.
Crypto Theft
Cryptocurrency is not a physical good in the same way that a dollar note is. Only in the realm of simulation does it exist. Just like your online bank account, it is susceptible to theft in a variety of different ways due to the nature of the situation. Even though the chances of a single person being a victim of cryptocurrency theft are low, the rate at which the crime is happening overall is alarmingly high.
According to Crystal Blockchain Analytics, between January 2011 and December 2021, security breaches resulted in the theft of $3.18 billion, while hacking of DeFi networks resulted in the theft of $1.76 billion. Cryptocurrency assets that are stored in crypto wallets are, for the most part, protected from theft. They can be accessed in no other way than via the use of private keys, which are only known to the owner. These "keys" are made up of long sequences of letters and numbers, very much like passwords. But hackers have creative methods of breaking into your private wallet, and this is true regardless of the sort of password mechanism you choose. The following are some of the more typical ones:
Phishing
There are many different variations of phishing scams. The creation of websites that are substantially similar in appearance to websites that you are already acquainted with in the hopes that you will click on them is a typical tactic used by hackers. For instance, if you check your cryptocurrency account on a fictitious website such as "cryptocurrencyholdings.com," hackers may develop a website that looks quite similar to the real one but lacks the "s." This website would be called "cryptocurrencyholding.com." Other manifestations of this assault take the shape of fraudulent Google advertising designed to seem like genuine cryptocurrency wallet websites. If you aren't careful, you might end up entering your cryptographic credentials or any other crucial information on the website belonging to the hacker.
Suppose you get a message from a website that seems to be genuine, requesting you to change your login credentials or password for security concerns. In that case, this is an example of phishing, which is another widespread kind of online fraud. If you click on the link, you will be sent to the website of a hacker, where they will be able to steal your information and access your cryptocurrency.
SIM Swapping
Two-factor authentication, often known as 2FA, is a method that businesses use to attempt to improve their cybersecurity by asking users to reply to a notice that has been sent to either their phone or their email in the event that their account is accessed. Conversely, clever hackers may circumvent this security by either cloning your SIM card or phoning your phone carrier and persuading them to switch your number to their SIM card. Both of these methods are described below. After that, they will be able to get into your cryptocurrency account and "confirm" that the login is legitimate by using the two-factor authentication app on their own phone, rather than yours.
Crypto Scams
Scams using cryptocurrency have caused customers to lose much more money than traditional thefts of cryptocurrency. According to statistics provided by Crystal Blockchain Analytics, the total amount of money lost as a result of fraudulent cryptocurrency transactions between January 2011 and December 2021 is estimated to be a staggering $7.21 billion. Read up on some of the most common techniques that con artists try to trick people out of their cryptocurrencies so they may steal them from them. This can help you avoid falling victim to fraudsters.
Pump and Dump
The swindle known as "pump and dump" did not originate in the cryptocurrency era. In point of fact, this strategy ranks up there with some of the earliest examples of attempts to manipulate the stock market. Simply said, an "authority," who may be a talking head, a group of message board leaders, or an influential member of the cryptocurrency community, will speak up for a new coin as "the next big thing." When news gets out, it generates its own momentum, and when additional investors buy into the cryptocurrency, the price climbs even more quickly. Once it has reached a considerable gain, the initial touts will dump their cryptocurrency, which will drive the price down and put a stop to the euphoria. However, small investors will be left holding the bag.
Rug Pull
The "rug pull" is a close relative of the "pump and dump" plan, and the two con jobs have a number of similarities in common. Scammers drive up the price of a cryptocurrency in either scenario until it is time to pay out, leaving the investors holding the bag. On the other hand, the rug pull involves the creation of a cryptocurrency with the sole intention of cheating investors. Once the real cryptocurrency is traded in for the scam cryptocurrency, the authors of the scam cryptocurrency remove all the liquidity, and the value of the coin often sinks to zero. According to Chainalysis, the overall value of rug pulls will reach $2.8 billion in 2021, representing a huge increase from 2017. This accounted for 37% of the total money generated by scams in 2021, a significant increase from just 1% in 2020.
Scamming Yourself: Forgetting Your Private Key
If you forget your private key, you run the risk of losing access to your cryptocurrency assets, which is likely one of the most unpleasant ways to do so. Suppose you lose your private key to your digital cryptocurrency wallet. In that case, it will be impossible for you to access any of your cryptocurrency assets since these wallets are decentralized and not connected to any one bank. The majority of wallets lock permanently after a predetermined number of failed login attempts, preventing you from ever regaining access to your bitcoin.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
@ f8a5df57:b7a58cd4
2024-11-20 12:08:54В 2040 года — В столице России наступила новая эпоха транспортной инновации. В этом месяце в небо над Москвой поднялись очередные модели вертолётов и летающих автомобилей нового поколения, которые обещают кардинально изменить представление о городской мобильности и комфорте.
Современные воздушные транспортные средства, созданные с использованием передовых технологий, способны не только сокращать время в пути, но и значительно уменьшать уровень загрязнения окружающей среды. Энергоэффективные электрические двигатели и инновационные системы управления, использующие искусственный интеллект, делают полёты безопасными и экологически чистыми.
«Летающие машины уже стали неотъемлемой частью нашей жизни. Теперь, чтобы добраться от одного района города до другого, вам не нужно тратить время в пробках. Путешествия по воздуху открывают новые горизонты для бизнеса, туризма и повседневной жизни», — делится мнением заместитель мэра Москвы по вопросам транспорта Ирина Соколова.
Новые маршруты, охватывающие ключевые точки столицы, делают воздушный транспорт доступным для широкой аудитории. Прямые рейсы от районов к бизнес-центрам, культурным и историческим достопримечательностям позволяют жителям и туристам значительно увеличивать свою мобильность. Вертолёты и летающие машины уже сегодня обеспечивают связь между деловым центром и загородными усадьбами, радуя своих пользователей уникальными панорамными видами.
Кроме того, системы управления воздушным движением стали значительно более эффективными. Уникальные интеллектуальные платформы обеспечивают оптимизацию маршрутов и координацию полётов, сводя к минимуму задержки и создавая безопасную воздушную среду.
Не обошлось и без уникальных инициатив по обеспечению устойчивого развития. Новые модели летающих автомобилей используют экологически чистые материалы, а сами устройства создаются с акцентом на возможность переработки, что позитивно сказывается на общем состоянии экологии столицы.
На фоне развития воздушного транспорта Москва становится не только одним из самых высоких технологичных мегаполисов мира, но и примером для других городов, стремящихся решить проблемы пробок и загрязнения. Учитывая темп развития новой транспортной инфраструктуры, не исключено, что в ближайшие годы Москва станет моделью для глобального внедрения летающих машин и вертолётов, которые из фантастики превратятся в повседневную реальность.
Специалисты отмечают, что скоро полеты станут не только удобным, но и привычным способом передвижения для москвичей. Воздушный транспорт определенно изменит ландшафт городской логистики и откроет новые возможности для жителей и гостей столицы.
Автор материала: Карина Шаповалова
-
@ f8a5df57:b7a58cd4
2024-11-20 12:07:48В сердце старинного города Москвы 12 июня 2040 года произошло долгожданное событие — открылся новый университет, названный «Университет новых технологий».
История открытия университета началась три года назад, когда группа энтузиастов, состоящая из ученых, предпринимателей и преподавателей, собралась вместе на одной из конференций по инновациям 21 века. Они обсуждали, как важно подготовить новое поколение специалистов, способных работать с передовыми технологиями: искусственным интеллектом, робототехникой, биоинженерией и экологически чистыми производствами. В завершении встречи специалисты из разных областей деятельности решили в будущем реализовать эти идеи на практике. https://psv4.userapi.com/s/v1/d/fDoqZMPO3yDdDYpFmUyHMvPtbrdbdUONiumP0pbKYxrPQ3SjJV-TF9TJkmpBlefnnnOzrUQ2n0NXcW9LhuP4oU3GowqUNroJEbK_-RCY4wYelLvQkN8p8Q/robototekhnika.png «Университет новых технологий» отличается своими уникальными программами, в которых в равной мере студенты будут осваивать теоретический и практический материал. В процессе обучения ребята будут работать над реальными проектами в сотрудничестве с ведущими компаниями. Например, разрабатывать роботов для помощи в сельском хозяйстве и создавать экологически чистые упаковочные материалы. https://psv4.userapi.com/s/v1/d/CYKD1rih8RG09CpUrwLRO1kiUMsYvWwPuSoOxLpITGA21vspPJaNu8fwnXuNglgGUGR7-fM-FyA0__VWaskOBmgcxb8pNbke5iUH0cyp90XZU7vALy6bnQ/roboty_2.webp https://psv4.userapi.com/s/v1/d/lvY2MVMPCcQNITrqjSkQ87yTbGXJK36BzR0PICBg-hSd6GwRseu_SlK6T30BtSojJnJzVefSYc4m-3HbWXRHEohAZzH0n0tMASw1LhO_cQ56hK1R6xGDjA/upakovka.webp Кроме того, в ВУЗЕ преподаватели совместно со студентами будут организовывать хакатоны и конкурсы стартапов, где ребята смогут представить свои идеи, после чего получить поддержку от инвесторов и наладить контакты с потенциальными работодателями и партнерами.
«Университет Новых Технологий» - это место, где рождаются идеи будущего и формируются лидеры, способные изменить мир! Стать студентом нового технологического университета легко! Тебе будет предложена гибкая система приема, которая включает различные формы вступительных экзаменов: онлайн-тестирование или творческие задания, что позволит абитуриентам продемонстрировать свои знания и навыки в удобной для них форме. Также ВУЗ предоставляет всем курсам университета стипендию в размере 20 тысяч рублей, комфортное общежитие с отдельными комнатами, личной кухней и ванной комнатой. Помимо этого есть большие шансы поступить на бюджет, ведь на каждое направление выделяется 20 мест с бесплатным обучением. У молодежи есть все шансы для получения качественного образования и построения успешной карьеры.
Автор: Дарья Воронина
-
@ f8a5df57:b7a58cd4
2024-11-20 12:07:09В 2040 году московские школы сделали шаг в будущее, внедрив электронные парты, которые стали неотъемлемой частью образовательного процесса. Эти инновационные устройства не только заменили традиционные письменные столы, но и превратили обучение в увлекательный и интерактивный процесс. Электронные парты оснащены сенсорными экранами и интегрированными программами, которые позволяют ученикам выполнять задания, проходить тесты и взаимодействовать с учебными материалами в реальном времени. Устройства адаптируются под уровень знаний каждого ученика, предлагая индивидуальные задания и рекомендации по улучшению успеваемости. Это позволяет учителям более эффективно отслеживать прогресс своих учеников и вовремя корректировать учебный процесс. https://sun9-5.userapi.com/impg/8QWE_O1gOFcKCNPdSgzeTkshPP5QnAxRkpycAA/L-9IZebzMbo.jpg?size=1076x1076&quality=95&sign=c714b6511ccbaf6950b9cb4767e28a65&type=album Ученики могут работать над заданиями, используя мультимедийные материалы, что делает обучение более увлекательным. Каждая парта анализирует успехи ученика и предлагает задания, соответствующие его уровню. Отказ от бумажных учебников снижает количество отходов и способствует сохранению окружающей среды.
Переход на электронные парты в московских школах представляет собой важный шаг к модернизации образования, делая его более доступным и эффективным для нового поколения учеников. По словам директора школы № 65 Елены Шабуковой, внедрение электронных парт стало настоящим прорывом в образовании. "Мы видим, как наши ученики становятся более вовлеченными в процесс обучения. Электронные парты не только облегчают доступ к информации, но и развивают критическое мышление", — отмечает Елена.
Автор: Ксения Данилова
-
@ f8a5df57:b7a58cd4
2024-11-20 12:06:47Содержание сюжета:
В 2040 году Москва преобразилась благодаря уникальному городскому проекту: " Музыкальные переулки". Теперь на каждой улице столицы установлены колонки, прикреплённые к фонарям, которые наполняют город мелодиями, создавая атмосферу праздника и уюта. Система уличного озвучивания была разработана с учётом современных технологий и потребностей жителей. Колонки, работающие на солнечных батареях, обеспечивают устойчивое и экологически чистое звучание. Музыка выбирается с помощью голосовых команд или мобильного приложения, что позволяет каждому жителю подстраивать звуковую атмосферу под своё настроение.
Музыка на улицах способствует созданию позитивной атмосферы, что особенно важно в мегаполисе, где жители часто сталкиваются со стрессом. Колонки также используются для трансляции культурных событий и концертов, что делает их доступными для всех. " Мы стремились создать пространство, где каждый сможет найти что-то близкое своему сердцу. Это нововведение уже стало важной частью городской культуры и привлекло внимание туристов и местных жителей, - считает создатель проекта Александр Петров.
Автор: Ксения Данилова
-
@ f8a5df57:b7a58cd4
2024-11-20 12:06:20С 15 июня 2040 года в Москве вступили в силу новые экологические нормы, согласно которым вся вода, продаваемая в городе, должна упаковываться исключительно в стеклянные бутылки. Эта инициатива направлена на борьбу с загрязнением окружающей среды и снижение использования пластика, который наносит значительный вред природе.
В ответ на глобальные экологические вызовы и растущее беспокойство о состоянии планеты, Москва сделала решительный шаг к устойчивому будущему, внедрив обязательную упаковку питьевой воды в стеклянные бутылки. Этот шаг не только способствует улучшению качества жизни горожан, но и служит примером для других мегаполисов.
Согласно новым правилам, производители и поставщики воды обязаны использовать только стеклянные контейнеры. Это решение основано на множестве факторов: экологическая безопасность (стекло является более безопасным материалом по сравнению с пластиком, так как не выделяет вредных веществ в воду и не загрязняет окружающую среду); качество воды (вода в стеклянных бутылках сохраняет свой вкус и свежесть дольше, чем в пластиковых); переработка( стекло можно перерабатывать бесконечно без потери качества, что делает его более устойчивым выбором).
"Переход на стеклянные бутылки — это не просто шаг к улучшению экологии города, но и важный сигнал для общества о том, что мы можем изменить свои привычки ради будущего планеты. Каждый из нас может внести свой вклад в защиту природы, выбирая более безопасные альтернативы", — считает инициатор проекта Иван Петров.
Автор: Ксения Данилова
-
@ f8a5df57:b7a58cd4
2024-11-20 12:05:43В 2040 году в столице было реализовано 6 крупных проектов в сфере экологии. Один из них " "Зеленые парки для отдыха и наслаждения природой" получил большое финансирование и поддержку со стороны администрации города. Шестьдесят миллиардов было выделено государственным бюджетом для того, чтобы озеленить около полутора тысяч объектов, включая парки, скверы и заповедные территории. Превращение Москвы в экосистему с обилием зеленых насаждений и благоустроенных территорий стало следствием многолетних тенденций по озеленению и созданию комфортных условий для горожан.
«Преобразование парков Москвы стало важной частью нашей стратегии по обеспечению качества жизни горожан. Мы хотим создать место, где каждый сможет найти для себя занятие: поиграть в настольные и активные игры, прогуляться всей семьей, посетить культурные мероприятия», - поделился специалист по охране окружающей среды Дмитрий Иванов.
Автор: Ксения Данилова
-
@ f8a5df57:b7a58cd4
2024-11-20 12:02:52Столичная администрация объявила о масштабном проекте по увеличению дорожных линий, который призван кардинально улучшить ситуацию с дорожным движением в Москве. В условиях постоянно растущего числа транспортных средств и увеличивающегося потока людей, это станет ключевым шагом к более удобному и безопасному передвижению по городу.
В последние 20 лет Москва превратилась в мегаполис с населением свыше 15 миллионов человек, и проект по расширению дорожной инфраструктуры стал неотъемлемой частью стратегии по улучшению городской мобильности. В результате запуска новых линий, тысячи километров дорог получат дополнительные полосы движения, что позволит сократить время в пути и оптимизировать транспортные потоки.
«Мы ориентируемся на будущее и понимаем, что улучшение дорожной инфраструктуры критически важно для комфорта москвичей. Новые линии позволят уменьшить заторы в наши часы пик и создадут условия для безопасного и быстрого передвижения по городу», — отметил мэр Москвы Сергей Собянин на пресс-конференции.
Проект включает не только увеличение числа полос, но и внедрение интеллектуальных систем управления движением. Используя данные искусственного интеллекта, новые технологии обеспечат автоматическую оптимизацию направления потоков и улучшение реакции на неожиданные ситуации на дороге, снижая вероятность возникновения пробок и аварий.
Самым значимым аспектом нового плана является интеграция дорожной сети с другими видами транспорта, включая метро, автобусные и трамвайные маршруты. Теперь жители будут иметь возможность быстрее и легче пересаживаться между разными видами транспорта, что сделает передвижение по столице более эффективным.
Кроме того, увеличение дорожных линий будет способствовать развитию экономической активности. Новые маршруты создадут более доступные пути для грузового и коммерческого транспорта, что в свою очередь повлияет на снижение цен на товары и услуги, улучшая уровень жизни москвичей.
К тому же, в процессе переустройства дорожной сети также будут созданы специальные полосы для велосипедистов и пешеходов, что подчеркивает стремление столицы к устойчивому развитию и экологии.
Масштабные изменения в дорожном движении ожидаются в течение ближайших десятилетий, и увеличение дорожных линий станет важным шагом на пути к созданию безопасной и комфортной городской среды для будущих поколений москвичей. С каждым улучшением городской инфраструктуры, Москва движется к статусу одного из самых удобных и технологичных мегаполисов мира.
Автор: Карина Шаповалова
-
@ f8a5df57:b7a58cd4
2024-11-20 11:25:31Содержание сюжета:
Летающие такси, работающие на электрических двигателях с использованием экологически чистых технологий, стали привычным зрелищем на улицах столицы. Благодаря впечатляющей скорости и маневренности, они позволяют москвичам избегать пробок и значительно сокращать время в пути. Пассажиры могут забронировать полет через удобное мобильное приложение, выбирая маршрут и время отправления.
Инфраструктура для летающих машин активно развивается: на крышах многих зданий и в специальных хабах по всему городу появились платформы для взлета и посадки. Это не только улучшило транспортный поток, но и сделало высотные здания Киева частью уникальной городской экосистемы.
Автор: Карина Шаповалова
-
@ f8a5df57:b7a58cd4
2024-11-20 11:14:39На конференции, проходившей в центре "ЭкоТехнология", ведущие российские ученые и экологи продемонстрировали новые инновационные решения, которые могут изменить облик городов и улучшить качество жизни жителей.
Одним из наиболее впечатляющих проектов стал "Зеленый щит" — система беспилотных дронов, способных очищать атмосферу от загрязняющих веществ. Эти дроны, использующие передовые фильтрационные технологии, способны очищать воздух на высоте до 200 метров. Их разработчики утверждают, что благодаря сетевой системе дронов, которые работают круглосуточно, можно добиться снижения уровня смога и вредных выбросов до 50% на наиболее загрязненных территориях в течение нескольких месяцев.
https://sun9-54.userapi.com/impg/2dFbRjQjrUKLIzm3lTU5J6gVRXko4gleoLUj5Q/ThxU8bwyl7s.jpg?size=1024x1024&quality=95&sign=0ba18b5b700b836c3b9faa8584219677&type=album
Кроме того, ученые представили новый тип "умных" экологических фильтров, которые могут устанавливаться на зданиях и в общественном транспорте. Эти фильтры, основанные на нанотехнологиях, способны улавливать мелкие частицы и токсичные вещества, превращая их в безвредные соединения. Специалисты предсказывают, что в течение ближайших лет эта технология может стать стандартом для всех новых построек в столице.
Также на мероприятии была продемонстрирована инновативная программа по озеленению городских пространств с использованием генетически модифицированных растений. Эти растения обладают уникальными свойствами: они не только эффективно поглощают углекислый газ и выделяют кислород, но и способны очищать почву и воду от тяжелых металлов и вредных химикатов. Ожидается, что их массовое внедрение поможет существенно улучшить экологическую ситуацию в Москве.
По словам мэра Москвы Сергея Собянина, данный комплексный подход к борьбе с загрязнением позволит создать более чистое и здоровое окружение для москвичей. "Мы должны сделать все возможное, чтобы наши города стали более устойчивыми и комфортными для жизни. Научные разработки, представленные сегодня, открывают новые горизонты в этом направлении", — отметил он на открытии конференции.
Изменения не заставили себя ждать: по предварительным оценкам, реализация этих технологий может привести к значительному улучшению качества воздуха в столице до 2067 года. Общественные организации и экологи выражают надежду на то, что новые инициативы не только помогут сократить уровень загрязнений, но и увеличат осведомленность граждан об экологических проблемах.
Автор: Карина Шаповалова
-
@ 2063cd79:57bd1320
2024-11-20 09:34:20Bitcoin ist Freedom Money. Bitcoin ist transparent, P2P, es diskriminiert nicht, es ist sicher und vor allem ist es dezentral aufgebaut. Das bedeutet, dass es keine Verwaltung, keine Regierung und keine zentrale Entscheidungsinstanz gibt. Dies wird durch das dezentrale Netzwerk von Knotenpunkten (Nodes) und Minern sichergestellt. Satoshis Genialität bestand darin, den schwierigkeitsangepassten Proof-of-Work (PoW) Prozess mit einem finanziellen Anreizmechanismus zu verbinden, der dafür sorgt, dass Miner für das Aufwenden von Energie (in Form von Rechenleistung / Strom) und die Bereitstellung des benötigten Equipments vergütet werden. Doch die immer weiter steigende Hashrate im Netzwerk, ausgelöst durch immer größer werdende Mining Operationen und immer leistungsfähigere ASIC Chips, führt dazu, dass es kleine und auch mittelgroße Miner immer schwerer haben erfolgreich Bitcoins zu minen, und damit Profite zu erzielen.
Im Gegensatz zu Bitcoins Anfangstagen, als man einfach am Heimrechner oder mit dem Laptop zuverlässig bitcoins in recht beachtlichen Mengen minen konnte, hat sich das Mining stark weiterentwickelt und verändert. Damals war Mining vielmehr Amateur-Hobby-Unterfangen, das keine wirklichen Kapitalinvestitionen oder Fachkenntnisse erforderte. Heutzutage ist es ein professioneller Multi-Milliarden-Dollar Markt, der Kapitalinvestitionen in großem Maßstab und weitreichende Fachkenntnisse voraussetzt.
Dies hat dazu geführt, dass Mining-Pools an immer größerer Popularität gewonnen haben. Denn im Gegensatz zum selbstständigen Mining, bei dem sich jeder Miner in einen Wettkampf mit seinen Gegenspielern um die Winner-take-all-Prämie begibt, und somit die reellen Chancen den nächsten Block zu minen, um damit die Belohnung in Form von Block Subsidy und Gebühren einzustreichen, bei geringer aufgewendeter Hashrate immer kleiner wird, bieten Mining-Pools die Möglichkeit der anteiligen Vergütung.
Ein Miner mit 1% der Hashrate wird nur sehr selten einen Block finden und die gesamte Belohnung einsammeln, während ein Miner mit 1 % der Hashrate, der einen Pool nutzt, regelmäßig etwa 1 % der Prämie sammelt, die der Pool zusammen verdient. Die Vorhersehbarkeit eines regelmäßigen Einkommens ist das Verkaufsargument. Wo Miner, die alleine arbeiten, viel länger brauchen, um Blöcke zu finden, da die Wahrscheinlichkeit, diese zu finden, proportional zu Ihrem Prozentsatz der gesamten Netzwerk-Hashrate ist, bieten Pools Abhilfe.
Das Prinzip ist zunächst einfach, denn je mehr Miner sich in einem Pool zusammenschließen um somit die kombinierte Hashrate zu bündeln, desto wahrscheinlicher wird, dass dieser Zusammenschluss von Minern den nächsten Block findet. Das Prinzip lässt sich mit einer Tippgruppe beim Lotto vergleichen. Doch ähnlich wie bei der Lottotipp-Vereinigung muss auch der potentielle Gewinn durch alle Teilnehmer geteilt werden. Bei Mining-Pools erhält jeder Teilnehmer seinen Anteil der Prämie gemessen an der bereitgestellten Rechenkapazität. Das bedeutet konkret, dass ein Miner, der z.B. 10% der Rechenkapazität des gesamten Pools zur Verfügung stellt, auch 10% der Prämie (abzüglich einer Pool-Gebühr) erhält. Diese Rechnung lohnt sich für die meisten kleinen und mittelgroßen Miner, da so ein stetiger Fluss von Einkommen wahrscheinlicher wird, als ab-und-zu (oder nie) den Jackpot zu knacken.
Obwohl Mining-Pools also positive Effekte für Miner erzielen und die Einstiegshürde für private und kleine bis mittelgroße Operationen erleichtern, erzeugen sie auf der anderen Seite auch einen Nachteil. Denn der große Vorteil eines dezentralen Netzwerks ist, dass es schwierig anzugreifen ist. Einfach gesprochen, sollte ein Angriff auf das Netzwerk erfolgen, ist es für den Angreifer immer schwieriger, global verteilte, unabhängig voneinander agierende und kleine (und damit unbekannte) Einheiten anzugreifen. Jede Konzentration einer bestimmten Sache macht es für den Angreifer immer einfacher, diese eine große Einheit ausfindig zu machen und gezielt zu attackieren. Dieses Problem besteht immer dort, wo eine hohe Konzentration entsteht, sei es bei den besprochenen Mining-Pools, aber auch bei großen, bekannten (teilweise öffentlich gehandelten) Mining-Operationen, oder bei großen Herstellern von Chips und Equipment. Man kann den Bogen sogar etwas weiter spannen und die Stromerzeuger mit einbeziehen, denn wenn eine größere Gruppe von Minern ihren Strom vom gleichen Anbieter beziehen muss, führt dies unweigerlich auch zu einem weiteren potentiellen Angriffsvektor.
Angriffe müssen in diesem Fall auch nicht unbedingt von schlecht gesinnten Dritten in Form von Cyberattacken oder Hackerangriffen erfolgen, denn wo eine Konzentration von Einheiten stattfindet, besteht auch oft die Gefahr von Übergriffen seitens der lokalen Gerichtsbarkeiten. Heißt einfach gesagt, die lokale Regierung kann sich die Konzentration zu Nutze machen und Handelsbeschränkungen, Steuerregime oder andere Gesetze erlassen, die versuchen die Operationen einzuschränken, zu verbieten oder so zu kontrollieren, dass sie im Sinne des Gesetzgebers handeln.
Mining-Pools stellen einen einzigen Koordinierungspunkt zwischen den teilnehmenden Hardware-Betreibern dar und sind verantwortlich für die Auswahl von Transaktionen, die in die Blöcke eingefügt werden sollen, sowie für den Erhalt und die Aufbewahrung aller Mining-Belohnungen, bis sich einzelne Hardware-Betreiber diese auszahlen lassen. Das macht sie angreifbar sowohl für Regulierung, die Pools zwingen könnte bestimmte Transaktionen nicht zu minen, als auch für Pools, die sich dafür entscheiden, dies selbst zu tun, wie in der Vergangenheit schon vorgefallen.
Des Weiteren agieren Mining-Pools, obwohl sie nicht als solche reguliert sind, als verwahrende Finanzinstitute. Wie schon beschrieben, sind sie verantwortlich für den Erhalt und die Aufbewahrung der Mining-Belohnungen. Das bemächtigt sie dazu, Auszahlungen einzufrieren, sollten sie dazu gezwungen werden, aber auch bestimmte Miner auszuschließen, sollten diese "unreguliertes" Equipment nutzen, was nicht mit den lokalen Gesetzen konform ist. Für Miner bedeutet dies nichts anderes, als für den durchschnittlichen HODLer, der seine bitcoins auf einem Exchange hält. Not your keys, not your coins!
Auf der einen Seite bieten Pools eine lukrative und ökonomisch sinnvolle Alternative für private und kleine Mining Operationen an, öffnen auf der anderen Seite mit dem Schaffen von Engpässen aber auch die Türen für schädliche Regulierung und andere Angriffe. Eine Lösung für das Problem dieser Zentralisierungsrisiken besteht z.B. darin, Mining-Pools selbst zu dezentralisieren, was bedeutet, dass man sowohl die Auswahl der Transaktionen, die in einen Block gehen, als auch die Auszahlung der Belohnungen an die jeweiligen Miner dezentralisieren müsste.
Im Idealfall würde demnach ein Mining-Pool, der die Hashrate von verschiedenen Gerichtsbarkeiten sammelt und somit einer einzigen Gerichtsbarkeit ausliefert (derjenigen, in der dieser Pool eingetragen ist), irgendwie in der Lage sein sich selber so aufzustellen, dass nicht eine Instanz Handhabe erhält, um so politischen und regulatorischen Druck auszuüben. Allerdings ist diese Art der Gesellschaftsform heute noch nicht möglich. Ein Ansatz wäre ein loser Verband von Pools, die in verschiedenen Ländern eingetragen sind und somit die gesammelte Hashrate der verschiedenen Miner weltweit und die Auszahlungen wieder zufällig auf verschiedene juristische Einzelpersonen in verschiedenen Ländern verteilt, sodass kein zentraler Angriffspunkt entsteht. Die Hashrate der einzelnen Miner müsste nach einem Zufallsprinzip zwischen diesen Rechtsträgern verteilt werden, ohne Effizienz und Leistung einzubüßen.
https://en.bitcoin.it/wiki/P2Pool
Ein weiterer Ansatz wurde von P2Pool verfolgt. Anstatt eines zentralisierten Mining-Pools, angeboten von einem eingetragenen Unternehmen, wird ein Netzwerk geschaffen, das Minern die selbstständige Koordination von Hashrate-Bündelung und Auszahlungen bietet. Allerdings führte das zu Grunde liegende Design zu einigen Skalierungsproblemen, weshalb es nicht mehr verwendet wird. Es hat weitere Versuche (P2Pool with Payment Channel Payouts & Braidpool) gegeben, dieses Modell mit Hilfe von Lightning wiederzubeleben, doch auch diese Ansätze sind bisher nicht erfolgreich umgesetzt worden.
Zusammengefasst bedeutet dies also, dass die Zentralisierung von Minern in Pools ein zusätzliches Risiko für die Integrität und Unzensierbarkeit des Bitcoin-Netzwerks erzeugt. Private und kleine Miner stehen theoretisch vor einem Dilemma, denn ohne Mining-Pools ist das Einkommen eines Miners eine völlig unberechenbare, unvorhersehbare Einnahmequelle. Doch auf der anderen Seite erzeugen Mining-Pools ein sehr reales Risiko einer möglichen Regulierung und Einflussnahme in der Zukunft von außen. Mining-Pools entwickeln sich zunehmends zu einem gefährlichen Zentralisierungspunkt und bis heute gibt es keine erwähnenswerte Alternative. Für Miner, die nur auf den kurzfristigen Profit aus sind, stellt dies natürlich kein Problem dar. Doch sollte es langfristig im Sinne jedes Teilnehmers sein, das Bitcoin-Netzwerk langläufig zu sichern und sicher zu halten, um Angriffe abzuwehren.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ 87730827:746b7d35
2024-11-20 09:27:53Original: https://techreport.com/crypto-news/brazil-central-bank-ban-monero-stablecoins/
Brazilian’s Central Bank Will Ban Monero and Algorithmic Stablecoins in the Country
Brazil proposes crypto regulations banning Monero and algorithmic stablecoins and enforcing strict compliance for exchanges.
KEY TAKEAWAYS
- The Central Bank of Brazil has proposed regulations prohibiting privacy-centric cryptocurrencies like Monero.
- The regulations categorize exchanges into intermediaries, custodians, and brokers, each with specific capital requirements and compliance standards.
- While the proposed rules apply to cryptocurrencies, certain digital assets like non-fungible tokens (NFTs) are still ‘deregulated’ in Brazil.
In a Notice of Participation announcement, the Brazilian Central Bank (BCB) outlines regulations for virtual asset service providers (VASPs) operating in the country.
In the document, the Brazilian regulator specifies that privacy-focused coins, such as Monero, must be excluded from all digital asset companies that intend to operate in Brazil.
Let’s unpack what effect these regulations will have.
Brazil’s Crackdown on Crypto Fraud
If the BCB’s current rule is approved, exchanges dealing with coins that provide anonymity must delist these currencies or prevent Brazilians from accessing and operating these assets.
The Central Bank argues that currencies like Monero make it difficult and even prevent the identification of users, thus creating problems in complying with international AML obligations and policies to prevent the financing of terrorism.
According to the Central Bank of Brazil, the bans aim to prevent criminals from using digital assets to launder money. In Brazil, organized criminal syndicates such as the Primeiro Comando da Capital (PCC) and Comando Vermelho have been increasingly using digital assets for money laundering and foreign remittances.
… restriction on the supply of virtual assets that contain characteristics of fragility, insecurity or risks that favor fraud or crime, such as virtual assets designed to favor money laundering and terrorist financing practices by facilitating anonymity or difficulty identification of the holder.
The Central Bank has identified that removing algorithmic stablecoins is essential to guarantee the safety of users’ funds and avoid events such as when Terraform Labs’ entire ecosystem collapsed, losing billions of investors’ dollars.
The Central Bank also wants to control all digital assets traded by companies in Brazil. According to the current proposal, the national regulator will have the power to ask platforms to remove certain listed assets if it considers that they do not meet local regulations.
However, the regulations will not include NFTs, real-world asset (RWA) tokens, RWA tokens classified as securities, and tokenized movable or real estate assets. These assets are still ‘deregulated’ in Brazil.
Monero: What Is It and Why Is Brazil Banning It?
Monero ($XMR) is a cryptocurrency that uses a protocol called CryptoNote. It launched in 2013 and ‘erases’ transaction data, preventing the sender and recipient addresses from being publicly known. The Monero network is based on a proof-of-work (PoW) consensus mechanism, which incentivizes miners to add blocks to the blockchain.
Like Brazil, other nations are banning Monero in search of regulatory compliance. Recently, Dubai’s new digital asset rules prohibited the issuance of activities related to anonymity-enhancing cryptocurrencies such as $XMR.
Furthermore, exchanges such as Binance have already announced they will delist Monero on their global platforms due to its anonymity features. Kraken did the same, removing Monero for their European-based users to comply with MiCA regulations.
Data from Chainalysis shows that Brazil is the seventh-largest Bitcoin market in the world.
In Latin America, Brazil is the largest market for digital assets. Globally, it leads in the innovation of RWA tokens, with several companies already trading this type of asset.
In Closing
Following other nations, Brazil’s regulatory proposals aim to combat illicit activities such as money laundering and terrorism financing.
Will the BCB’s move safeguard people’s digital assets while also stimulating growth and innovation in the crypto ecosystem? Only time will tell.
References
Cassio Gusson is a journalist passionate about technology, cryptocurrencies, and the nuances of human nature. With a career spanning roles as Senior Crypto Journalist at CriptoFacil and Head of News at CoinTelegraph, he offers exclusive insights on South America’s crypto landscape. A graduate in Communication from Faccamp and a post-graduate in Globalization and Culture from FESPSP, Cassio explores the intersection of governance, decentralization, and the evolution of global systems.
-
@ 13e63e99:25525c6a
2024-11-20 07:56:55The re-election of Donald Trump has triggered significant shifts across financial markets, marked by record highs in U.S. stocks, a surging dollar, and Bitcoin reaching unprecedented levels. While optimism surrounds Trump’s economic agenda, including tax cuts and a pro-bitcoin stance, global markets reacted unevenly, with European stocks declining and Asian markets showing mixed results. Meanwhile, the Federal Reserve continued its cautious easing of monetary policy, cutting rates to support growth amid ongoing uncertainties.
1. U.S. Stock Market Surge
Major U.S. stock indexes hit record highs, driven by optimism around Trump's proposed economic policies, particularly tax cuts and increased tariffs. Banking stocks outperformed, signaling investor confidence in sectors likely to benefit from higher interest rates. However, the long-term impact depends on how these policies influence broader economic stability.
2. Strengthening U.S. Dollar
The dollar posted its largest gain in eight years, appreciating 1.65% against major currencies like the euro, pound, and yen. A stronger dollar benefits U.S. savers but creates challenges for exporters and emerging markets with dollar-denominated debt.
3. Bitcoin’s All-Time High
Bitcoin surged to currently $90,000, driven by Trump's pro-bitcoin stance, contrasting with the Biden administration’s regulatory crackdown. Promises to make the U.S. a "Bitcoin superpower" and potential leadership changes at the SEC have bolstered market sentiment.
4. Divergent Global Stock Reactions
Global stock markets displayed mixed reactions:
-
Europe: German and French stock indexes declined amid concerns about Trump's trade policies.
-
Asia: Japan’s Nikkei 225 surged 2.6%, while China’s Shanghai Composite and Hong Kong’s Hang Seng showed losses, reflecting uncertainty around heightened trade tensions.
Following the electrion results, the Federal Reserve implemented its second consecutive interest rate cut, reducing its benchmark rate by 25 basis points to a range of 4.50%-4.75%, signaling a measured approach to adjusting monetary policy. This move follows a larger cut in September and reflects the Fed's aim to balance inflation control with labor market support. Market expectations aligned with the decision, which saw unanimous approval among committee members. Stocks rose, with tech-heavy indexes leading gains, while Treasury yields declined. Fed Chair Jerome Powell emphasized a "recalibration" of policy to sustain economic growth and ease inflation, though uncertainties remain about the extent of future cuts as the economy shows resilience.
Reference: Reuters
Bitcoin’s consensus mechanism exemplifies the intricate balance between its technological framework and the social dynamics of its ecosystem. Six primary stakeholder groups—economic nodes, investors, media influencers, miners, protocol developers, and users/application developers—play distinct yet interconnected roles in the decentralized decision-making process. While their motivations vary, users and developers emerge as crucial actors in driving the network’s evolution, ensuring it aligns with both user needs and broader ecosystem goals. This decentralized collaboration requires proactive engagement to mitigate risks such as chain splits, which could undermine the network's stability.
The growing influence of social media platforms, particularly X (formerly Twitter), underscores their role in shaping consensus and gauging sentiment within the Bitcoin community, often surpassing traditional media. Meanwhile, resistance to change from miners and economic nodes, often rooted in profitability concerns, presents challenges to implementing necessary upgrades. As Bitcoin matures and moves toward valuation stability similar to assets like gold, its strategic financial significance becomes increasingly evident. Stakeholders, including venture capital funds, are encouraged to leverage insights into these dynamics, recognizing the high-reward potential in supporting protocol development while fostering a balanced and adaptable ecosystem.
Reference: Analysing bitcoin consensus: risks in protocol upgrades
Lightspark Introduces Spark
Spark, developed by Lightspark, addresses key challenges in Bitcoin's Lightning Network by integrating advanced technologies like statechains and threshold signing to enhance functionality. At its core, Spark enables Bitcoin assets to be spent off-chain instantly, offering users increased speed and flexibility while maintaining robust security and user autonomy. Funds are sent to a shared-signature address co-managed by the user and Spark Operators (SOs), ensuring users retain full control of their assets with the ability to exit independently at any time. Transfers occur through key adjustments facilitated by SOs, while the overall signature remains unchanged, supporting a fast, trust-minimized off-chain transaction model.
A standout feature of Spark is its compatibility with assets like LRC-20s, BRC-20s, and Taproot Assets, opening doors for stablecoin integration and novel applications. The trust model within Spark is uniquely time-bound and transaction-specific. In a non-threshold setup, only one honest operator among participants is needed to validate transactions, while threshold configurations require a minority of SOs to ensure validity. Crucially, trust is ephemeral—once a transaction is completed, any residual risk is eliminated as signing keys are deleted, protecting users from malicious actions. By combining these innovations, Spark presents a scalable, user-centric solution for off-chain Bitcoin transactions, balancing speed, security, and utility.
Reference: Lightspark
SEC Approves Coincheck as First Japanese Digital Asset Exchange on Nasdaq
Coincheck, a cryptocurrency exchange based in Tokyo and a subsidiary of Monex Group, is poised to become the first Japanese exchange to debut on the Nasdaq Global Market as early as December 10. The United States Securities and Exchange Commission (SEC) approved its application to list on November 13. This listing will occur through a merger with Thunder Bridge Capital Partners (TBCP), allowing Coincheck to remain a consolidated subsidiary of Monex Group and potentially encouraging other Japanese exchanges to follow suit.
This Nasdaq listing represents a significant milestone. Additionally, it may attract more international digital asset firms to American markets, especially given the anticipated pro-bitcoin regulatory environment under President-elect Donald Trump. Meanwhile, the SEC continues to influence the US landscape through its oversight, with industry leaders advocating for more supportive regulations.
Reference: Cointelegraph
Saylor Hails US Strategic Bitcoin Reserve Proposal
Michael Saylor, founder of MicroStrategy and a leading Bitcoin proponent, continues to express confidence in Bitcoin’s long-term growth. In a recent CNBC interview, Saylor dismissed concerns of significant price pullbacks, emphasizing his belief in Bitcoin's upward potential. He hinted at a celebratory milestone of $100,000 Bitcoin by year-end, reflecting his optimistic outlook despite varying market opinions.
At the Cantor Crypto, Digital Assets & AI Infrastructure Conference, Saylor also highlighted the proposed US Strategic Bitcoin Reserve Bill, calling it a transformative opportunity for the US economy. The legislation envisions the government acquiring 1 million Bitcoin over five years, a move Saylor described as potentially worth $30 trillion to the economy. Market watchers remain divided on short-term price trends but broadly recognize Bitcoin’s growing significance as a global asset.
Reference: Cointelegraph, Bloomberg Television
The LATAM Journey: Supporting Bitcoin and Empowering the Nostr Community
Reference: X.com
The LifPay Bolt Card Website is Alive Now
The LifPay Bolt Card empower everyday users to issue Bolt Cards for various scenarios, including Gift Cards and Debit Cards. The Gift Card is perfect for sharing with friends, employees, and community members, while the Debit Card allows for easy Bitcoin spending—no technical expertise required, making it accessible for everyone. Users can easily tap their card to add funds via the LifPay App or any other app that supports LUD19 (payLink). Additionally, topping up is as simple as scanning or copying a QR code. Find out more info: Lifpay.boltcard
Reference: Lifpay.boltcard
-
-
@ 88dc84f5:c71164f7
2024-11-20 07:41:07Introduction: In an era of digital currencies and fluctuating markets, gold (XAU) has consistently demonstrated its value as a reliable store of wealth. This precious metal has been a cornerstone of human commerce for millennia, and its allure shows no signs of fading.
The Unwavering Appeal of Gold:
-
Hedge Against Inflation: XAU has historically performed well during periods of economic uncertainty, protecting investors from inflation's erosive effects.
-
Diversification: Gold's low correlation with other assets makes it an attractive addition to diversified portfolios.
-
Central Banks' Favorite: Central banks worldwide maintain significant gold reserves, underscoring its status as a trusted store of value.
Market Dynamics: 1. Supply and Demand: Gold's scarcity contributes to its value, with mining production struggling to meet growing demand.
- Geopolitical Uncertainty: Global tensions often boost XAU prices as investors seek safe-haven assets.
Investing in Gold:
-
Physical Gold: Coins, bars, and bullion provide direct ownership.
-
Exchange-Traded Funds (ETFs): Tracks gold prices without physical storage concerns.
Conclusion: Gold's enduring value stems from its unique combination of rarity, durability, and widespread recognition. As markets navigate uncertainty, XAU remains a steadfast refuge for investors seeking stability.
Key Statistics: - Current Price: $1,850/oz (subject to fluctuation) - Annual Demand: 4,300 tonnes (jewelry, investment, central banks) - Total Gold Supply: 193,000 tonnes (mined since ancient times)
AI-Generated Insights: Using natural language processing (NLP) and machine learning algorithms, our AI analyzed market trends and expert opinions to identify key drivers influencing XAU prices:
- Economic uncertainty
- Central bank policies
- Geopolitical tensions
By incorporating AI-driven analysis, investors can make informed decisions about gold's role in their portfolios.
-
-
@ 7ec80607:128517c5
2024-11-20 06:03:28Have you ever noticed how those bright billboards or flashy digital screens catch your eye when you're out driving or walking around? Outdoor advertising, like billboards and digital displays, has been around forever. And even with the entire buzz about digital and social media, outdoor ads still do an amazing job of grabbing people's attention. Businesses of all sizes love them because they really help brands stand out in this hectic world. In this piece, we’re going to explore why outdoor advertising Chattanooga is still such a big deal—especially billboards and digital screens—and how they continue to make a huge impact.
-
What’s Outdoor Advertising Chattanooga?
Outdoor advertising refers to those promotions you see when you’re out and about, like billboards, banners, travel ads on buses, and digital screens in busy areas. This kind of advertising is intended to contact individuals when they're making the rounds, heading out to work, getting things done, or appreciating leisure time. Billboards and digital screens are the absolute most attractive sorts of outdoor advertisements, seen on expressways, in downtown areas, and in shopping regions. -
Why Billboards Digital Screens Actually Matter a) High Visibility Billboards and digital screens are in many cases set in occupied areas, similar to expressways, malls, and central avenues. Since they're in high-traffic regions, they get a ton of openness. Huge number of individuals might see these promotions consistently, making brand mindfulness and acknowledgment. At the point when individuals see a brand much of the time, they're bound to recall it and consider it when they need an item or administration. b) Reaching a Large Audience Quite possibly of the best thing about outdoor advertising is its capacity to contact a wide crowd. Not at all like web-based advertisements, which target explicit gatherings, billboards and digital screens are seen by a wide range of individuals - suburbanites, sightseers, customers, and even individuals simply going through. This extensive range is perfect for businesses hoping to spread their message to however many individuals as could be allowed. c) Continuous Exposure Outdoor promotions work every minute of every day. Dissimilar to television or online entertainment promotions that run for a brief period, billboards and digital screens are consistently noticeable. This steady presence implies individuals can see the promotion whenever, whether they pass by it consistently or just sporadically. Over time, this repeated exposure can make the brand message stick in people’s minds.
d) The Wow Factor Billboards and digital screens can make serious areas of strength for an on the grounds that they're enormous, strong, and outwardly striking. Digital screens, specifically, can show moving pictures, dynamic tones, and, surprisingly, intuitive substance. This "wow factor" makes individuals stop, look, and recollect the promotion. Imaginative outdoor promotions, similar to 3D billboards or smart trademarks, can establish a major connection and, surprisingly, become famous via virtual entertainment in the event that they're exceptional and fascinating. 3. Digital Screens versus Customary Billboards While both digital screens and traditional billboards are effective, each has its unique advantages: Traditional Billboards • Savvy: Frequently less expensive than digital screens, particularly in high-traffic regions. • Effortlessness: A straightforward, eye-getting configuration can have areas of strength for a without the requirement for complex innovation. • Longer Showcase Time: Conventional billboards as a rule show similar directive for weeks or months, making them ideal for long haul marking. Digital Screens • Adaptability: Digital screens can show different promotions in pivot, and that implies publicists can change the substance every now and again. • Movement and Splendor: Digital screens can show recordings, activitys, and brilliant visuals, making them seriously captivating. • Designated Advertisements: A few digital screens can change promotions in view of the hour of day or crowd socioeconomics, permitting businesses to arrive at explicit gatherings.
- How Outdoor Advertising Chattanooga Supplements Digital Showcasing While online promotions and web-based entertainment are well known, outdoor advertising adds a one of a kind worth that digital channel can't coordinate. Consolidating outdoor advertising with digital showcasing can give a brand a greater reach and more grounded influence. For instance: • Memorability: Seeing a brand's promotion on a bulletin makes it more unmistakable, and when individuals see it on the web, they're bound to recollect it. • Supporting Web-based Missions: Outdoor advertisements can reinforce online missions by advancing similar message, giving individuals a suggestion to look into the brand later. • Neighborhood Focusing on: Outdoor promotions are perfect for contacting nearby crowds, particularly on the off chance that the business is in a particular region. For example, a board close to a store can drive nearby traffic straightforwardly to that area.
- Tips for Compelling Outdoor Advertising To make the most of billboards and digital screens, keep these tips in mind: • Keep It Simple: People only have a few seconds to view an outdoor ad, so use clear, simple messages. Avoid too much text and focus on one strong message. • Utilize Intense Pictures: Brilliant, strong pictures stick out and snatch consideration rapidly. Visuals are more straightforward to recall than text, so let the picture do the vast majority of the talking. • Pick the Right Area: Area is key for outdoor advertising Chattanooga. Place the promotion in a space where your main interest group is probably going to see it. • Be Creative: Creative outdoor ads get more attention. A funny slogan, unique design, or even a 3D element can make your ad memorable. • Consider Digital Options: Digital screens allow for movement, which can capture more attention. They’re also flexible if you need to change the ad frequently.
- The Eventual fate of Outdoor Advertising Outdoor advertising keeps on advancing, particularly with innovation. Digital billboards are turning out to be more normal, and new tech like increased reality (AR) and information driven focusing on are adding new potential outcomes. For instance: • Intelligent Billboards: AR-empowered promotions let individuals collaborate with the promotion utilizing their cell phones, making a critical encounter. • Information Driven Promotions: A few digital screens can utilize information, similar to the hour of day or climate, to show promotions that match the climate, making them more significant.
Ending thought
Billboards and digital screens keep on being integral assets for businesses. Their high perceivability, extensive range, and nonstop presence make them a significant piece of any advertising procedure. When utilized successfully, outdoor advertisements can make brand mindfulness, stand out, and supplement digital missions. In a world loaded with online promotions, outdoor advertising Chattanooga offers a reviving method for sticking out and contact individuals, all things considered, reminding us why billboards digital screens actually matter.
-
-
@ 21ac2956:09d1e2df
2024-11-20 05:58:15kakoi の仕様についてのメモ
キーボード操作
- 左手での操作に最適化
| キー | 動作 | |:-|:-| | ESC | 設定画面 | | F1 / F12 | ポストバーの表示と非表示 | | F2 | 時間の表示と非表示 | | F3 | ユーザーアイコンの表示と非表示 | | F4 | 名前の表示と非表示 | | F9 / Z | コンテンツの折り返し表示の切り替え (余白ダブルクリックでも動作) | | F10 | ユーザーリストとキーワード通知の設定画面 (余白右クリックでも動作) | | F11 | メイン画面の表示と非表示 (ポストバー表示) | | Shift + W | イベント最上行へ移動 | | W / ↑| イベント選択上移動 | | S / ↓ | イベント選択下移動 | | Shift + S | イベント最下行へ移動 | | A / ← | Webビューを開く (イベントを右クリックでも動作) | | F / → | リアクションを送信 (イベントをダブルクリックでも動作) | | 1 ~ 0 | リアクションを選択 | | R | 返信 | | B | リポスト | | Q | 引用 | | C | Webビューを閉じる | | Ctrl + Shift + A | メイン画面をアクティブにする |
タイムライン
- kind:1, 6, 7, 16を取得して表示する
- フォロイーの名前の前には * が付く
フォローリスト(kind:3)
-
参照のみで更新はしない
-
F10 で開くユーザーリストでユーザーを選択し petname セルをクリックすることで未フォローユーザーにもペットネームを設定可能(ローカル保存)
プロフィール(kind:0)
- F10 で開くユーザーリストでユーザーを選択し picture セルをクリックすることでユーザーのアイコン表示を変更可能(ローカル保存)
返信(NIP-10 kind:1)
- kakoi のタイムラインに流れるすべてのイベント種に返信可能とする
- スレッドを考慮せず、単一イベントへの単発返信とする
- e タグは marker と返信先 pubkey は設定していない。 relay-url には空文字を設定
json ["e", "返信先 event-id", ""]
- p タグは 返信先 pubkey ひとつだけを指定
リポスト(NIP-18 kind:6 , 16)
- kakoi のタイムラインに流れるすべてのイベント種をリポスト可能
- kind:1はkind:6。その他はkind:16でリポストする
- e タグは relay-url に空文字を設定
json ["e", "リポスト元 event-id", ""]
引用(NIP-18 kind:1)
- q タグは relay-url に空文字を設定
json ["q", "引用元 event-id", ""]
-
@ 97fc03df:8bf891df
2024-11-20 04:10:19PeterG (X: PeterG2100) November 19, 2024
TLDR
1. Limitations and Controversies of Layer2:
- Bitcoin’s Layer2 (e.g., Lightning Network) does enable off-chain scaling by leveraging Bitcoin’s UTXO model and SPV (Simple Payment Verification) mechanism, but it lacks substantial innovation.
- Ethereum’s Layer2, while sharing Ethereum’s security, fails to address the core issue of scaling and primarily serves to expand token use cases.
- The article criticizes Layer2 as more of a business tool for project teams, disconnected from decentralized consensus mechanisms, offering minimal actual value to retail users.
2. Why Bitcoin Doesn’t Need Layer2: - Bitcoin’s core value lies in its self-sufficiency and decentralized network. - Expansion solutions (e.g., WBTC) primarily aim to integrate Bitcoin’s value into the broader crypto ecosystem. - Bitcoin’s network does not require additional technological improvements; most expansion proposals lack originality and risk deviating from Bitcoin’s decentralized ethos.
3. Future Narrative of Bitcoin: - Bitcoin’s transformation from "digital gold" to "on-chain currency and governance system for AI" is seen as its key future direction. - The Bitcoin network can act as critical infrastructure for decentralized governance in an era where humans and AI coexist. The Super Bitcoin vision posits that Bitcoin’s growing consensus capabilities and security make it uniquely suited to meet future AI governance needs.
4. Shift in Entrepreneurial Focus: - The article suggests that Bitcoin’s network potential remains underexplored. Future entrepreneurial opportunities lie in leveraging its decentralized control system for AI safety and public governance. - Bitcoin Layer2 is losing appeal, while the Bitcoin network itself offers broader developmental possibilities.
Conclusion: Bitcoin Layer2 has limited value as a scaling tool, serving more as a narrative and business strategy. Bitcoin’s future lies in its decentralized network’s ability to support broader societal, technological, and governance demands. This perspective represents the deeper value Satoshi Nakamoto envisioned for Bitcoin.
When I wrote the title, I knew it would upset many people. However, I may have simply pointed out an inconvenient truth no one wants to admit.
Since June 2023, I’ve been closely following the Bitcoin Layer2 space, dedicating significant time to studying Bitcoin’s scaling technologies. I’ve tracked several technically sophisticated teams like Stacks, BEVM, Bihelix, Bool Network, and solutions like BitVM and RGB.
After thorough research, I realized that Bitcoin Layer2 might indeed be a fallacy. The reality is that Bitcoin doesn’t need Layer2—rather, the crypto industry needs Bitcoin. Moreover, Layer2 solutions are fundamentally just business ventures, not blockchain innovations. Most importantly, Layer2 doesn’t genuinely help scale Layer1; it merely repurposes Layer1 tokens for applications, often by copying existing Layer1 use cases without introducing new ideas.
My first validation of this perspective came from BEVM’s Super Bitcoin whitepaper. I’ve followed this Bitcoin startup team since June last year. They were among the earliest promoters of Bitcoin Layer2 in the Chinese-speaking world. Yet in 2024, they pivoted 180 degrees, abandoning the Layer2 direction entirely in favor of a new strategy called Super Bitcoin. For details, you can refer to their latest whitepaper—it’s quite an interesting read. Why did one of the earliest proponents of Bitcoin Layer2 abruptly change course? Is Layer2 truly a fallacy? And what is Bitcoin’s ultimate narrative? Let me share my insights.
Layer2: A Misguided Demand That Doesn’t Scale Layer1
The concept of Layer2 originated with Bitcoin. Satoshi Nakamoto described "Simple Payment Verification" (SPV) in Chapter 8 of the Bitcoin whitepaper. SPV allows transactions to be verified without downloading the entire blockchain, enabling efficient off-chain transaction validation.
This idea gave birth to the Lightning Network, which fully implements SPV principles. The Lightning Network is meaningful because it’s fast, cost-efficient, and inherits Bitcoin’s network security, effectively providing genuine transaction scaling for Bitcoin.
Ethereum later adopted a similar Layer2 model. However, while Ethereum Layer2 solutions share Ethereum’s security, they fail to genuinely scale Ethereum. Instead, they only expand use cases for the ETH token, with no real innovation.
The Lightning Network achieves Bitcoin "scaling" via SPV and Bitcoin’s UTXO model, which contrasts sharply with Ethereum’s account-based model. Any Layer2 solution is inherently incapable of addressing the limitations of Ethereum’s account-based model.
Here’s a simplified explanation:
-
Bitcoin’s UTXO model mirrors cash transactions between individuals. Transactions can be conducted in parallel and verified locally without requiring global consensus or centralized entities. This model allows concurrent processing and localized state changes without needing a unified global state tree.
-
Ethereum’s account model resembles traditional banking accounts, requiring a global state tree to compute balances and update states for each transaction. This reliance on a global state tree hampers Ethereum’s ability to process transactions in parallel.
For Ethereum to achieve true scaling, it must fundamentally improve the efficiency of state updates. Currently, no Ethereum Layer2 solution addresses this issue because it’s intrinsic to Ethereum’s design.
Recent proposals like Ethereum’s BeamChain attempt to integrate SNARKs (Succinct Non-Interactive Arguments of Knowledge) to enhance verification efficiency by compressing and limiting the data requiring validation. While this can partially improve state update capabilities, it doesn’t solve the core problem of Ethereum’s dependence on the global state tree. BeamChain merely accelerates a single-lane highway, whereas Bitcoin’s UTXO model offers unlimited parallel lanes.
In short, Ethereum Layer2 can’t truly scale Ethereum. Ultimately, Ethereum must address its own limitations. Meanwhile, Bitcoin’s Lightning Network is not a Layer2 solution per se but an application leveraging Bitcoin’s inherent UTXO and SPV capabilities for faster transactions. Thus, neither Ethereum Layer2 nor Bitcoin Layer2 fundamentally scales Layer1. At best, Layer2 solutions create new use cases for Layer1 tokens without altering Layer1 itself.
Layer2: A Business Model, Not a Blockchain Revolution
A glaring issue is that most Layer2 solutions are centralized. Layer2 lacks consensus mechanisms and nodes; it operates solely via an official sequencer controlled by the project team.
Essentially, all Layer2 solutions are private chains without miners or consensus mechanisms.
For instance, a typical PoS chain token serves purposes like staking for nodes, paying gas fees, or participating in governance. In contrast, Layer2 tokens lack node staking (no consensus, no nodes), rely on Layer1 tokens for gas, and have only speculative governance utility. With Layer2 being centralized, what governance is there?
Moreover, since Layer2 sequencers are controlled solely by the project team, they collect all gas fees. This revenue model is often more lucrative than token issuance. For example, before launching its token, ZKSync generated $3–5 million monthly in gas fees, totaling $72–100 million in two years—possibly more than they’ll earn post-token launch.
This is why I say Layer2 is just a business. Users chase token airdrops while projects profit from gas fees, ultimately leaving users with tokens of little utility.
Seeing this, more players are building their own Layer2 solutions, including giants like Samsung, Visa, and crypto projects like Uniswap with its UniChain. These entities realize they can monetize their own ecosystems rather than enriching third parties. For instance, Coinbase’s Layer2 initiative makes perfect sense given its vast user base.
However, this commercialization of Layer2 has little relevance to retail users. It’s a business model for Layer2 operators, with users as consumers. Layer2 tokens struggle to gain consensus, and this centralization explains the waning interest in both Ethereum and Bitcoin Layer2.
Bitcoin Doesn’t Need Layer2; The Crypto Industry Needs Bitcoin
The largest crypto project leveraging Bitcoin is WBTC, which exemplifies the industry’s need for Bitcoin’s "digital gold." Before WBTC, Ethereum’s financial ecosystem was isolated from Bitcoin. With Bitcoin dominating over 50% of the crypto market, integrating Bitcoin became essential for other ecosystems.
However, this integration reflects the industry’s need for Bitcoin, not Bitcoin’s need for expansion. Bitcoin’s intrinsic value lies in its sufficiency and decentralization. Expansion solutions largely rehash existing ideas with little innovation.
Realizing this, I’ve lost interest in schemes to "improve" or "expand" Bitcoin. Bitcoin doesn’t need these solutions. The crypto industry—and perhaps humanity—needs Bitcoin.
Bitcoin’s Ultimate Narrative: Beyond Digital Gold
A profound question emerges: Can Bitcoin exceed $1 million by evolving beyond "digital gold"? The answer lies in Bitcoin’s role as on-chain currency for AI and its decentralized governance mechanism for AI systems.
The Super Bitcoin whitepaper suggests that Bitcoin’s decentralized state transition machine, powered by ever-growing mechanical consensus, can meet the governance and security demands of a future AI-driven world. As the most decentralized system, Bitcoin offers trust and reliability unmatched by any other network.
This vision extends Bitcoin’s narrative to its second growth curve: transitioning from "digital gold" to "on-chain AI currency and governance system." By aligning Bitcoin with humanity’s and AI’s future needs, this narrative maximizes Bitcoin’s value.
Conclusion
Bitcoin Layer2 is an outdated, uninspiring entrepreneurial direction. As Bitcoin becomes a national reserve currency, its network’s untapped value offers unparalleled opportunities. The future lies in harnessing Bitcoin’s decentralized network for broader societal, technological, and governance needs. This may be the true legacy Satoshi Nakamoto left for humanity—a vision of trust, decentralization, and infinite potential.
Satoshi Nakamoto may truly have come from the future.
-
@ df478568:2a951e67
2024-11-20 03:46:34Nostree.me is a free and open-source version of Linktree built on nostr. Since I was able to run zap.cooking on my PopOS! Desktop computer, I decided to try running nostree too. The process was the same so I won't go over it again. If you want to run it, follow the blog post I wrote about zap.cooking here. Just use the nostree repo instead.
I Made A Pull Request
Since I am not so good at writing code, but am decent at Markdown, I decided to make a pull request to change some of the spelling and grammar mistakes. I have an expired English teaching credential after all. I might as well use this knowledge to make the world a better place in some way. I'm not sure if it will get merged, but one can hope. The world of Free and Open Source software is brutal, but I love it! I want to contribute to FOSS as much as I can, to the best of my ability.
Nevermind. Before I finished writing this, I just got an email. The changes were merged! Damn, it feels good to contribute to free and open-source software. It's not some paradigm-shifting code like Bitcoin, but I made the FOSS world a little bit better today than it was yesterday. I'll take that as a WIN!
My Instance of Nostree.me
- You can find my Instance of nostree at https://nostree.marc26z.com/
- My profile is at https://nostree.marcz.com/npubmarc26z
I think it would make a cool signature. The only problem is my profile picture doesn't show up for some reason and you are not able to zap me on this instance, but I can just make a zapping link to fix this. I also think the spinning circle is kind of cool like the eyes of the Cheshire cat in Alice In Wonderland. I think this will make a nice signature to my self-sovereign blog that is cross-published on nostr. That's what I'm using it for, It should work as long as my computer doesn't crash and the power doesn't go out, but if it does, I can fix it. The computer stuff that is. I can't do jack about the electric company.
Thanks for reading.
✌️ npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
-
@ 75869cfa:76819987
2024-11-20 02:40:51GM, Nostriches!
The Nostr Review is a biweekly newsletter focused on nostr statistics, protocol updates, exciting programs, the long-form content ecosystem, and key events happening in the Nostr-verse. If you’re interested, join me in covering updates from the Nostr ecosystem!
Quick review:
In the past two weeks, Nostr statistics show over 187,000 daily trusted pubkey events, a 10.17% decrease from the previous period, with new user growth showing signs of slowing. Around 33,000 users have profiles with bios, and 33,000 have LN addresses, both showing increases of 13.2% and 17.2% respectively. However, contact list users have dropped by 15.6%. More than 9 million events have been published, with posts leading in volume, totaling about 1.3 million. Total Zap activity reached over 11 million, showing a 12% decrease.
Additionally, 19 pull requests were submitted to the Nostr protocol, with 7 merged. A total of 40 Nostr projects were tracked, with 8 releasing product updates, and over 340 long-form articles were published, 31% focusing on Bitcoin and Nostr. During this period, 4 notable events took place, and 1 significant events are upcoming.
Nostr Statistics
Based on user activity, the total daily trusted pubkeys writing events exceeded 187,294, a 10.17% decrease compared to the previous period (October 15-28). The daily peak reached 19,124, the highest in the past two months, with a low of nearly 13,583. In terms of user numbers, profiles with bios are around 33,000, up 13.2% over the past two weeks; profiles with LN addresses are about 33,000, up 17.2%; profiles with contact lists are around 15,300, down 15.6%. Regarding event publishing, the total note events published has surpassed 9 million. Posts still lead in volume, totaling about 1.3 million, far outpacing reposts (320,000) and reactions (500,000). For zap activity, the total zap amount has reached over 1.1 million, a decrease of around 12%. In terms of relay usage, the top five relays by user count are: wss://realy.nostr.band/,wss://realy.diggoo.com/,wss://realy.lumina.rocks/,wss://bostr.syobon.net/,wss://nr.yay.so/ Data source: https://stats.nostr.band/
NIPs
Instagram feeds npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z is defining is defining event kind 20 for image-first clients, where images must be self-contained, hosted externally, and referenced using imeta tags. Unlike kind 1 events, which can include an attached picture, picture events are designed to hold all relevant metadata about the associated media and to be displayed in image-focused clients rather than general micro-blogging clients. The intention is for events of this kind to be referenced in Nostr clients resembling platforms like Instagram, Flickr, Snapchat, or 9GAG, where the image itself is central to the user experience.The imeta tag annotate-user places a user link in the specific position in the image.And only the following media types are accepted: APNG (Animated Portable Network Graphics), AVIF (AV1 Image File Format), GIF (Graphics Interchange Format), JPEG (Joint Photographic Experts Group), PNG (Portable Network Graphics), and WEBP (Web Picture Format).
Nip46 upgrade part2: remove nip05 and create_account, clarify nostrconnect, cleanup, add nip05 signer metadata nostrband is proposing that removing NIP-05, updating nostrconnect:// and moving create_account elsewhere. Also added Overview, shifted signing flow example below request/response format description, added nip05 signer metadata description to appendix, compressed nip89 use for signer discovery.
Feeds npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn is proposing that adds custom feeds that can (mostly) compile to filters, for content-addressable, user-customizable feeds, useful for clients with bandwidth limitations. Implemented by Coracle.
nip37: optional kind:1 edits npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 is proposing a compromise that doesn't make such a complex upgrade de facto mandatory and doesn't force clients to all adopt the same significantly more complex techniques for handling, storing and indexing data that apps like Damus and Amethyst do, keeping Nostr simple and barriers to entry low enough. This NIP describes a flow for editing kind:1 notes that is mostly backwards-compatible (as long as clients support NIP-09 properly).The flow for editing a kind:1 note consists of creating a new kind:1 note to be published in its place, then issuing a kind:5 delete request for the first, in both cases attaching special tags that denote the nature of the operation to clients that want to support a more rich edit flow.
NIP-146 iframe-based Nostr Connect nostrband is defining a way for web apps to communicate with web signers embedded as iframes using browser APIs. It is applicable to self-custodial signers that store keys in the browser's local storage. Basically, client app does nip-46 RPC with an iframe using postMessage. Due to privacy-related restrictions, local storage of iframes is partitioned from top-frame's storage - iframe of signer.com can't see the storage of top-level signer.com and can't access user's private key. The advantages include minimal latency, no reliance on relays or unreliable webpush, and full cross-platform support. Additionally, due to browsers' cross-origin restrictions, the user's private key is equally safe in an iframe's local storage as it is in top-level storage.However, the disadvantages are the potential for more frequent “confirmations”and an increased surface area for web-based hacks.
Add support for address quotes npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn is proposing that address quotes, which are currently broken due to ambiguity with a tag usage, should be fixed to function like event ID quotes. The issue arises because using a tag with a mention mark conflicts with great-grandchild replies where the grandparent is a replaceable event referred to by an a tag. While it is acknowledged that this change could be disruptive, he suggests that since address quotes and replies are currently undefined in the NIPs repository, this is a good opportunity to standardize their behavior. Additionally, Flotilla currently uses the "q" tag for address quotes.
nip45: add hyperloglog relay response npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 is proposing that implementation of HyperLogLog (HLL) for relay responses to improve follower counts without relying on a single global relay like relay.nostr.band. This approach aims to reduce bandwidth consumption while providing more accurate follower counts. HyperLogLog can be implemented in various ways with different parameters and configurations. Fortunately, most customizations (such as the differences between HyperLogLog++ and HyperLogLog) can be applied at the final step, so it remains a client’s choice. This NIP only focuses on the interoperability aspect, explaining how relays should compute the values and return them to clients. Since implementations need to agree on parameters like the number of registers, this NIP fixes the register count at 256 for simplicity (as it is the maximum value of one byte) and because it is a reasonable amount.
add token reserve kind npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft is proposing the introduction of "kind:7373" to the Nostr protocol, which would be used for reserving tokens. This proposal also includes refining the text based on @davidcaseria's suggestions. Additionally, he suggests providing an optional method for validating whether relays are properly adhering to NIP-09's deletion requirements. The overall goal is to expand the protocol with token reservation capabilities while ensuring clarity on relay compliance with specific deletion actions.
nip37: non-harmful editable short notes npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 is proposing that an alternative approach to #1090, #1091, and #1556 with the introduction of NIP-37, which focuses on harmless, editable, and short notes. it maintains the openness of clients that haven't implemented the feature and Type 1 events, while also enabling more complex clients to perform full editing without requiring more work than other proposals. This NIP describes a flow for clients that want to support editable short notes without breaking the experience of clients that don't and keeping kind:1 a safe place.The idea is that editable notes are published as kind:31000 notes that follow all the same rules of kind:1, except for the fact that they can be replaceable anytime.
NIP-60: Provide an option to use ncryptsec water783 npub10td4yrp6cl9kmjp9x5yd7r8pm96a5j07lk5mtj2kw39qf8frpt8qm9x2wl is proposing a method that provides an option to use either the privkey or ncryptsec, helping prevent the user's wallet privkey from being exposed in case the main nsec is leaked.
Notable Projects
zPay V4V model npub1cmmswlckn82se7f2jeftl6ll4szlc6zzh8hrjyyfm9vm3t2afr7svqlr6f
zPay.live is shifting its focus to the V4V model (Value for Value).Paywalls will remain an option, but we will prioritize upcoming V4V features.What to expect: * CrowdWall: When a target is reached, content unlocks for everyone. (in-progress) * V4V Paywalls (Flexible price) : Buyers can choose their own price, & creators can set limits if they want. (shipping in few days) * Blossom built-in storage & multiple file/folder upload option is also coming soon.
YakiHonne update npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q
Announcing YakiHonne 2.0: Simpler, Faster, and Built for Creators! * Onboarding: Easily create a non-custodial wallet with Npub & Nsec, experience zapping (Lightning payments), or browse as a guest. * Home & Discover: “Discover” is designed for creators, focusing on rich formats like long-form content, videos, and curated works. “Home” offers a social feed with short notes and curated contents, making it quick and easy for creators to share their work. * Wallet: Simple setup with easy creation, direct YakiHonne node linking, and multi-wallet support. * Dashboard: Manage all published and drafted content, check stats, and pick up right where you left off—all in one place. * Notifications: Reactions, Reposts, Mentions, Zaps, Comments, and Follows now appear in clear, categorized cards. * Settings: Completely revamped for simplicity, now including profile customization, appearance, relay settings, and wallet management. Additionally, re-engineered core now supports the outbox model with extensive functionality.
NDK 2.10.5 npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft
NDK 2.10.5 released reconnection bug fixed.
Hivetalk update npub1z0lcg9p2v5nzg5fycxq0k56ze6snp42clmrafzqpn5w6u74v5x9q708ldk
When you click someones icon the toggle pin for expanding their screen on your device is only available if they screen share.Moderators if you dont want anyone disrupting while you are presenting remember to turn on 'Everyone can't share screen' in Mod Settings.
Nos.social 1.0.0 npub1pu3vqm4vzqpxsnhuc684dp2qaq6z69sf65yte4p39spcucv5lzmqswtfch
Nos.social version 1.0.0 now lives in Australia and New Zealand, complete with an updated onboarding workflow designed to help new users understand keys, find people to follow, and create their first post. Changes in version 1.0.0: * Updated the onboarding screens with a new design * Added a tip to the Feed to welcome first-time users and explain how the Feed works * Added a tip to Discover to prompt first-time users to go to their Feed * Removed integration with Universal Name Space * Remove most usage of xcstringstool-generated strings to improve performance * Added new authors and categories to the Discover tab * Fix Search bar disappearing on Discover tab when scrolling * Nos now hides the notes from blocked users when viewing their profile page * Added a tag to published contact lists to help us detect the source of lost contact lists * Added relay.mostr.pub to the default relay list * Fix two bugs that could result in muted users being unmuted
Nosta update npub1z29uqk4xl4pp6qxrcvufx20nnn782zcrtkmvmtfwkruc80l4v20sr9heag
A minor update of Nosta just rolled out. * updating the profile creation flow to show the new standard format (nsec) for private keys. * Login accepts both new and old formats (but you really should use an extension). * Some libraries got updated, which required a few code tweaks. Next up is implementation of a dedicated Nosta relay to provide reliable storage and retrieval of basic profile info. Goal is to speed up site load times and reduce "profile not found" situations.
0xchat 1.4.0 npub1tm99pgz2lth724jeld6gzz6zv48zy6xp4n9xu5uqrwvx9km54qaqkkxn72
0xChat 1.4.0 release is now available on Zapstore, App Store, Google Play, Android APK version. * Enhanced UX for a Telegram-like experience * Updated message and calling sounds, with special thanks to @Freakoverse for the audio * Added support for CashuB tokens in the Cashu wallet * Added support for 'input_fee_ppk' in the Cashu wallet * Improved compatibility with Android 9 * Enabled support for 'kind 15' encrypted file messages. Additionally, some bug fixes,such as relay initialization,preventing call cancellation,e-cash wallet keyset is invalid.
DEG Mods update npub17jl3ldd6305rnacvwvchx03snauqsg4nz8mruq0emj9thdpglr2sst825x
- Searching for profiles on the site now works
- The source filter & some filters now appear in the URL (easier to share specific pages with friends)
- Filters are temporarily saved locally (better UX)
Long-Form Content Eco
In the past two weeks, more than 340 long-form articles have been published, including over 80 articles on Bitcoin and more than 25 related to Nostr, accounting for 31% of the total content.
The Nostr articles mainly explore themes of decentralized communication, feature optimization, and improved user experience. They cover topics such as the importance of censorship-resistant communication, innovative app designs like Zapchat, user guides on enhancing information feeds, and the introduction of community-focused clients. Additionally, discussions include technology that bolsters security, the latest advancements in community tools. These articles emphasize the potential of decentralized technology to drive innovation and safeguard individual freedoms, while providing users with insights into feature enhancements and community growth.
The Bitcoin articles discuss its position in the global financial system and future prospects, particularly its role as "digital gold" with inflation-resistant characteristics. They also analyze Bitcoin's technological advancements in privacy and scalability, especially innovations supporting decentralization and censorship resistance. The widespread adoption and growing popularity of Bitcoin across the globe are key topics, with a particular focus on its performance during periods of economic uncertainty. Furthermore, the articles delve into the factors contributing to fluctuations in investor confidence, as well as the market dynamics driven by major holders and institutional players.
Thankyou,@npub1xhe6ymx3ua6669k6mrxgar5afqjeljxtgc3shjtx8jqj0yka7gcspt896x,@npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6,@npub1g8n0yzcl92kjjnk59s9uqdyrtd38z6gvt8fa5tsr2uhespsynezs6lemp2,@npub1klxdfyljhdnkcfum90wztuud7lzdnq89r7rksj05hl2nw6azyc8st0snuu,@npub1t8039zy2ud9svf70yfxcfnsy7euk908qz9el0rlju7x60yhpw38se95l3r,@npub1l5sga6xg72phsz5422ykujprejwud075ggrr3z2hwyrfgr7eylqstegx9z, and others,for your work. Enriching Nostr’s long-form content ecosystem is crucial.
**Nostriches Global Meet Ups **
Recently, several Nostr events have been hosted in different countries.
-
The Latin American Bitcoin and Blockchain Conference (LABITCONF) took place from November 1-3, 2024, at the Costa Salguero Complex in Buenos Aires, Argentina. As the leading event in the Latin American Bitcoin and blockchain industry, LABITCONF focused on topics such as the latest Bitcoin technologies, blockchain applications, financial innovation, and the global cryptocurrency ecosystem. The conference organized over 200 sessions and invited more than 100 industry leaders and experts from around the world, including @npub1z94gps9nl5u0zq0hdq0t653np7rpc93pfslg20vyfq87n9zvxl6skk6x3g,@npub1hz5alqscpp8yjrvgsdp2n4ygkl8slvstrgvmjca7e45w6644ew7sewtysa,@npub1xtwy7fvu8f7wdtgnpm68wyrf6uxshf49tn5kp7kyusu6872amn8qh06rus,@npub1fc6w3gnast4m9fgeuzektuadw28dtper48cq7cvwlh0ah7nlf2ws72z9yh, and more ,exploring the role of Bitcoin and blockchain technology in the global economy and their potential applications and opportunities in the Latin American market.
-
Satsconf 2024 took place from November 8 to 9 at the São Paulo Expo in São Paulo, Brazil. As one of the largest Bitcoin events in Brazil.With over 80 sessions, it brought together nearly 110 Bitcoin experts from around the world to discuss topics like freedom, personal sovereignty, and the internet of money. Speakers included nostr:npub19tv378w29hx4ljy7wgydreg9nu96czrs6clu8wkzr3af8z86rr7sujx4xe @npub1tdc9um9kqfp9cqvjqtwswzsvqzdsgzkpn9swamed3286kfwpaljsrr8r0y,@npub1wlkfvm7dvnusz9fv44wuwucu0jp3lc3wqt36ax0lz33hukjga7wq6hqwhy,@npub1xtwy7fvu8f7wdtgnpm68wyrf6uxshf49tn5kp7kyusu6872amn8qh06rus, and many others. The event provided an in-depth look at Bitcoin’s potential to drive social change and foster innovation within the financial landscape.
-
The Getting Started with Nostr event was recently held online on the nostrelites.org platform, offering a wealth of Nostr resources, including videos, podcasts, articles, and technical guides, to help users quickly understand the fundamentals and applications of the Nostr ecosystem. Topics covered included the state of social media, decentralized media, and technology for freedom, providing participants with a well-rounded opportunity for learning and exploration. @npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424
-
The Bitcoin Culture Festival was successfully held in London, UK, from October 29 to November 3, 2024, coinciding with Halloween and Bitcoin White Paper Week. The event featured art exhibitions, live music, and cultural activities, promoting open-source and cypherpunk values. It took place at Tooting Market, hosting 20 Bitcoin-related vendors offering food, drinks, and services. Attendees shared their Bitcoin stories, participated in open mic sessions, and showcased Nostr projects. The event concluded with all memorable moments captured by professional photographers. @npub1hmqvn57wfm7qcygkt4et3qffhvdwyer9mkz0lyzjwr29438fe55s4r0s33
Here are the upcoming Nostr events in November that you might want to check out.
- Adopting Bitcoin 2024 will take place from January 26 to 28, 2024, at CTICC Ballroom West in Cape Town, South Africa. The event will feature over 50 experts, advocates, and innovators from around the world, including Jimmy Song, Femi Longe, and Ben Van Hool, who will discuss the future of Bitcoin, personal sovereignty, and parallel institutions, as well as how Bitcoin is driving financial independence and empowerment. Attendees will also have the opportunity to enjoy the vibrant atmosphere of Cape Town and explore its iconic landmarks.
Additionally, We warmly invite event organizers who have held recent activities to reach out to us so we can work together to promote the prosperity and development of the Nostr ecosystem.
Thanks for reading! If there’s anything I missed, feel free to reach out and help improve the completeness and accuracy of my coverage.
-
@ 502ab02a:a2860397
2024-11-20 02:11:25ผมนั่งคุยกับคุณเอ๋ เรื่อง butter cake เค้กคลาสสิกตลอดกาล เรามองเป็นภาพใหญ่ๆว่า มี 2 แบบ (ไม่ได้ขนาดจะลงดีเทลนะ) อันนึงคือแบบคลาสสิก อีกอันนึงเราเรียกเล่นๆว่า สไตล์ไทย เรียกแบบนี้เพราะเจอคลิปต่างชาติหลายคลิปเรียกมันว่าแบบนี้ ฮาๆๆ น่าภูมิใจ
ที่คุยกันไม่มีอะไรมากเลย แค่ว่าเริ่มจากหัวข้อคือ ถ้าจะทำ butter cake เราชอบแบบไหนกัน ส่วนตัวผมชอบเค้กสไตล์ฝรั่งพวกแครอทเค้ก ฟรุตเค้ก เค้กหนักๆทั้งหลาย ส่วนคุณเอ๋ชอบสไตล์ญี่ปุ่น เบาๆ ซอฟท์ๆ เราเลยมี butter cake ที่ชอบคนละแบบกัน
แบบสไตล์ไทยที่ต่างชาติเรียกนั้น ผมมักเรียกว่าเค้ก ซาราลี sara lee เพราะเห็นมาตั้งแต่เด็กๆ สมัยนี้จะเจอ S&P เสียมากกว่า เป็นสไตล์ที่เราเห็นตามโซเชียลมีเดียมากพอสมควร เนื้อเนียนกริ๊บ หน้าตึงสวยเปลือกชัด เรียกว่าทำกันเก่งๆทั้งนั้นเลยครับ น่ายินดีเป็นศรีแก่ประเทศมากๆ
แต่ผมจะชอบแนวดิบๆ rustic หน่อยๆ butter cake ที่ผมชอบเลยต้องเป็นแบบแน่นๆ หน้าแตกๆ ขอไม่เอาเนียนๆขอแบบเนื้อไม่ละเอียด ผมว่ามันเท่ดี เหมือนเคยได้ยินมาว่า butter cake คลาสสิก ต้องหน้าแตกด้วยนะ 555 ซึ่งก็เป็นสไตล์ที่คุณเอ๋ทำส่งให้ที่บ้านอยู่เสมอๆอยู่แล้ว
เอาเหอะครับคือที่คุยกันไม่ได้จะอะไรขนาดว่า ของแท้ต้องแบบไหนอะไรเลย เพียงแค่ว่า เราคุยกันว่า ณ วินาทีนี้ การทำ butter cake แบบคลาสสิก จะมีคนเข้าใจได้ไหมเพราะ norms ของ butter cake มันกลายเป็นต้องเนื้อเนียนละเอียดยิบดั่งผืนทรายระยอง หน้าตึงกำลังดีสีน้ำตาลสวยสด ละมุนละไมไร้ที่ติ
มันกำลังกลายเป็นว่า butter cake คลาสสิก คือความไร้ค่าหรือเปล่านะ
แต่ก็เป็นแค่คำถามที่เราลอยๆเอาไว้ครับ เพราะไม่ว่าคำตอบจะเป็นอย่างไร เราก็จะทำแบบที่เราอยากทำอยู่ดี นั่นคือ Rustic Butter Cake สูตร Classic ว๊ะฮว่าๆๆๆๆ ผมชอบความไม่เป๊ะของมันนะ ความไม่เป๊ะเนี่ยคือ rustic butter cake ในแบบที่ผมอยากได้เลย แต่ต้องแยกนะระหว่างไม่เป๊ะ กับ ชุ่ย มันต่างกันนะ 555555 คือผมอยากให้ butter cake มันออกมาแบบ สร้างความรู้สึกอบอุ่นเหมือนทำเองที่บ้าน มีเนื้อสัมผัสหรือรูปลักษณ์ที่ดูดิบๆ และไม่เนี้ยบ เรียบง่ายไม่ปรุงแต่งจนเกินไป
แต่ก็นะ ยังมีอีกมุมที่ว่าปรับอะไรนิดหน่อยให้มันเป๊ะขึ้นมาอีกนิด เพื่อปิดช่องที่คนจะมองว่าชุ่ยไปบ้างก็ดี นี่เลยเป็นที่มาของการปรับสูตรเล็กๆน้อยๆ
ที่สำคัญคือ ได้เอาความรู้ด้านเนย มาสร้างความสนุกสนานกับเค้กตัวนี้ให้เต็มที่ แค่ทำก็สนุกแล้วครับ #PirateKeto #siripun #ตำรับเอ๋
-
@ 3c7dc2c5:805642a8
2024-11-19 21:19:27🧠Quote(s) of the week:
"Bitcoin is an intelligence test, but it’s also an epistemic humility test. You don’t have to know everything about Bitcoin, nobody knows everything about Bitcoin. The question is, do you pretend you know when you don’t? And if you do you’ll be exposed." -Troy Cross
🧡Bitcoin news🧡
Let me start this week's Weekly Recap with the following tweet by Sam Baker (macromule):
The US dollar has peaked and will never recover. We can't save in dollars, we only spend them. River's thesis unveils the past, present, and future of money in society Let's start with how we got here:
Read the full thread here:
On the 11th of November:
➡️Mt. Gox distributed 30k coins over the last 10 days and the market didn't flinch. Also, they are basically out of coins with only 2k remaining.
➡️Bitcoin just closed the biggest weekly candle ever (It took Bitcoin 9 years to go from zero to $20k per coin. It just added $20k in a week), and today was the biggest daily gain in Bitcoin history!
On the 12th of November:
➡️Publicly traded AI firm Genius Group adopts #Bitcoin as a primary treasury asset and plans to acquire an initial $120 million of #BTC.
➡️$1 BILLION leveraged crypto positions liquidated as Bitcoin surged to a record $89,000 yesterday.
➡️Italy set to reject 42% tax on Bitcoin, and may not increase tax at all - Bloomberg
➡️ Unsurprisingly, The Bitcoin Price Follows Global Liquidity Joe Consorti: 'It followed the world's money supply perfectly, with a 10-week delay. Know where the printer is going? You know where Bitcoin is going. Perfection.'
Ergo: more fiat printing -> more Bitcoin pumping. Stack accordingly!
➡️Ethiopia uses 98% renewable energy and now represents 2.25% of global hashrate Bitcoin mining has also contributed $55M to the economy of Ethiopia - much of it surplus energy that would have flowed over the top of the dam. Source: https://www.mariblock.com/ethiopia-earns-55-million-from-bitcoin-mining-deals-in-10-months/
➡️Ai company Genius Group adopts Bitcoin as its primary treasury asset and will buy $120m Bitcoin. Genius Group will also start accepting Bitcoin payments. "We see Bitcoin as being the primary store of value that will power these exponential technologies"
➡️'Price range for Bitcoin in the 4th halving cycle if it follows a growth trajectory in the range of the previous cycles. Upper Bound ~ $4,500,000 Lower Bound ~ $140,000 Buckle up.' -Carl B Menger
➡️'Bitcoin ETFs have crossed $90b in assets, after yesterday's $6b jump ($1b in flows and $5b in market appreciation). They are now 72% of the way to passing gold ETFs in assets.' - Eric Blachunas
➡️Bitcoin dominance surges to a new 3.5-year high of 60.59% as Bitcoin approaches a fresh all-time high.
➡️'While small investors are actively accumulating, Bitcoin whales are in a distribution phase. Meanwhile, long-term hodlers maintain a steadfast approach, indicating a strong optimism in Bitcoin's appreciation.' -Bitcoin News
➡️ Nasdaq-listed Chinese microchip company Nano Labs now accepts Bitcoin as payment.
➡️Ballet CEO Bobby Lee: Bitcoin will surpass $90K within the week, $100K by year-end, and will hit $1 million within 5-6 years.
➡️There's an 88% chance that pro-Bitcoin Scott Bessent will become the next Treasury Secretary under the Trump administration, according to Polymarket.
➡️Tuur Demeester: "ECB bombshell: On Nov 4—the night of the US election—the authors of the highly aggressive anti-Bitcoin paper softened the language in their concluding paragraph:
In the original it said: "Current non-holders should realize that they have compelling reasons to oppose Bitcoin and to advocate for legislation against it, aiming to prevent Bitcoin prices from rising or to see Bitcoin disappear altogether." hat sentence now reads: "Current non-holders should realize that they have reasons to worry about Bitcoin and legislation favoring it." Also, the last sentence was altered, leaving out the words "implying wealth redistribution".
A remarkable change at such a pivotal moment in history. Were the authors instructed to make these edits by ECB top brass, once it became clear that Trump's pro-bitcoin team was winning the election?"
➡️Bitcoin hit $90,000 today for the first time, 90x higher than where it was 11 years ago. Satoshi Nakamoto is now the 19th richest person in the world. Bitcoin flips Saudi Aramco, the largest oil company in the world, to become the 7th largest asset by market cap.
Meanwhile, all Fiat currencies around the globe are at all-time lows against Bitcoin. Classic!
➡️BlackRock's Bitcoin ETF just did +$1 BILLION in trading volume today in the first 25 minutes — MORE than yesterday’s opening. The Bitcoin ETF has hit $40 billion in assets in a record time. It took IBIT just 211 days to hit the $40 billion threshold.
By comparison, the second fastest ETF took 1,253 days to hit $40 billion, or ~6 TIMES longer.
BlackRock also disclosed that it directly owns $91m Bitcoin through its own ETF. BlackRock manages $11.5 Trillion!
Meanwhile, Vanguard has 'protected' its clients from gains of approximately 104% by not allowing them to buy any of the Bitcoin ETFs. The irony!
On the 13th of November:
➡️ Bhutan now owns over $1 billion in Bitcoin. Monks are stacking hard. Bhutan will be remembered as one of the smartest countries of the 21st century. They will be set for centuries because they decided to move early on Bitcoin.
➡️Japanese public company Metaplanet gained $28 million in unrealized profit on their Bitcoin holdings.
➡️Trump administration so far: 11 of them are Bitcoin allies 7 of them are confirmed cryptocurrency holders 6 of them are confirmed specifically as Bitcoin holders Like Trump or hate Trump, the undeniable truth is that this White House roster is insanely bullish for Bitcoin. Hello, Trojan Horse!
➡️Recent social media hype and speculation about Bitcoin going to $100K may indicate a potential local top.
Historically, whales often counter the crowd's sentiment, buying when others are fearful and selling when they're exuberant, per Santiment.
On the 14th of November:
➡️El Salvador is now sitting on Bitcoin of more than $140 million! Remember when the IMF warned them about the risks in 2023? El Salvador started buying 1 Bitcoin EVERY SINGLE DAY on the 16th of November 2 years ago.
They literally started at the bottom of the bear market and now HODL: 6,158 Bitcoin worth $518 - ~profit $138m
➡️$1.4 TRILLION Teachers Insurance and Annuity Association reports holding Bitcoin through the Fidelity ETF - SEC fillings
Fiat millionaires:
✅Holders of 1,000,000 BTC
✅Holders of 100,000 BTC
✅Holders of 10,000 BTC
✅Holders of 1,000 BTC
✅Holders of 100 BTC
Holders of 10 BTC - 2024?
Holders of 1 BTC - 2029?
Holders of 0.1 BTC - 2033?
Holders of 0.01 BTC - 2037?
Bitcoin makes your dream (home) a reality…
Future generations will look at us who bought Bitcoin for under $100k the same way we look at boomers who bought houses for under $30k.
➡️Reserve Bank of Australia Governor Michele Bullock on Bitcoin: "Look, it's not a currency, it's not money… But, you know, I don't really see a role for it, certainly in the Australian economy or payment system." Meanwhile, the US is likely to start building a strategic Bitcoin reserve. So when I see stuff like this, oh well Australia is behind the curve.
➡️Pennsylvania proposes investing up to 10% of state funds in Bitcoin to diversify assets and combat inflation. If passed, PA would be the first state to directly hold Bitcoin. It's happening ladies & gentlemen!
Pennsylvania's economy is the size of Saudi Arabia’s economy, valued at around $1 trillion. Pennsylvania’s natural gas production parallels Saudi Arabia’s oil dominance. Game theory at the state level!
➡️Ethereum is dead. Bitcoin went from $70k to $90k in 8 days—an extremely bullish occurrence that should've sent alts much higher relative to BTC. ETH/BTC plunged to a 45-month low and lost critical 0.034 support. Meanwhile, Ethereum Foundation's official YouTube channel shilling CBDCs.
Parker Lewis: "So why is Ethereum collapsing relative to Bitcoin (1-8)?" Read here: https://x.com/parkeralewis/status/1857560022835700171
➡️As the price of Bitcoin surged last week the of Bitcoin fiat millionaires grew. 10,000+ new addresses were added to the Bitcoin fiat millionaire list in the previous week There are now 133,400 Bitcoin millionaires (addresses holding $ 1 million worth of Bitcoin), a new ATH!
➡️Saylor: Senator Lummis’ Strategic Bitcoin Reserve bill would offset $16 Trillion of the US national debt. It’s economically wise and technically wise. Bitcoin is a manifest destiny for the United States.
➡️Goldman Sachs’ latest 13F filing reveals over $700 million of Bitcoin ETF holdings up 71% in Q3, signaling a major shift as it becomes BlackRock iShares Bitcoin Trust's 2nd-largest holder.
On the 15th of November:
➡️Satoshi-era Bitcoin wallet just moved 2,000 BTC for the first time since 2010. They held from $0.06 to $90,000 and it is now worth $179,000,000.
➡️ Bitcoin miners send over 45K BTC to exchanges.
➡️Public-listed company Solidion Technology to allocate 60% of cash flows to buy Bitcoin for its corporate treasury.
River: "It's been two years since the FTX collapse. More bitcoin than ever is in self-custody or with exchanges providing Proof of Reserves. It's critical to avoid history repeating itself."
➡️Only 1,003,525 addresses have more than 1 BTC. It’s a big deal to have 0.1 BTC today.
On the 16th of November:
➡️Bitcoin just made the HIGHEST daily close in history at $91,058
➡️A Kennedy who is about to oversee 27% of US Federal spending gives Bitcoin his strongest possible endorsement—for individual liberty, to balance the budget, and to save the dollar. Robert F. Kennedy Jr. says "Bitcoin is the currency of freedom, a hedge against inflation for middle-class Americans, a remedy against the dollar’s downgrade from the world’s reserve currency, and the offramp from a ruinous national debt."
➡️"Thumzup, a Los Angeles-based social media marketing firm, announced the purchase of $1 million in Bitcoin as a treasury reserve asset." - Bitcoin News
➡️Sam Callahan: 'Only fourteen companies in the S&P 500 hold more financial assets than MicroStrategy and MicroStrategy’s balance sheet is the only one that won’t depreciate in value over time.'
On the 17th of November:
➡️Warren Buffett-owned Brazilian bank Nubank launches Bitcoin and crypto swaps to USDC. Nubank has 100 million customers in Latin America!
➡️Polish Presidential candidate publicly vows to use the SatoshiActFund model policy to create a ‘Strategic Bitcoin Reserve.
"Poland should keep its currency reserves in Bitcoin. In a few years it will be apparent that it was a completely obvious decision.” - Slawomir Mentzen
➡️Tudor’s 13F filing last week is important and should be mentioned. Its portfolio is watched closely by asset managers, especially hedge funds.
'Paul Tudor Jones’ latest 13F filing reveals he owns $159.9 million of IBIT (4,428,230 shares), a 409% increase from June’s 869,565 shares. This made Bitcoin the third-largest non-options position in Tudor’s portfolio, behind SPY ($208M) and NVDA ($166M).' -Bitcoin News
Soon it will be its biggest holding!
➡️'The absolute worst 4-year compound annual growth rate (CAGR) for Bitcoin is 24%. This means that even if you bought Bitcoin at the worst possible time and held it for 4 years, you would still achieve an average annual return of 24% on your money.
Running the numbers: Bitcoin price if it was to return 24% annually and held for the next.... 4 years: $215K 5 years: $267K 10 years: $782K
However, the current 4-year CAGR is 50%. Bitcoin price if it was to return 50% annually and held for the next... 4 years: $461K 5 years: $691K 10 years: $5.2M
How many years to retirement would you need if you earned a 24%, or 50% annual return on your money?' - Mark Harvey
On the 18th of November:
➡️1 satoshi = 1 Argentine Peso Parity achieved in Argentina
➡️On this morning: - MicroStrategy buys another 51,780 BTC for $4.6B - MARA announces $700 million convert to acquire more BTC - Semler Scientific raises $21mm ATM and acquires 215 BTC - Metaplanet issues ¥1.75B debt offering to buy more BTC The corporate Bitcoin race is heating up...
➡️MicroStrategy has acquired 51,780 BTC for ~$4.6 billion at ~$88,627 per Bitcoin and has achieved a BTC Yield of 20.4% QTD and 41.8% YTD. As of 11/17/2024, we hodl 331,200 bitcoin acquired for ~$16.5 billion at ~$49,874 per Bitcoin.
➡️'Mara Holdings to raise $1 BILLION at 0.0% interest to buy more Bitcoin after initial $750m offer was oversubscribed!
Free money to buy Bitcoin.' -Bitcoin Archive
➡️Global healthcare group Cosmos Health adopts Bitcoin as a treasury reserve asset.
➡️Businesses are buying BTC faster than ever. Over $15 billion in Bitcoin in 2024, or 671 BTC/day.
MicroStrategy is leading the pack, but more is happening under the surface. Brief Q4 update on business Bitcoin adoption.
Read the great River thread here.
💸Traditional Finance / Macro:
On the 13th of November:
👉🏽 SMCI has officially fallen below $20 and wiped out nearly 2 years of gains as it becomes clear they will get delisted.
On the 15th of November:
👉🏽The Dow, Nasdaq, and S&P 500 are all set to close the week in the red. The Nasdaq is down -2.7% this week and set to post its LARGEST weekly decline since September 3rd.
On the 17th of November:
👉🏽TKL: 'For the first time in 22 years, the 10-year Treasury yield has exceeded the S&P 500's earnings yield. The S&P 500 equity risk premium has also fallen to -0.44%, well below its long-term average.
Over the last 5 years, the difference in yield has fallen by 5 percentage points posting one of the largest drops over the last 50 years. To put this differently, in theory, less risky 10-year Treasuries are now paying a HIGHER yield than the S&P 500. In the past, this move has suggested that the market is overvalued and expected stock market returns could be lower in the future.'
🏦Banks:
👉🏽 No news
🌎Macro/Geopolitics:
On the 13th of November:
👉🏽President Milei got the inflation rate from 25.5% to 2.7% in under a year. Bear in mind that the 2.7% inflation is per month, it is the lowest in 3 years.
👉🏽'The Federal Reserve’s balance sheet is now below $7 TRILLION for the first time since August 2020.
In October, the Fed reduced its portfolio of assets by $53 billion, hitting $6.99 trillion. Since the March 2022 peak, the Fed has shrunk its balance sheet by $1.97 trillion. However, this is still $2.85 trillion above the pre-pandemic levels. Last week, the Fed reiterated that it will continue reducing its balance sheet. "Undoing" pandemic-era stimulus still has a long way to go.' -TKL
👉🏽US Headline inflation rose to 2.6% in October, matching expectations. Core CPI is steady at 3.3%.
Both headline and Core CPI inflation are now higher than they were 2 months ago. 8% mortgage rates are on their way. We now have MULTIPLE rising inflation metrics with signs of a weakening labor market. For the first time since September 2022, both CPI and PPI inflation are officially back on the rise. Hello, stagflation?!
And on that very same day news came in that...
👉🏽'The US median home sales price hit $386,970 in November, near the highest level on record.
Home prices surged 5.8% year-over-year marking the biggest increase in 2 years, according to Redfin. Home prices are now ~9% and ~14% higher than they were in 2022 and 2021, respectively. Since January 2021, home prices are up 29%. Meanwhile, the median asking price rose 5.0% to $393,125 and is also ~9% above 2022 levels.
Housing affordability is somehow still getting worse.' - TKL
This all while the mortgage rate continued to rise. If wonder why people are opting not to have children, money is mostly the number one reason.
👉🏽History may not repeat, but it certainly rhymes.
Trump is being handed a ticking time bomb... Fed Chair Powell says the Fed does not need to be "in a hurry" to reduce interest rates. He said, "The economy is not sending any signals that we need to be in a hurry to lower rates."
Why did the Fed cut by 50 basis points in September?
'By prematurely cutting rates by 50 bps ahead of the election, even with inflation still running hot, the Fed has set the stage for an inflationary resurgence
The latest October inflation data released this morning confirms the trend, with the PPI coming in at 2.4%, hotter than the expected 2.3% Meanwhile, core PPI rose to 3.1%, ahead of the expected 3.0% increase The bond market is now in full revolt, with 10-year Treasury yields up nearly 70 bps since the Fed began cutting overnight rates in September
Rising borrowing costs will become a major headwind for Trump's pro-growth, and likely pro-inflationary, fiscal policies And it will soon become a major problem for investors paying a near record high 28x earnings in today's stock market' -Porter Stansberry
Good luck Donald getting inflation in check. Never gonna happen! If we only had deflationary money, sound money, it would change things for the better.
👉🏽'Another month, another $250 billion in deficit spending:
The US budget deficit jumped by a massive $257 BILLION in October 2024. By comparison, last October the US budget deficit came in at $67 billion, marking a 287% year-over-year increase. To put this in perspective, economists expected the October deficit to come in at $73 billion.
This puts the actual budget deficit 252% higher than what economists projected. Imagine a public company taking on 250% more debt per month than expected. The company would be bankrupt.' - TKL
On the 14th of November:
👉🏽While the German industry is imploding, the left-green government happily creates more and more positions. Who is supposed to pay for that? Europe and Germany urgently need their Department of Government Efficiency to stop this madness. Now don't me wrong things are no better if you cross the Atlantic Ocean. There are 23.5 MILLION government employees in the US, the most on record. Government jobs have risen by 3 MILLION since 2020. This is the only sector that has seen notable job creation. Meanwhile, the private sector lost jobs for 9 straight months.
👉🏽 “I’ve been proud to serve with my colleagues at the SEC who, day in and day out, work to protect American families on the highways of finance.” Gary Gensler released a statement suggesting he may be leaving the SEC. Shortly after, 18 U.S. states are suing the SEC for "unconstitutional overreach and unfair persecution" of the Crypto industry under Gary Gensler - Fox Business Eleanor Terrett
👉🏽The economy is strong in the US, really strong: The number of bankruptcies jumped by nearly 40% year-over-year in Q2 2024 to 6,276 cases, the highest level in 7 years. Chapter 11 filings hit 2,462, the most in 13 years. Meanwhile, Fed Chair Powell: 'In the case of a financial stability event, the Fed can use emergency tools.' Ergo: print the shit out of it!
👉🏽James Lavish: 'While everyone has been focused on the election and markets, the US government has quietly amassed another ~$100B of debt so far this month. Next stop, $36 trillion.'
Just to show you how ridiculous that number is: The US government has amassed $1T of debt in 4 months. That is $95k of debt per second... or $31k more than the median US salary.
On the 15th of November:
👉🏽Yeah history in the making. The US national debt surpassed $36 trillion for the first time in history.
It's now up $501 billion this fiscal year - which started less than 50 days ago...
👉🏽The Federal Reserve's emergency BTFP dropped by a shocking $30 billion this week, leaving only $26 billion left. Jerome Powell is pulling the liquidity rug away to trigger a crisis, exactly like Feb 2020.
👉🏽 Gotto give credit where credit is due. Credit card debt rose by $24 BILLION in Q3 2024 and hit $1.17 TRILLION, a new record. Credit card debt SKYROCKETED $400 billion over the last 3 years. All while $2.3 TRILLION in excess savings have been spent. Source: Federal Reserve Bank of New York
On the 17th of November:
👉🏽 'The US Pentagon has failed its 7th audit in a row, unable to fully account for its $824 billion budget. Last year, the Pentagon couldn’t properly account for a whopping 63% of its $3.8 trillion in assets. This year, there was a $200 BILLION gap between assets and liabilities. The Pentagon's goal is now to pass an audit by 2028.' -TKL
They’d rather fail the audit than tell the truth about where the money went. Those responsible should be in jail or it will continue.
And people wonder - why Bitcoin with its transparent & verifiable ledger is considered a bad idea, a menace.
The US gold reserve hasn’t been audited since 1953.
Bitcoin is audited every 10 minutes, 24/7, and has never failed.
Which money do you trust the most?
👉🏽Michael A Arouet: 'This chart scares me each time I see it. Unfunded pension entitlements in major European countries are between 300% and 500% of GDP. Mixed with collapsing demographics it’s just a perfect storm brewing. There will be many freshly printed Euros coming as we go forward.'
Now look at that graph. You see that blue line/column of the Netherlands. That is the reason, why the EU is interested in the Dutch Pension savings.
It is the only capital-funded pension in Europe, and much of its value is invested in stocks globally. Both our pension funds for example are in stocks. But it depends on which company or organization you work for. The only thing that will save Europe are robots / AI. Not gonna happen!
Maybe we, the Dutch, should consider a Nexit? Because there will be no choice but to debase the EURO to bail out these irresponsible programs, for example, look at Spain, France, Austria, or Italy.
Look at the countries with a significant blue bar. None are in the Euro, except for the Netherlands.
'Monetary union' is rapidly turning into "we all want to share with those who have saved up more than we do". 'Now give me my money' because we are one big EU family, right?
I am going to end this week's Weekly Recap with the following graph...
...as it is the only Bitcoin graph you need to understand.
🎁If you have made it this far I would like to give you a little gift:
Mr. Obnoxious: 'Steve Baker is a former Conservative Member of Parliament (MP) for Wycombe, serving from 2010 until 2024.
In this episode, we discuss pressing economic and political issues such as the challenges of government debt, inflation, and the often overlooked consequences of central bank policies. With a focus on the impact of taxation and government spending on individual freedoms and economic productivity,. We also discuss the structural inefficiencies in politics and examine the growing disconnect between politicians and economic realities.
Reflecting on his experience in Parliament, Steve emphasises the need for public education on economic fundamentals, a paradigm shift in policy-making, and personal financial resilience, exploring how Bitcoin and free-market principles could offer solutions to a system he believes is deeply flawed.'
https://www.youtube.com/watch?v=RKbK1JKembY
'This was the most valuable conversation I have listened to in quite some time. Steve is clearly very smart, speaks these uncomfortable truths (to all sides), and gives you a lot to think about.'
I couldn't agree more!
Credit: I have used multiple sources!
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple.⠀⠀⠀⠀⠀⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with sats.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 468f729d:5ab4fd5e
2024-11-19 20:16:15 -
@ ac8bb9b0:70278acc
2024-11-19 19:49:52Chef's notes
This recipe is SO easy. We simply mix herbs and spices in a small dish. Add the chicken legs to a large, gallon-sized ziptop bag and add the olive oil. Seal the bag and roll those legs around for a minute to distribute the oil evenly on all the chicken. Then, open the bag, pour in the seasonings, close the bag and do the shake thing. Take a minute or so to do this and massage the chicken to really get that seasoning well distributed.
Seasoning chicken legs in a ziptop bag Set aside for a minute and preheat your oven to 425°(F) and line a baking sheet with aluminum foil. Give the foil a good spray with non-stick cooking spray. This is important as the chicken will stick without it.
Now take the chicken out of the bag and place on the foil lined sheet. Then into the oven it goes for 40 minutes.
Recipe for oven baked chicken legs After 40 minutes the chicken will be a beautiful golden color and the inside will be at least 165°(F) when checked with an instant read thermometer. In fact, it will probably be closer to 185-195°(F) which is exactly what we want!
Pro Tip: Chicken Legs are Better at 185-195°(F)! The rule of cooking chicken to a minimum internal temperature of 165°F has been well-established for quite some time. However, when it comes to darker meat portions such as chicken legs, thighs, or the entire leg quarter, exceeding this temperature is often encouraged for optimal results! When heated to around 185°F, the collagens within the meat begin to break down, contributing to the juiciness and “fall-off-the-bone” tenderness that we cherish so much in dark poultry meat.
Check out this great article by America’s Test Kitchen regarding “overcooking” chicken drumsticks and thighs.
Let Rest and Serve Carefully remove the chicken to a plate or platter and let it rest for 5 minutes before serving.
Recipe for oven baked chicken legs Can this recipe be doubled? It sure can. You can even triple or quadruple this recipe! Simply adjust the ingredients accordingly. The cook time will still be 40 minutes, just be sure to not crowd the chicken too much on the pan. Keep the legs from touching and always keep in a single layer.
Give it a kick Want to give the chicken legs a little heat? Add a ½ teaspoon of cayenne pepper and even a teaspoon of crushed red pepper flakes. You can also deepen the flavor by using smoked paprika instead of regular paprika.
Details
- ⏲️ Prep time: 10
- 🍳 Cook time: 40
- 🍽️ Servings: 2-3
Ingredients
- 6 chicken legs
- 2 tsp paprika
- 1.5 tsp kosher salt
- 1 tsp onion powder
- 1 tsp garlic powder
- 1 tsp rosemary, dried
- 1 tsp parsley flakes
- ½ tsp ground black pepper
- ½ tsp ground mustard
- 1 tbls olive oil
Directions
- Preheat oven to 425°(F)
- Pat chicken legs dry with a paper towel and trim any excess skin
- Place chicken legs in a large ziptop bag and add olive oil. Close bag and shake to coat chicken well with the oil.
- Add seasoning mix to bag, close and shake to get chicken well coated with seasoning.
- Line a baking sheet with foil and spray with non-stick cooking spray.
- Place chicken legs on baking sheet and place on middle rack of oven for 40 minutes, turning halfway.
- Chicken must have internal temperature of at least 165°(F), but 185-195°(F) is ideal for best results.
- Let rest for several minutes before serving.
-
@ ced4158e:f2a74519
2024-11-19 17:48:40В Кургане, в центре города, была построена новая современная площадь, и местные власти решили, что вместо традиционного памятника Ленину стоит установить проекцию его говорящей головы. Эта идея вызвала много споров, но в итоге проект был реализован. И вот, на радость одним и на ужас других, площадь заполнили люди, а в темноте ночи из динамиков раздавался знакомый голос вождя мирового пролетариата. Пьяные мужчины были уверены, что за ними пришёл дьявол. «Ленин говорит, что мы должны работать!» — кричали они, бросаясь в бегство. Один из алкашей даже попытался «поговорить» с головой, спрашивая, где можно достать выпивку. Ответом ему было лишь молчание и светящиеся глаза Ленина.Вскоре вокруг площади начали ходить слухи о том, что Ленин следует за каждым шагом горожан и может появиться в любой момент.
https://psv4.userapi.com/s/v1/d/ISalRimIYejqeYcTs2so4f2AekPNHtZkWXLoeVviIvI3ibZzCLnD3UUzRI2kyGA3fn0nOeU4J51o4cX17FjMeEHNWGUbptN_mN5iHJvyQ6dc1o0Fkn0Xpg/e85be815-29ac-4235-89d1-14960c2afb26.mp4
45news
Курган2040
-
@ 98589a2e:bf49daa1
2024-11-19 17:38:44Рынок туризма будет сосредоточен на устойчивом развитии, индивидуальных маршрутах и новых технологиях.
О том, какие нововведения ждут путешественников и просто любителей отдохнуть - в нашем сюжете.
Делитесь в комментариях своими идеями о том, как можно улучшить туристическую сферу города.
-
@ ced4158e:f2a74519
2024-11-19 16:59:58-
Интерактивные тренажеры На площадках Кургана предусмотрены интерактивные тренажеры. Они позволяют контролировать результаты тренировок и дают рекомендации по технике выполнения. Это делает тренировки более эффективными и увлекательными.
-
Виртуальная реальность Некоторые спортивные клубы начали использовать технологию виртуальной реальности для тренировок. Спортсмены могут отрабатывать свои навыки в условиях окружающей среды, что позволяет безопасно совершенствовать технику и повышать уровень подготовки.
-
Анализ данных в спорте Современные спортивные команды используют системы анализа данных для оценки физической подготовки спортсменов. Это помогает тренерам разрабатывать программы тренировок и отслеживать прогресс каждого спортсмена.
-
Цифровые платформы В Кургане активно развиваются цифровые платформы для записей тренировок и соревнований. Жители могут легко находить информацию о тренировках, записывать на занятиях и следить за расписанием мероприятий через мобильные приложения.
-
Образование и подготовка кадров. Курганские технологические учреждения внедряют программы по обучению новым технологиям в спорте. Студенты изучают современные методы обучения, включая использование технологий анализа данных и реальности реальности. Заключение
Спорт становится более доступным, интересным и эффективным. Мы уверены, что такие изменения вдохновят курганцев на активный образ жизни и обеспечат достижение новых достижений!
45news
Курган2040
-
-
@ ced4158e:f2a74519
2024-11-19 16:59:20-
Развитие туризма Современный музей содействия развитию туризма в Кургане. Увеличение числа посетителей положительно влияет на экономику города. Местные кафе, рестораны и гостиницы получают дополнительный поток благодаря туристам, посещающим музей.
-
Образовательная функция Мы сохраняем всю образовательную функцию. Посетители могут узнать об истории, развитии, гражданской и военной авиации в Зауралье. Экскурсии и мастер-классы помогают молодежи понять значение авиации и вдохновляют на выбор профессии в области.
-
Культурные мероприятия В ходе периодических культурных мероприятий, выставок и фестивалей. Это создает активную культурную жизнь в городе и способствует объединению местных жителей. Музей стал площадкой для проведения различных мероприятий, что делает его центром притяжения горожан.
-
Улучшение городских работ С открытием музея была улучшена инфраструктура вокруг него. Оборудованы новые дороги, парковка и зона отдыха для посетителей. Это делает музей более доступным и комфортным для всех.
Приглашаем всех на новые выставки!
45news
Курган2040
-
-
@ 9ff58691:0bf6c134
2024-11-19 16:13:14Жители Кургана с трудом верят, что их родной город настолько преобразился за последние 20 лет. Когда-то типичный провинциальный город с серыми панельными домами, убитыми дорогами и общим ощущением запущенности, сейчас Курган превратился в современный, динамичный и комфортный для жизни мегаполис.
Центральные улицы города полностью реконструированы - вместо убогих тротуаров и ям на дорогах здесь широкие пешеходные зоны, велодорожки и ровный асфальт. Повсюду высажены деревья и разбиты уютные скверы с лавочками. Старые здания отреставрированы, а на их месте выросли стильные новостройки.
Особенно впечатляет преображение набережной реки Тобол. Раньше это было мрачное, заброшенное место, а теперь это любимое место отдыха горожан. Здесь оборудованы спортивные площадки, детские игровые зоны, кафе и рестораны. По вечерам набережная превращается в пешеходную зону с подсветкой фонтанов и красивой иллюминацией.
Но главное изменение - это, конечно, экология. Курган всегда славился своими экологическими проблемами, но сейчас ситуация кардинально улучшилась. Закрыты вредные производства, запущены программы озеленения, внедрены современные технологии утилизации отходов. Воздух стал намного чище, а в Тоболе даже можно купаться!
Кроме того, в городе появилось множество новых культурных и развлекательных объектов. Открылись современные театры, музеи, концертные залы, кинотеатры. Построены спортивные комплексы с бассейнами, ледовыми аренами и тренажерными залами. Для детей работают интерактивные образовательные центры и парки аттракционов.
Конечно, не все идеально, но в целом Курган преобразился до неузнаваемости. Это современный, комфортный и экологичный город, в котором хочется жить и работать. Жители Кургана с гордостью называют его своим домом.
-
@ 4874b840:31b0b8c0
2024-11-19 15:27:14Калининградский рынок недвижимости претерпевает значительные изменения. Количество новостроек продолжает увеличиваться, создавая избыточное предложение на рынке. Спрос на малогабаритное жилье растет, особенно среди студентов и молодых семей, что связано с увеличением числа приезжих.
Цены на жилье остаются стабильными или немного снижаются из-за избытка предложения. Однако резкого падения цен не наблюдается. Внедрение новых технологий в строительстве и акцент на устойчивые, энергоэффективные здания активно влияют на рынок.
Калининград продолжает оставаться привлекательным для инвестиций, несмотря на миграционный отток в последние годы. Уникальное географическое положение региона и его культурные особенности способствуют интересу со стороны инвесторов. Рынок недвижимости в Калининграде находится в состоянии адаптации к новым экономическим и социальным условиям, требуя от застройщиков гибкости и учета потребностей покупателей.
-
@ 4874b840:31b0b8c0
2024-11-19 15:25:07В самом сердце Калининграда, на берегу живописного озера, открылся новый ресторан «Вкус Балтики» , который уже привлек внимание местных жителей и туристов. На открытии мероприятия были любители гастрономии и представители прессы, и я не упустил возможности стать одним из первых гостей.
При входе во «Вкус Балтики» вас встречает уютная атмосфера, отражающая дух региона. Интерьер выполнен в морском стиле с элементами прусской архитектуры: деревянные балки, светлые тона и большое окно с видом на озеро.
В меню ресторана сочетаются традиционные балтийские и современные кулинарные блюда. Я начал с кенигсбергских клопсов — нежных мясных тефтелей с белым соусом. Основным блюдом мною был выбран балтийский судак, запеченный с овощами, свежий и идеально приготовленный. В качестве десерта попробовали пирог с вишней , легкое тесто и насыщенную начинку, сделав его завершением трапезы.
Напитки
Ресторан предлагает впечатляющую карту вина и местного пива. Я попробовал крафтовое пиво из местных пивоварен, которое прекрасно дополнило мой ужин. «Вкус Балтики» — это не просто место для еды, это настоящая гастрономическая экспедиция по культуре региона. Заведение обещает стать важной частью гастрономической карты Калининграда и уже сейчас вызывает интерес у всех ценителей качественной кухни. Рекомендую его всем любителям хорошей еды!
-
@ 01d0bbf9:91130d4c
2024-11-19 14:46:24The Bitcoin community thrives on open-source innovation, but Coinkite’s move against BTClock risks stifling progress and alienating its core supporters.
Open-source projects like BTClock typically aim to promote innovation and accessibility within the Bitcoin community. Suing the programmer for trademark infringement seems like an overly aggressive move by Coinkite, given the values that Bitcoin and its ecosystem often stand for: decentralization, collaboration, and open innovation.
Why It’s Problematic:
-
Chilling Effect on Open Source:
-
Actions like this discourage developers from creating alternative solutions or building on existing ideas, which stifles community-driven progress.
-
Open-source projects thrive on shared knowledge, and this lawsuit could set a precedent for others to clamp down on grassroots efforts.
-
Reputation Risk for Coinkite:
-
While Coinkite has long been respected for products like the Blockclock and Coldcard, this move could alienate its core audience—Bitcoiners who value freedom and decentralization.
-
By targeting an open-source developer, Coinkite risks being perceived as prioritizing profits over community principles.
-
Trademark Infringement Question:
-
If the issue is solely over the name "BTClock," a fair resolution could involve renaming the project rather than pursuing legal action.
- Lawsuits should ideally be a last resort, not the first response.
A Better Approach:
- Coinkite could have worked with the BTClock developer to address concerns without legal action—perhaps through dialogue or collaboration.
- Open acknowledgment of BTClock’s differences (lower cost, open-source) would have shown confidence in their own premium product, while still respecting community-driven alternatives.
What NVK and Coinkite Should Do
Even now, NVK could mitigate the damage:
- Withdraw the Lawsuit: Openly acknowledge the backlash and frame it as a misunderstanding or a "necessary step" that they’re now reconsidering due to the community’s response.
- Collaborate with BTClock: Find a way to coexist, perhaps by licensing certain Blockclock-specific elements if truly necessary, while leaving room for BTClock’s open-source innovation.
-
-
@ 6ad3e2a3:c90b7740
2024-11-19 13:29:41Assuming the outgoing administration doesn’t create a catastrophic crisis to avoid accountability, I feel things are largely settled for the short term on the geopolitical front. The Ukraine War should end soon, there should hopefully be a detente in the Middle East, and the adults can get to work on creating a bitcoin strategic reserve, while severely slashing government to begin working on the national debt. The ordinary person can get back to worrying exclusively about ordinary person stuff like health, wealth and personal relationships.
Not that you should ever neglect those things, but when free speech is under attack, the state is forcing you to take medicine in violation of your basic rights and imbeciles are fomenting World War 3 to launder money to their arms manufacturing cronies, you have to interrupt the scheduled programming for engagement in politics which nobody should want.
But going back to mundane ordinary life is a bit of a comedown after all the drama — remember there were two assassination attempts, one of which grazed Trump’s ear! The chaos that could have unleashed is almost unimaginable.
One thing that happened to me (and a lot of people I know) during Covid is we were forced to become more resilient. It’s not easy learning what you thought was a corrupt but not-that-important state would actively disrupt your life so severely in violation of the law and without any valid scientific basis. That the corporate media would gaslight you and foment compliance and division only augmented the stress and sense of despair. In order to retain one’s sanity in the face of so much capitulation and abdication of rational sense-making one had to reach deeper within, trust one’s own judgment and connect with one’s core values more entirely.
Now that we’ve hopefully defeated those retarding forces, a golden age of innovation and prosperity might be upon us. But I can’t go back to being the person I was before, primarily concerned about making money, living a comfortable and fulfilling life and handling my day to day responsibilities. It feels like there is something bigger. Having a false and destructive reality imposed on us from the outside drove us to get in touch with something real on the inside, and now that the door has been opened, we have no choice but to go farther into wherever it leads.
I’ve been reading a series of books lately on the topic of exploring the inner space, the brain-mind quantum machine that’s capable of perceiving aspects of reality beyond the narrow spectrums detectable by the senses. We are not simply animals who survive for a time to reproduce the species and optimize for pleasure while avoiding pain. (Even animals are likely more than that, too.) There is a sublimity to our existence, and now we are aware, not just theoretically, but in practice because we were forced to locate it.
There is no point in trying to describe it. It will either sound like magical thinking or be too slippery to grasp. The words are like the proverbial finger pointing at the moon — if you fixate on the finger, you miss the moon. It doesn’t matter what your concepts are either. “The Simulation,” Hinduism, Buddhism, Christianity, the Tao, the quantum foam, the Kabbalah, Sufism, whatever. I don’t care, use whatever works to take you away from the map and into the territory.
But into the territory we must go. There is no turning back.
-
@ c2827524:5f45b2f7
2024-11-19 11:32:43Paolo deposita 1.000 € in banca, che gli da un interesse del 2%. Gustavo prende quegli stessi 1.000€ a prestito, ripagando un interesse del 5%. Il deposito di Paolo è garantito: dalla banca stessa che guadagna dagli interessi che Gustavo ha accettato di pagare.
Dimenticate quello che vi ha insegnato la scuola pubblica: le banche non guadagnano prestando soldi veri che i correntisti hanno depositato. Guadagnano creando denaro dal nulla, grazie al privilegio di poter fare riserva frazionaria.
Grazie a questo privilegio, garantito per legge, dopo che Paolo ha depositato 1.000 € veri la banca può prestare a Gustavo la bellezza di 50.000 €. Il quale poi, come un pirla, pagherà pure gli interessi sul prestito di denaro inventato dal nulla.
Pecunia non olet, perché tutto ciò che è immateriale non può avere odore.
Fiat o grattato dal muro?
Questo sistema si basa sul debito. Se siete tra coloro che ancora si informano tramite la stampa mainstream e sentite la parola debito, ad esempio al telegiornale, è esattamente di questo che si tratta: dare un privilegio ad una piccola parte (le banche in questo esempio), creando debito che verrà ripagato da una moltitudine di soggetti, i quali rimarranno del tutto ignari perché a s~~q~~uola viene insegnato altro e, in generale nella vita, verranno distratti da così tanti finti problemi da non riuscire MAI ad interessarsi all’argomento.
La creazione di denaro dal nulla, viene appunto denominato prestito a riserva frazionaria ed è iniquo esattamente come appare. Fa anche cagare come sembra. Avete mai provato a pagare le bollette tentando di grattare soldi dal muro?
A questo punto vi starete domandando: «perché mai dovrei lavorare in cambio di un denaro che qualcun altro può creare dal nulla?»
Non dovreste, infatti.
Ogni tipo di società (diversamente)-civile è ormai imperniata tutta solo su questo unico meccanismo. Fare arrichire una piccola quota di individui riversando debito sulla moltitudine, la quale assomiglia sempre più a criceti che corrono sulla loro ruotina del cazzo: lavorare – guadagnare – pagare le bollette – mettere in tavola – chiedere un prestito – ripagare il debito – andare a dormire – alzarsi – andare a lavorare – guadagnare lo stipendio – fare la spesa – magari anche l’aperitivo – pagare le bollette – pagare le tasse che servono a ripagare il debito pubblico (il quale, opportunamente, aumenta ad ogni giro di ruota)... E così in perpetuo.
La vera incognita dell’equazione
Cosa manca davvero nell’equazione del criceto? Non ci arrivate?
Ri-spar-mio.
Quando il criceto risparmia? Mai
E come si programma il futuro senza risparmio?
Indebitandosi con una delle tante banche, accendendo un mutuo per la casa o chiedendo un qualunque altro tipo di prestito.
Come reagirà la banca ad ogni richiesta di mutuo o prestito? Saltando e ballando come non ci fosse un domani. Simulano pretesti, chiedendo sempre più garanzie ai futuri indebitanti, ma è solo melina: saranno felicissimi di spingere un bottone e creare denaro dal nulla. L’importante è che – per legge – la banca abbia almeno il 2% di riserva sul denaro creato ad mentula. In contanti o in aria fritta di liquidità da Wall Street. Denaro immateriale sul quale il criceto pagherà, allegramente, il suo bell’interesse.
Don’t trust, verify
Una piccola ricerca online chiarirà ogni dubbio. Non abbiate paura: fatela, studiate, aprite la mente.
Essere indottrinati è una brutta storia: si passa la vita a credere a dogmi sciorinati da scuola, influencerz ,TV e giornali, senza mai mettere in dubbio che il problema non è il capitalismo di sorveglianza, di relazione, di destra o di sinistra. Tutti questi bei paroloni sono solo specchietti per allodole, i pioli della famosa ruota su cui state girando come pirla. Non avete modo di girare su una ruota senza pioli. E se non vi distraggono con questi falsi input, facendo leva su cose del genere, poi rischiate di concentrarvi sulla matrice del problema e magari individuarne l’origine. * Siete deficienti? No. * Vi trattano come tali? Da sempre. * Non ci credete? Fate benissimo, dovete effettuare le vostre ricerche e verificare. * Non volete crederlo, perché scoprire di esser stati presi per il culo tutta la vita è peggio che continuare a correre sulla ruota come in criceto? Amen.
Le pecore stanno bene tosate
Per tutti gli altri c’è la possibilità di decidere: scendere dalla ruota del criceto e iniziare a studiare le alternative. Ad esempio una moneta sana, non inflazionabile, decentralizzata (non controllata o creata dalle banche), regolata da rigide regole matematiche. In una parola: Bitcoin
Antifiatismo unica soluzione
Il discorso vale per ogni valuta. Non fatevi ingannare nemmeno da coloro che dicono di essere contro l’euro e vorrebbero re-introdurre una moneta “sovrana”. Se la stampa di moneta avviene sempre per vie centrali, non ci sarà mai via di uscita, qualunque sia il nome della valuta.
> Il problema principale della moneta convenzionale è la fiducia necessaria per farla funzionare. Bisogna fidarsi che la banca centrale non svilisca la moneta, ma la storia delle valute fiat è piena di violazioni di questa fiducia Satoshi Nakamoto
-
@ 45f892bf:40657a4d
2024-11-19 11:16:49- foo
- bar
-
@ 5e5fc143:393d5a2c
2024-11-19 10:20:25Now test old reliable front end Stay tuned more later Keeping this as template long note for debugging in future as come across few NIP-33 post edit issues
-
@ 9ff58691:0bf6c134
2024-11-19 10:04:48Давайте сравним кадры Кургана 2020 года и 2040. Напишите в комментариях, многое ли поменялось на ваш взгляд👇
Автор: Эвелина Тимирбаева
-
@ a012dc82:6458a70d
2024-11-19 09:48:06Table Of Content
-
The Vision Behind the Conference
-
The Significance of Riga Bitcoin Week
-
The Power of Knowledge: Notable Speakers
-
The Venue: A Blend of History and Innovation
-
The Impact of the Conference: A Step Towards Decentralization
-
Conclusion
-
FAQ
The Baltic HoneyBadger 2023 is a major European conference dedicated to Bitcoin and the technologies built around it. The event is set to take place in Riga, Latvia, from September 2-3, 2023. This conference is part of the Riga Bitcoin Week, a festival dedicated to Bitcoin development and adoption that will feature various entertainment, educational, and networking events.
The Vision Behind the Conference
The Baltic HoneyBadger conference is not just an event; it's a mission to empower decentralization and financial freedom. It's a platform where the brightest minds in the crypto space gather to share their knowledge, present original research, and discuss the future of Bitcoin and its related technologies. The conference aims to foster the growth and adoption of Bitcoin, promoting its potential to provide financial freedom and economic empowerment.
The Significance of Riga Bitcoin Week
The Riga Bitcoin Week provides a week of high-quality educational content delivered by top industry players. There will be a 3-day extension to the conference full of workshops, presentations, and other activities, covering Bitcoin, the latest Layer 2 developments, Bitcoin payment processing, and startup pitches. This week-long event is designed to educate attendees about the latest trends, technologies, and opportunities in the Bitcoin ecosystem.
The Power of Knowledge: Notable Speakers
The conference will feature a lineup of notable speakers from the Bitcoin and blockchain industry. These include:
-
Tadge Dryja, Founder, Lightning Labs
-
Adam Back, CEO, Blockstream
-
Sergej Kotliar, CEO, Bitrefill
-
Wiz, Co-founder of mempool.space
-
Giacomo Zucco, Bitcoin cultist
-
David Bailey, CEO, BTC Inc
-
Abubakar Nur Khalil, CEO, Recursive Capital
-
Lawrence Nahum, Founder, GreenAddress; Chief Architect, Blockstream
Rockstar Dev, Core Contributor, BTCPay Server
Calle, Lightning dev at LNbits and Cashu
-
Leo, Early bisq contributor
-
Stephan Livera, Bitcoin Podcaster, Head of Education at Swan Bitcoin
-
Max Hillebrand, CEO, zkSNACKs (Wasabi Wallet)
These speakers will share their insights and experiences, providing attendees with a unique opportunity to learn from the best in the industry.
The Venue: A Blend of History and Innovation
The venue for the event is Fantadroms in Riga, Latvia. Riga, known for its beautiful architecture and rich history, provides a perfect backdrop for this event. More information can be found on the event's website: baltichoneybadger.com.
The Impact of the Conference: A Step Towards Decentralization
The Baltic HoneyBadger 2023 conference is a must-attend event for anyone interested in Bitcoin and the future of decentralized finance. It offers a unique opportunity to learn from industry leaders, network with like-minded individuals, and gain a deeper understanding of the technologies that are shaping our financial future. By empowering decentralization and financial freedom, the conference is playing a crucial role in shaping the future of finance.
Conclusion
The conference is more than just a gathering of Bitcoin enthusiasts; it's a beacon for the future of finance. As we move towards a more decentralized financial system, events like the Baltic HoneyBadger 2023 are crucial in driving this change. By providing a platform for learning, discussion, and networking, the conference is helping to shape the future of finance, one block at a time.
FAQ
What is the Baltic HoneyBadger 2023? The Baltic HoneyBadger 2023 is a major European conference dedicated to Bitcoin and the technologies built around it. It is set to take place in Riga, Latvia, from September 2-3, 2023.
What is the purpose of the Baltic HoneyBadger conference? The conference aims to empower decentralization and financial freedom. It provides a platform where experts in the crypto space gather to share knowledge, present original research, and discuss the future of Bitcoin and its related technologies.
Where is the conference taking place? The conference is taking place at Fantadroms in Riga, Latvia.
How can I find more information about the conference? More information can be found on the event's website: baltichoneybadger.com.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 6bae33c8:607272e8
2024-11-19 09:45:12What a horrible game. As someone who stacked the Texans passing game in the Primetime, I have to say Joe Mixon is the bane of my existence. I also benched Anthony Richardson for CJ Stroud in that league (as well as Jonnu Smith for Dallas Goedert.) The Texans love to run Mixon every chance they get, especially near the goal line. To add insult to injury I lost in the Steak League to Josh Ross by .12 points due to that last PAT after Mixon’s third TD. And I had the Cowboys +7.5 in my picking pool.
-
Stroud almost started off the game with a bang on a screen to Nico Collins that went for a 70-yard TD, only to be called back on yet another infraction by penalty-machine Laremy Tunsil. Stroud looked fine except for missing Collins on another would-be TD later in the game.
-
Mixon still has it — he showed his speed on the long TD and ran over the Cowboys defense most of the night. He also produced in the passing game.
-
Collins showed he was healthy on the play that didn’t count. He’ll get his. Tank Dell got the same targets and production as Collins, but we’re not seeing him get those air yards like last year. Probably because the O-line sucks.
-
Cooper Rush looked like Joe Flacco — immobile, mistake prone but able to put the ball up and let his receivers make plays. Big improvement over last week, even though he was still bad.
-
The Cowboys running game does not exist, and midwit nonsense notwithstanding, that very much matters.
-
CeeDee Lamb looked like himself even with Rush. Low-key big news on the fantasy front actually. After last week, I had doubts.
-
Luke Schoonmaker had a nice game after Jake Ferguson got brain damage. Maybe they’ll send Ferguson to the Texans next year to replace Dalton Schultz and go with the new guy.
-
Brandon Aubrey hit a 64-yarder like it was a PAT. Hilarious it got nullified by a penalty, and the Cowboys wound up with zero points after failing to convert on fourth down. Let that sink in: they robbed Aubrey’s owners of 6.4 points and got negative-three to show for it. Even if it was the right football call to take the first down, there should be some ethical requirement never to take a 60-plus-yard make off the board. What if it were a 67-yarder, the all-time record? That would have actually been even more hilarious.
-
-
@ 2063cd79:57bd1320
2024-11-19 09:37:53Wie bereits gesagt, handelt es sich um eine gekürzte Zusammenfassung von Pierres Ideen aus der ersten Hälfte der Folge SLP402 von Stephan Livera. Die gesamte Unterhaltung ist sehr interessant und ich empfehle jedem selber reinzuhören.
SLP402 Pierre Rochard – Bitcoin Obsoletes Fractional Reserve Banking
Zuerst beginnt Pierre mit der Entstehungsgeschichte von Fraktionale- bzw. Teilreserve- im Gegensatz zu Vollreserve-Systemen.
Im Grunde ist die Idee beim Teilreserve-Banking, dass anstatt Hartgeld, wie physisches Gold und Silber, oder von einer Münzprägeanstalt geprägte Münzen, oder sogar Muscheln zu verwenden, ein Papierderivat benutzt wird. Die Leute fanden es früher unbequem und unsicher dieses physische Hartgeld aufzubewahren und mit sich zu transportieren und so deponierten sie es bei einem Art Lagerhaus oder einer Art Hinterlegungsstelle. Gerade im Mittelalter war dies wirklich praktisch, denn anstatt Gold von z.B. Italien über die Alpen nach Frankreich zu tragen, konnte man es bei einer Bank in Italien deponieren und dann die Alpen mit einer Art Quittung des Depots überqueren, um das Gold in Frankreich bei einem weiteren Depot wieder abzuheben. Das ersparte einem das Risiko von Straßenräubern unterwegs überfallen zu werden und die Unbequemlichkeit, Gold über den Berg tragen zu müssen. Das war also ein Teil der Entwicklung solcher Bankensysteme, und im Teilreserve-System fangen nun diese Hinterlegungsstellen an Quittungen nicht dann auszustellen, wenn jemand Gold hinterlegt, sondern wenn sich jemand von dieser Institution Gold leihen möchte. Also Schuld- anstatt von Einlagerungsscheinen. Diese Praxis Quittungen zu erstellen und diese in ein Kassenbuch einzutragen wird treuhänderische Schuldverschreibung genannt. Es wird also ein Zahlungsmittel auf Vertrauensbasis geschaffen. Dies führt dazu, dass die Quittungen keine Einlagerungsscheine mehr darstellen sondern Forderungen an das Finanzinstitut. Das Finanzinstitut kann also mehr Forderungen ausgeben, als Einlagerungen bestehen. Das nennt man Teilreserve-Banking.
Der Wert dieser Forderungen lässt sich wiederum auf dem freien Markt handeln; nur auf Grund der Reputation, der Größe und des Einflusses des Finanzinstituts. Einige Institute geben also einen Dollar aus, der in Wirklichtkeit z.B. 98 Cent wert ist, andere wiederum einen Dollar, der nur 84 Cent wert ist, weil sich dieses Institut in einer schlechteren finanziellen Lage befindet. Im normalen Handelsverkehr müssten jetzt aber alle Händler immer den aktuellen Wechselkurs im Auge behalten, um sicherzugehen, welchen aktuellen Marktwert der vorliegende Schein von Bank A oder Bank B hat. Dies führt natürlich zu zusätzlichen Unannehmlichkeiten für alle und darüber hinaus ist dieses System nicht besonders stabil, denn es ist anfällig für Bank Runs.
Bank Runs entstehen wo Menschen, ob rational richtig, weil die Bank zahlungsunfähig ist, oder irrational, weil sie in Panik geraten, z.B. weil eine andere Bank zahlungsunfähig ist, zu ihrer Bank bzw. ihrer Hinterlegungsstelle laufen, um ihre Einlagerungen zurückzufordern. Wenn alle gleichzeitig versuchen, ihr Geld abzuheben und die Bank nur einen kleinen Prozentsatz des Vermögens tatsächlich vorrätig hat, weil der Rest des Bilanzvermögens Kredite darstellt, wird die Bank den Ansturm nicht bedienen können. Sie kann die Kredite, mit Laufzeiten von mehreren Jahren, nicht sofort liquidieren und somit die Forderungen nicht einlösen. Dies schafft soziale Instabilität, die Menschen werden unzufrieden, weil sie keinen Zugang zu ihren Einlagen haben und versuchen es sich mit anderen Mitteln und Gewalt zu holen.
Jetzt treten zwei Gruppen von Leuten auf. Auf der einen Seite diejenigen, die Gutes tun wollen, die Bürgervertreter. Diese Gruppe fordert staatliche Intervention, weil die Einleger im Wesentlichen betrogen werden. Auf der anderen Seite sind es die Banken, die versuchen Geld zu verdienen, und diese fordern Rettungspakete, das heißt, sie fordern einen Kreditgeber der letzten Instanz, der diese Pakete bezahlen kann. Im Falle des Kreditgebers der letzten Instanz braucht es Regulierung, die oft dazu führt, dass das Geschäft in sich abgeschottet wird. Es entsteht eine Barriere durch Regulierung, welche Konkurrenten fernhält und damit dazu führt, dass sich die eingesessenen Institute weiter etablieren können, weil sie in der Lage sind, die Kosten für die Einhaltung der Vorschriften und all das zu bezahlen; außerdem verfügen sie über die Beziehungen zu den Aufsichtsbehörden.
Sowohl Bürgervertreter, als auch Banken drängten also auf zusätzliche Regulierung des Bankenwesens. Pierre argumentiert, dass mit Einrichtung der FDIC (Einlagensicherungsfonds der Vereinigten Staaten) und der Einrichtung eines reinen Fiat-Systems, das Teilreserve-Bankwesens endgültig abgeschafft und in ein Mindestreserve-Bankwesen übergegangen ist, und somit jeden Anspruch aufgegeben hat, dass nur irgendetwas durch einen Bruchteil von Gold oder anderen Einlagen gedeckt wäre. Er argumentiert weiter, dass von der Bank alleine emittierte Kredite durch die FDIC versichert sind, diese allerdings eigentlich keine echte Versicherung darstellt, weil es kein Beispiel für eine private Versicherung für Sichteinlagen gibt. Das bedeutet, es handelt sich vielmehr um ein Regierungskonstrukt, anstatt einer echten Versicherung im eigentlichen Sinne. Es gibt keine Möglichkeit, ein versicherungsmathematisches Modell um diesen Fall zu konstruieren, da man das Risiko nicht quantifizieren kann. Es handelt sich eigentlich nur um eine qualitative Unsicherheit und deshalb muss es von der Regierung subventioniert werden. Somit gehen die Banken eine Art Deal mit dem Teufel ein, in dem Sinne, dass diesen Banken im Austausch für diese FDIC-Versicherung die ganze Zeit die Regierung im Nacken sitzt. Und dieses System ist was nach außen hin als Stabilität verkauft wird.
Das Problem, das er hier identifiziert, ist die Politisierung des Systems. Denn nun hat die Regierung eine große Rolle in diesem System eingenommen und führt Bankprüfer ins Spiel ein, die das Bankengeschäft zunächst danach überprüfen, dass keine unwürdigen Kredite oder Vorzugszinsen vergeben werden, kein Eigenhandel betrieben wird, etc. aber sie schauen sich auch Dinge wie FICO-Scores (in Deutschland würde man es mit SCHUFA Auskunft vergleichen) und Risikomanagement an. Und so entsteht ein System, in dem Kredit sozialisiert wird, was bedeutet, dass die Regierung Kredite bestimmten Demographien oder bestimmten Branchen zuweist. Dies lässt sich z.B. gut beim Thema ESG (Environmental, Social, Corporate Governance) aufzeigen.
Denn ESG bestimmt die Fähigkeit eines Unternehmens, Kredite zu bekommen. Letztendlich ist es nicht so, dass ein Unternehmen ein Produkt oder eine Dienstleistung liefert, die der Markt verlangt, sondern dass Unternehmen auf der Grundlage ihrer Fähigkeit erfolgreich sind, Werte zu kompromittieren und eine ESG-Agenda zu integrieren.
Also was für eine Rolle spielen Kredite dann in einem hypothetischen Vollreservesystem? Pierre stellt die Theses auf, dass man argumentieren könnte, dass wir bereits in einem vollständigen Reservebankensystem auf Fiat-Basis leben - man müsste nur noch mit dem Gelddrucken aufhören. Wenn also kein neues Geld geschaffen würde, dann wäre dies der Status-Quo des Systems und wir hätten heute ein funktionierendes Fiat-Vollreserve-Banksystem. Das Problem ist, dass seitens der Regierungen immer die Versuchung besteht Geld zu drucken, denn warum sollte sie aufhören mit dem Gelddrucken? Die Geldmenge ausweiten und die monetären Bedingungen lockern, um damit den Wohlstand (zeitweise) zugunsten von höheren Chancen aufs Wiedergewählt-Werden anzuheben ist einfach zu verlockend, weil es auch so einfach ist. Aus politischer Sicht wird es also immer diese Versuchung geben.
Hier springen wir also endlich zu Bitcoin.
Bitcoin bietet ein Geldsystem, bei dem es auf der Basisschicht unmöglich ist, mehr Bitcoin zu schaffen. Bitcoin im luftleeren Raum ist also ein vollständiges Reservebanksystem. Wer seinen eigenen Private Key besitzt, weiss dass es keine Möglichkeit für jemanden gibt, treuhänderische Schuldscheine über die kontrollierten UTXOs zu erstellen. Allerdings kann man an dieser Stelle argumentieren, dass wenn Drittparteien verwendet werden, um bitcoins zu verwahren und diese Dritten dann diese Bitcoins verleihen, wir eine Art von Teilreservebanking sehen. (Anm.: Einfaches Beispiel - Der Exchange Kraken hält 175.000 bitcoins, und wegen Krakens sehr transparentem Proof-of-Reserves System wissen wir, dass damit jeder bitcoin in jedem Account abgedeckt ist. Allerdings ist dies Krakens eigene Entscheidung. So könnte ich z.B. 10 bitcoins in meinem Kraken Account halten und Kraken entscheidet sich 5 bitcoins weiterzuverleihen, oder andere Finanzgeschäfte damit zu tätigen, wissend, dass niemals alle Kraken-Kunden gleichzeitig ihre 175.000 bitcoins abheben werden - so lange bis alle Kraken-Kunden gleichzeitig ihre 175.000 bitcoins abheben wollen. Also was heisst das für uns? Not your keys, not your coins.)
Hier geht Pierre einen Schritt weiter, denn demzufolge - dem Bild der Hinterlegungsstellen für Gold folgend - könnten die Dritten, also die Exchanges, usw., die Bitcoin für den Einleger verwahren, nun theoretisch auch Einlagerungsscheine ausgeben. Doch der Grund, warum wir das Aufkommen von Geldersatz für Bitcoin bisher nicht sehen, besteht darin, dass Bitcoin sehr bequem und sehr sicher ist - bequemer und sicherer als jede Art von Geldersatz oder treuhänderischem Schuldschein - ganz im Gegensatz zu Gold, was unsicher und schwierig zu transportieren war. Was wir stattdessen sehen, ist, dass treuhänderische Schuldscheine, wenn sie zirkulieren, nur innerhalb dieser Plattformen existieren. (Es ist z.B. möglich auf Coinbase Bitcoin zwischen verschiedenen Coinbase-Benutzern zu versenden. Wenn man die E-Mail-Adresse hat, kann man jemand anderem Bitcoin innerhalb der Coinbase-Plattform senden. Diese Transaktionen sind im Wesentlichen SQL-Datenbankeinträge und werden nicht auf die echte Bitcoin Blockchain übertragen.) Also sehen wir keinen Sinn in einem treuhänderischen Schuldschein für Bitcoin, der nicht bequemer, sicherer oder schneller angesehen wird, als eine On-Chain-Transaktion zu senden. Und so kommt Pierre zu dem Schluss, dass es für treuhänderische Schuldscheine oder Geldersatz für Bitcoin aufgrund der Netzwerkeffekte auf Zahlungsebene wirklich schwierig sein wird gegen Bitcoin zu konkurrieren. Deshalb hat Bitcoin das Teilreserve-Banking obsolet gemacht. Wir werden das Aufkommen von Papier-Bitcoin oder Bitcoin-Ersatz-Scheinen nicht sehen, wie es bei Papiergold der Fall war.
Pierre geht noch kurz auf das aktuelle Thema der viel besprochenen Lending-Plattformen, die in jüngster Zeit in Schieflage geraten sind, ein. Denn es gibt eine semantische Debatte darüber, ob die vielen übermäßig gehebelten Anlagestrategien in ihrer Art auch eine Form von FRB darstellen. Doch seiner Ansicht nach kann man übermäßige Hebelwirkung haben, ohne es als FRB zu bezeichnen, da es keine Geldersatzscheine gibt, die als Ersatz für Bitcoin im Umlauf sind. Darüber hinaus kann es durchaus Situationen geben, in denen sich ein Unternehmen unter Berufung auf eine Sicherheit entweder zu viel Geld leiht oder die selbe Sicherheit an mehrere Kreditgeber verpfändet. Dies ist durchaus problematisch, vor allem wenn das Unternehmen einem Kreditgeber versichert, dass die Sicherheiten unbelastet sind. Doch das stellt dann kein FRB dar, sondern schlicht Betrug. Das ist nur jemand, der den Akkreditierer betrügt, indem er die gleiche Sicherheit zweimal verpfändet. Das hat dann nichts mehr mit FRB zu tun und demnach kann der Vergleich zu den Lending-Platformen nicht herangezogen werden.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ e1d968f7:5d90f764
2024-11-19 08:57:23In escorting, first impressions are everything. The moment a client lays eyes on you, their perception begins to form. It’s not just about how you look—it’s about the energy you bring, the way you carry yourself, and the tone you set. From that first smile to the way you introduce yourself, those initial seconds shape the rest of the encounter.
The Power of Presence
Presence is about more than appearance; it’s how you make someone feel. Do you walk into a room with confidence? Do you exude warmth and approachability? Clients pick up on energy quickly, and their comfort level often mirrors yours.
When I meet a client, I focus on:
- Body Language: Standing tall, maintaining eye contact, and offering a genuine smile.
- Tone of Voice: Speaking calmly and warmly to put them at ease.
- Energy: Being present in the moment and leaving any outside stress at the door.Presence is magnetic, and when it’s paired with confidence, it sets the stage for a positive encounter.
Preparing for the First Impression
Preparation is everything when it comes to making a strong first impression. Before a booking, I consider:
- Outfit: What’s the vibe? A sleek dress for a dinner date, or something more playful for a casual rendezvous? My goal is to align with the client's preferences while staying true to my style.
- Grooming: Details matter—immaculate hair, flawless makeup, and a light touch of perfume. Clients notice when you’ve made an effort.
- Mindset: I take a moment to ground myself before the meeting, focusing on confidence and positivity.When I feel prepared, I radiate that energy, and clients respond in kind.
Reading the Client
First impressions go both ways. Just as I’m making an impression on the client, they’re making one on me. Is their body language open? Do they seem nervous? These cues help me adjust my approach to put them at ease.
For instance:
- If a client seems shy, I’ll lead the conversation with light, engaging topics.
- If they’re confident and outgoing, I’ll match their energy.The goal is to create a connection that feels natural and comfortable from the start.
When Things Go Awry
Not every first impression is perfect. Sometimes a client arrives late, seems distracted, or is less polite than expected. In these cases, I remind myself to stay professional. A warm greeting and a calm demeanour can often turn things around.
And if the connection doesn’t click? That’s okay, too. Not every encounter will be seamless, and that’s part of the job.
The Lasting Impact
A strong first impression doesn’t just set the tone for the booking—it leaves a lasting impact. Many of my repeat clients have told me that it was our initial meeting that made them want to see me again. That’s the power of making someone feel seen, appreciated, and at ease from the very beginning.
The Takeaway
First impressions are about more than looking good—they’re about creating a connection. It’s about walking into a room with confidence, being attuned to the client’s energy, and setting a tone of mutual respect and comfort. Those first moments pave the way for everything that follows.
Tomorrow, I’ll share insights into the moments that linger long after a booking ends—those unexpected connections that stay with you in surprising ways. Until then, remember: a strong first impression isn’t just memorable—it’s magnetic.
Rebecca x
-
@ ced4158e:f2a74519
2024-11-19 08:25:08Курган в 2040 году претерпел значительные изменения в своей экономике благодаря цифровизации. Эти изменения захватили все сферы городской жизни и открыли новые возможности для бизнеса и повседневной жизни. Давайте рассмотрим некоторые аспекты.
-
Цифровая инфраструктура Курган активно развивает цифровую инфраструктуру. В рамках национального проекта «Цифровая экономика» обеспечивается доступ к глобальному Интернету для таких учреждений, как школы и социальные больницы. Это позволяет улучшить качество образования и медицинских услуг.
-
Поддержка бизнеса Малый и средний бизнес в Кургане получает поддержку благодаря цифровизации. Предприниматели могут использовать онлайн-платформы для продвижения своих товаров и услуг. Это помогает им находить новых клиентов и расширять рынок быта.
-
Образование и подготовка кадров. В Кургане открываются новые центры для обучения цифровым навыкам. Проект «Урок цифр» помогает школьникам осваивать технологии с раннего возраста. Это создает квалифицированные кадры для экономики будущего.
-
Инновации в промышленности Промышленные предприятия внедряют новые технологии для повышения эффективности. Используются обновленные системы управления производственными процессами, что снижает затраты и повышает качество продукции.
Новые технологии открывают возможности для бизнеса, улучшают качество жизни и создают современный облик города!
45news
Курган2040
-
-
@ 5e5fc143:393d5a2c
2024-11-19 08:21:53How to READ - JOIN - POST
in nostr web-based real time group chat -> chachi.chat
Dummies 101 guide- Use any Mozilla Firefox or Chrome based browser either desktop or mobile
- Install Add-on Extension in your above browser – NOS2X-FOX or NOX2X-CHROME if you already have other NIP07 Extension then ignore above.
- Click/Touch ->Open the extension -> Option generate you npub key this is one time step only – don’t delete the key ! backup elsewhere safe.
- Visit chat link or open https://chachi.chat (expert users self-host also)
- Click/Touch left button -> Login NIP07 extension
- Click on “search groups” type name u got elsewhere / simply browse
- Once find right group click JOIN button – That’s it
- Bookmark it in ur web browser for future use.
- Just repeat step 5 when reopening or reloading F5 browser Happy chatting++
Join any below or other test chat if want https://image.nostr.build/4cfca1bdb4e51e47236c9d5df4e275610196c0a2b5f3b3ccbf89563c57c90ba7.png optional: those new in nostr and want add profile handle and picture 10. open https://metadata.nostr.com/ just update NAME n PICTURE field only your profile pic handle appear in chachi.chat
-
@ 2063cd79:57bd1320
2024-11-19 07:23:22Prinzipiell dürfte die Annahme gelten, dass der/die durchschnittliche Bitcoin HODLer//in eher jünger und technikaffin ist, weshalb sich das Thema Bitcoin im Zusammenhang mit unserem eigenen Ableben meist selten stellt. Die meisten von uns beschäftigen sich mit dem Hier und Jetzt und vielleicht mit der nahen Zukunft von Bitcoin, der Zukunft unserer Welt unter einem Bitcoin Standard oder der Zukunft im Hinblick auf technologischen Fortschritt und Weiterentwicklung. Jedoch an seinen eigenen Tod und den damit verbundenen Folgen denkt niemand so gerne. Und doch ist es wichtig, sich mal darüber Gedanken zu machen, was mit den erworbenen bitcoins passiert, wenn wir mal nicht mehr sind. Zentralisierte Dienste wie Google oder Facebook bieten Dienste an, die sich genau mit diesem Thema auseinandersetzen, also wer verwaltet meine Konten, Abos, usw. wenn ich mal sterben sollte. Doch ist es bei solchen Diensten einfacher, denn diese Dienste stellen auch den Pförtner zu den Konten dar und wenn ich alles richtig veranlasst habe, gewähren diese meinen Hinterbliebenen Zugang zu meinen Daten. Bei Bitcoin ist dies anders, denn im Idealfall haben wir einen solchen zentralen Pförtner nicht. Wir müssen also selbst dafür sorgen, dass die richtigen Personen Zugriff auf unsere Ersparnisse bekommen. Dabei sehe ich die folgenden Szenarien:
- Nichts tun
- Exchange plus Passwort
- Desktop Wallet
- Mobile Wallet
- Paper Wallet zu Hause
- Paper Wallet im (Bank-)Safe
- Hardware Wallet zu Hause
- Hardware Wallet im (Bank-)Safe
- Multisig Lösung
- Custodial Service
Also der Reihe nach.
1) Nichts tun
Dieser Fall ist der Einfachste. Ich kümmere mich um nichts, sollen mir doch alle gestohlen bleiben. Meine bitcoins nehme ich mit ins Grab. Dafür, dass ich immer als Nerd und "der eine Freund mit Bitcoin" belächelt wurde, sollen die alle büßen!
2) Exchange plus Passwort
Ich habe meine bitcoins auf einem Exchange liegen und habe mich sowieso nie mit vernünftiger Verwahrung von Bitcoin auseinandergesetzt. Das Passwort habe ich auf meiner Passwort-Liste in meiner Dropbox unter Passwörter.docx gespeichert. Das Passwort für meine Dropbox natürlich auch. Meine Hinterbliebenen werden das Passwort schon erraten, ich benutze ja für alle Accounts seit Jahren das gleiche. Das wird schon klappen.
3) Desktop Wallet
Desktop Wallets haben den Vorteil, dass der Familien PC/Mac/Laptop bei den meisten Familien für alle zugänglich ist und dass es auch für Desktops sogenannte Cold-Wallets (also nicht mit dem Internet verbunden) gibt. Mit dem Zugriff ist die erste Hürde genommen, allerdings lassen sich auch Desktop Wallets mit einem Passwort versehen. Dieses sollte natürlich vorsorglich so hinterlegt werden, dass eine vertraute Person in Notfällen Zugriff darauf hat. Jetzt bleibt natürlich das Restrisiko eines Festplattencrashs oder der generelle Verlust des Geräts. Auch sollte den Hinterbliebenen immer auch die Information zuteil werden, dass auf dem besagten Gerät eine Wallet installiert ist und im besten Falle auch, wie diese zu bedienen ist. Definitiv sicherer als irgendwelche Exchanges oder andere Services, die Bitcoin für den Nutzer verwahren. Not your keys, not your coins!
4) Mobile Wallet
Im Vergleich zum Desktop Wallet viel schwieriger, da so ein Mobiltelefon a) eine viel kürzere Lebensdauer hat, b) viel höherem Risiko ausgesetzt ist kaputt oder verloren zu gehen, c) mit biometrischen Zugangsdaten verschlüsselt werden kann und d) nur Hot-Wallets einsetzen kann. Abgesehen vom letzten Punkt, der ein generelles Sicherheitsrisiko darstellt, sind Mobiltelefone einfach viel schwieriger weiterzugeben und im Falle eines (plötzlichen - und davon gehen wir ja wahrscheinlich gerade aus) Ablebens, ist es sicherlich bei der fraglichen Person, d.h. es nimmt sehr wahrscheinlich Schaden. Eine Mobile Wallet sollte also nie die einzige Verwahrmethode sein. Natürlich sollte es immer noch den Seed-Phrase-Backup geben, jedoch wird dieser meist auf Papier notiert und zu Hause verstaut, also weiter zu 5).
5) Paper Wallet zu Hause
Ob Paper Wallet oder Seed-Phrase-Backup. Ob Private Key notiert auf Papier, oder 12 bzw. 24 Wörter notiert auf Papier. Papier bleibt Papier und damit anfällig für äußere Schäden und ist leicht zu verlieren. Sollte dies die Methode meiner Wahl sein, bietet es sich an, diesen vielleicht als Anhang meinem Testament beizufügen. Damit wäre alles an einem Ort und der testamentarische Verweis auf meine bitcoins könnte sofort auf den Private Key / Seed-Phrase hinweisen. Aber wenn ich dieses Testament in Papierform zu Hause aufbewahre, gehe ich wieder das Risiko des Fremdzugriffs und der äußeren Anfälligkeit ein.
6) Paper Wallet im Safe
Also verwahre ich das Stück Papier im Safe entweder zu Hause oder bei der Bank. Dies ist prinzipiell keine schlechte Idee, solange die Hinterbliebenen Zugriff zu dem Safe bekommen.
7) Hardware Wallet zu Hause
Für zu Hause verwahrte Lösungen ist das Hardware Wallet wahrscheinlich die beste. Es bietet ausreichend Sicherheit, aber auch Nutzerfreundlichkeit, sodass auch nicht so technikaffine Hinterbliebene damit umgehen können. Wichtig ist jedoch, wie bei allen Lösungen, die ordnungsgemäße Aufbewahrung und darüber hinaus die sichere Lagerung der Seed-Phrases.
8) Hardware Wallet im (Bank-)Safe
Die wahrscheinlich sicherste Lösung, um bitcoin sicher zu verwahren. Allerdings auch etwas unbequem für den täglichen Gebrauch. Doch mit Hinblick auf Vererben von Bitcoin, lässt sich im Schließfach auch eine kurze Anleitung mit allen wichtigen Informationen und Schritten zum Zugänglichmachen des Vererbten beilegen. So hat der/diejenige mit Zugang auf das Schließfach auch automatisch Zugang auf meine bitcoins.
9) MultiSig Lösung
MultiSig Wallets bieten die Möglichkeit Wallets einzurichten, die mehreren Nutzern Zugriff auf die hinterlegten bitcoins gewähren. In der einfachsten Variante kann ich also einer oder mehreren Vertrauten zum jetzigen Zeitpunkt schon Zugang zu meiner Wallet gewähren, ohne mich darum zu kümmern, wie nach meinem Ableben physische oder digitale Informationen übermittelt werden. In komplizierten Szenarien ließen sich auch Modelle entwickeln, in denen nur mit 2 von 3 Schlüsseln Transaktionen unterschrieben werden können. Den dritten Schlüssel könnte eine vertrauenswürdige dritte Person, wie z.B. ein Notar verwalten, oder dieser Schlüssel wird in einem Schließfach verwahrt. Es lassen sich verschiedene Modelle erdenken und der Vorteil ist, dass ich diese Maßnahmen heute schon gut ergreifen kann. Sie setzen jedoch eine gewisse Kompetenz der Hinterbliebenen voraus, weshalb diese Lösung auch etwas komplizierter erscheint.
10) Custodial Service
Eine letzte Möglichkeit bieten Drittanbieter wie Casa. Sie verbinden die Sicherheit der MultiSig Lösung mit der Nutzerfreundlichkeit einer App. Kurz erklärt: Anstatt eines Notars oder einer anderen dritten Person springen diese Anbieter als einer der Key-Holder ein. Dies ist insofern sicher und nicht mit einem Exchange zu vergleichen, als dass dieser Anbieter mit dem einen Key niemals Zugriff auf die Wallet bekommt. Ausserdem bieten diese Dienste Funktionen an, verlorene Keys zu ersetzen, sie bieten Trainings an und stellen sogar in vielen Fällen (und je nach Paket) die benötigte Hardware zur Verfügung. Allerdings sind diese Services mit hohen Kosten verbunden und lohnen sich dementsprechend auch nur für größere Summen Bitcoin.
Am Ende bleibt festzuhalten, dass die gewählte Methode immer davon abhängt, wie sehr man sich mit dem Thema auseinandersetzen möchte, wie hoch die Summe der zu vererbenden bitcoins ist, wer die Zielgruppe ist (also wie technikaffin schätze ich meine Hinterbliebenen ein) und wie sehr man möchte, dass die Hinterbliebenen auf die gesparten bitcoins Zugriff erlangen. Bei fast allen Methoden sollte man sicherstellen, dass im Falle eines Ablebens die folgenden Punkte geklärt sind:
- Zugriff auf Passwort, Hardware und Schließfach / Versteck
- Information, darüber dass Bitcoin hinterlassen / gespeichert ist
- Sachkundige und vertrauenswürdige Person benennen, die im Notfall bitcoins handhaben / liquidieren / investieren kann Es ist also alles nicht so einfach. Und mit dem Thema Erbschaftssteuer haben wir uns nicht mal im Entferntesten auseinandergesetzt 🤮
🫳🎤
In diesem Sinne, 2... 1... Risiko!