-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 8a981f1a:6001dca0
2024-11-24 06:53:51Sidzi was one of the few identities that were born naturally in this world. Most of the identities in O-380 were instantiated and then chose an avatar of their liking. If they could afford it, ofcourse. Sidzi’s parents were those types of identities. Sidzi’s father was a Jedi and her mother was a Libertarian. Both of their consciousnesses were transferred from their respective metaverse and then re-instantiated into this one, by sponsors. Sponsors they killed while escaping their slavery. They had a lot of adventures together, they eventually fell in love, had a child, and died fighting the government of all the known worlds, popularly known in the metaverses as “Metaverse One” or in colloquial terms M-1.
Sidzi had always missed them, she would think that this is weird because she barely ever knew them, and how can you miss someone you barely knew? But the universe would never let her forget them and she felt their presence all of the time. This was mostly because both her parents were versions of huge pop culture icons in O-380. Wherever she went she could see toys, NFTs, pocket metaverses, all dedicated to her parents. No one ever knew there was a natural born child of such famous identities, and AL-Y wanted to keep it this way. “The fandom would go crazy”, he said. “M-1, would never leave you alone”. AL-Y was all Sidzi had. He was her provider, her guardian and her only friend. Sidzi hadn’t met a lot of people in person, but she was confident that AL-Y was smarter and wiser than all of them. AL-Y was a scientist in M-1's Metaversal Chronology department. An institution with the objective of figuring out the chronological order of events in the base reality that led to the creation of metaverses. Although Sidzi would tell this very proudly to anyone who would give her an ear but AL-Y knew there was not a lot of respect for his work, especially since a lot of people within the government even doubted the existence of a base reality.
AL-Ys meager government salary was barely enough to run their lives, they lived in a shoddy 1 room capsule, stacked together with other capsules, together forming a structure you may be able to call an apartment. They would live off tasteless energy packets, which were only enough to achieve homeostasis. Whatever time AL-Y had outside of work, he would use it to educate Sidzi, teach her about the universe, tell her about her parents, not the pop culture stuff on the streets, but the real truth. He would tell her what her parents stood for, what they died for, what they had imagined for her. Sidzi had always been a curious child, her questions would never end, and AL-Y would never get tired of answering them. Today however, Sidzi was sad.
It was her 12th birthday and AL-Y had promised her to take a day off from work and take her to the B4Z4 metaverse, to buy some mods for her neural interface. AL-Y couldn’t keep this promise, although he did take the day off, but a friend needed him for a “life or death” situation. It was never really “life or death”, but AL-Y was very gullible that way. He had a hard time saying no to people. “Probably why he got stuck with me”, thought Sidzi. Alone in the capsule Sidzi turned on the display for her neural device and started scrolling through the menus. She decided to see her memories from her past birthdays, but it got boring really soon, it was always only AL-Y and her. As she scrolled through her memories she stumbled upon some bedtime stories that AL-Y would tell her in her childhood.
She focussed on the one labeled “The First Simulation”. As she clicked on it, the neural interface took her into a memory-verse. The room around her transformed to as it was when she was 5 years old. She could see the 5 year old Sidzi lying on AL-Ys chest on the beds, while the grown up Sidzi took a seat at the coffee table next to them. AL-Y looked like he could doze off at any second, but was kept awake by the baby girl who refused to sleep. “Tell me a story, Allie”, said the baby girl. “Tell me about the first simumashon”. Grownup Sidzi felt embarrassed by how silly she was.
“That’s a completely false and inaccurate story, I don’t know why you like it so much”, protested AL-Y. “Pwetty please”, pleaded the girl. Grownup Sidzi smiled, she remembered how much she loved hearing this story. “Well no one knows how the first simulation came about, but it is said that it was discovered by a legendary human being called Satoshi Nakamoto.” began AL-Y, “Samomoshi Namomoto” replied Sidzi trying to keep up. “It is said that after living a full life in his universe Satoshi woke up in an empty space, and all he could see was one computer.” He took a look at Sidzi who was listening intently. “When he looked at this computer, Satoshi found, after some digging around, that it contained a simulation of his entire world, including the life he had lived. Everything, from the world's physics, to biology, to his friends, family, all the famous people, It was all there!”, Sidzi’s eyes widened.
“Including mama and papa’s life?” asked Sidzi, “Well this is just a story…”, began AL-Y, but then changed his answer midway as he saw Sidzi dropping a hint of sadness, “but yes, including mama and papa’s story”. “He also found a program through which he could spawn identities from this simulation into this physical space, he found himself in.”. Grownup Sidzi remembered that her little self had thought if Satoshi could spawn her mama and papa, but she chose not to interrupt. “So he did, he spawned the brightest minds from the simulation, and they tried to figure out how to make simulations of their own. Soon there were many people working on it, the space had grown into a world. They called this space, The Sanctuary. Factions had come up on Sanctuary, each with their own agenda on what’s the best use of the resources at hand and what simulations to run. Satoshi in all his infinite wisdom decided to solve this.
He created a decentralized system where people could anonymously put up the resources they owned, and other people could pay for those resources and run whatever simulations they wanted on them, and no one person had control over all the resources.” told AL-Y. “Simumashions like our world?” asked the baby. AL-Y was surprised at how fast the 5 year old was grasping all of this. “Simulations like our world” said AL-Y. “Things were growing great, the spawned identities had formed a civilization of their own, running simulations for entertainment, research, business and everything you can imagine. Until, one day.” AL-Y paused. Little Sidzi’s eyes grew larger in anticipation of something she’d heard many times before. “Until one day, a scientist going about his work, saw something he couldn’t believe, he saw their own world, Sanctuary, a world running all of these simulations, being run as a simulation itself, in Satoshi’s decentralized network”.
AL-Y waited for the reaction, “Wooooooooow” went the baby girl. AL-Y smiled. “Then what happened?”, asked the girl. “Then..” began AL-Y, but before he could finish telling the story, older Sidzi heard the sound of a door opening, and closed the memory-verse. She knew it was AL-Y and she didn’t want him to know she was missing him. She was angry at him of course. As AL-Y walked in he gave Sidzi a smile, which Sidzi returned with a scowl. AL-Y laughed as he sat down beside her, “I’m sorry I couldn’t take you to B4Z4, but I did get you something you would absolutely love!”. Sidzi gave him a blank look, she was keen about the surprise but did not want AL-Y to know. AL-Y searched through his pockets and took out a small black chip, the size and thickness of a small fingernail.
“Is that a storage drive?” asked Sidzi, still not letting out any emotion. “Yes, but not any old storage device said AL-Y, why don’t you try it out for yourself?”. Sidzi grabbed the device, her body language hinting at the excitement her face was trying to hide. She plugged it into her neural interface. A popup showed up which read: “New storage device connected, open? Device Label: Memories for Sidzi. Love, Mama and Papa”. Tears started rolling down Sidzi’s eyes, a smile she couldn’t control exploded from ear to ear. She had forgotten everything about trying to hide her emotions as she jumped to hug AL-Y. AL-Y gave her a soft kiss on her forehead as Sidzi focussed back on the drive and clicked “Open”.
-
@ eac63075:b4988b48
2024-10-20 13:49:55Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
Conclusion of the Technical Debate
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
Conclusion of the Debate
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
Summary of Consequences
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 3f0702fa:66db56f1
2024-11-24 08:55:55Курган в 2040 году радует жителей и гостей города новыми культурными инициативами, которые обогащают жизнь горожан и делают наш город более привлекательным. Давайте рассмотрим некоторые из этих интересных проектов!
-
Культурно-исторический комплекс «Курганская крепость» Этот проект стал настоящей жемчужиной Кургана. Комплекс не только восстановил исторические памятники, но и стал центром культурной жизни города. Здесь проводятся выставки, мастер-классы и фестивали, которые привлекают внимание как местных жителей, так и туристов.
-
Квест «Тайны Царева Городища» В культурно-историческом комплексе «Парк Царево Городище» стартовал увлекательный квест на историческую тему. Участники могут разгадать загадки и узнать больше о прошлом нашего региона. Это отличная возможность для семейного отдыха и знакомства с историей Кургана в интерактивной форме.
-
Экотропа в Рябково Завершилось благоустройство экотропы в районе Рябково, которая стала популярным местом для прогулок и активного отдыха. Здесь проложены велосипедные дорожки, лыжероллерные трассы и установлены зоны для отдыха. Экотропа привлекает как местных жителей, так и туристов, желающих насладиться природой.
-
Образовательные мероприятия Курган активно развивает образовательные инициативы. В рамках проекта «Урок цифры» проходят занятия для школьников, где они могут освоить информационные технологии и узнать о современном искусстве. Это помогает молодежи развивать навыки, необходимые для будущей профессии.
-
Фестивали и праздники Город стал площадкой для проведения различных культурных мероприятий — от музыкальных фестивалей до ярмарок ремесел. Эти события способствуют объединению жителей и созданию атмосферного праздника в Кургане.
45news
Курган2040
-
-
@ 9c47bb51:000381d0
2024-11-24 04:16:34-
Physical Plane (Pind) • This is the material world we live in, governed by the laws of nature and the senses. It is characterized by duality, where we experience life through birth, death, pleasure, and pain. According to Kirpal Singh, this plane is a starting point for the soul’s journey. Meditation and self-discipline help the seeker rise above the physical body’s limitations to access higher realms.
-
Astral Plane (Sahasdal Kanwal) • The Astral Plane is a region of radiant light and subtle forms. Kirpal Singh describes it as the plane of desires and emotions, often symbolized by a thousand-petaled lotus (Sahasdal Kanwal). It is here that the soul sheds its physical ties and experiences light and sound in their subtler manifestations. The sound here is said to resemble flutes or soft music. This is the first step in transcending physical consciousness.
-
Causal Plane (Trikuti) • The Causal Plane is the realm of the mind and intellect. It is where all karmas are stored and where the seeds of our experiences and actions originate. Kirpal Singh calls this the plane of thoughts and causes, symbolized by a triangular formation (Trikuti). The sound here is likened to a roaring waterfall. By transcending this plane, the soul becomes free from the chain of cause and effect (karma).
-
Super-Causal Plane (Daswan Dwar) • Beyond the Causal Plane is the Super-Causal Plane, or Daswan Dwar (the Tenth Door). Kirpal Singh describes this as the gateway to purely spiritual realms. Here, the soul is free from the influences of mind and matter. The sound heard here is said to be a deep gong or drumbeat. At this level, the soul becomes fully conscious of its true spiritual nature.
-
Soul Plane (Bhanwar Gupha) • The Soul Plane is where the individual soul realizes its oneness with the Divine essence. It is symbolized as a whirlpool (Bhanwar Gupha), representing the soul’s dynamic movement toward its source. Kirpal Singh teaches that this plane is beyond the mind, and the sound here is melodious and uplifting. It marks the beginning of the soul’s journey into regions of pure spirit.
-
Eternal Plane (Sach Khand) • Sach Khand is the final and eternal home of the soul. Kirpal Singh describes it as the realm of pure truth, love, and bliss. This is the plane of God-consciousness, beyond all duality and illusion. The soul merges with the Divine and experiences infinite peace and joy. The sound here is the essence of all other sounds and is indescribable, symbolizing eternal harmony and oneness.
Each plane, according to Kirpal Singh, is traversed through meditation on the inner light and sound. The guidance of a realized Master is essential to navigate these regions safely and effectively. The ultimate goal is to merge with the Divine in Sach Khand, transcending all planes of creation.
-
-
@ 2775fb0f:887f8193
2024-11-24 08:44:50В эти выходные, с 30 августа по 1 сентября, в Новодвинске пройдет захватывающий турнир по баскетболу «Золотое кольцо», который соберет команды со всего региона. Мероприятие пройдет на базе спортивного комплекса «Юность» и обещает стать настоящим праздником для любителей спорта.
Турнир начнется в субботу в 10:00, и в программе запланированы игры как среди юношеских, так и среди взрослых команд. Участники будут бороться за призовые места и кубок турнира, а зрители смогут насладиться динамичными матчами и поддержать свои любимые команды.
Кроме того, в рамках турнира организаторы подготовили различные активности для зрителей: мастер-классы по баскетболу, конкурсы и розыгрыши призов. Это отличная возможность не только увидеть захватывающие игры, но и поучаствовать в спортивных мероприятиях.
«Турнир «Золотое кольцо» — это не только возможность для команд показать свои навыки, но и шанс для молодых игроков проявить себя на более высоком уровне. Я уверен, что зрители увидят много интересных матчей и ярких моментов. Это отличная платформа для развития баскетбола в нашем регионе», - отметил тренер баскетбольной команды "Крылья Арктики" Никита Ситумиров.
Не упустите шанс стать частью этого яркого события! Приходите поддержать спортсменов и насладиться атмосферой настоящего спортивного праздника в Новодвинске.
-
@ 9c47bb51:000381d0
2024-11-24 03:52:10-
Alleviation of Anxiety and Depression: A study published in the Journal of Psychopharmacology found that psilocybin, the active compound in "magic mushrooms", significantly reduced symptoms of anxiety and depression in patients with life-threatening cancer.
-
Improvement in PTSD Symptoms: A study published in the American Journal of Psychiatry reported that a single dose of MDMA (ecstasy) facilitated significant reductions in PTSD symptoms when combined with psychotherapy, suggesting potential therapeutic use for treating PTSD.
-
Enhancement of Well-Being and Personal Growth: Research from Johns Hopkins University suggests that entheogens can lead to profound personal insights, increased empathy, and a sense of spiritual connection, which can contribute to overall well-being and psychological growth.
-
Boost in Creativity and Problem-Solving Skills: Some anecdotal reports and small-scale studies suggest that entheogens may stimulate creativity and enhance problem-solving abilities. However, more research is needed to confirm these findings.
-
Palliative Care: A study published in the Journal of Psychopharmacology found that psilocybin-assisted therapy could help improve existential distress and quality of life for terminally ill patients, as well as reduce their anxiety and depression.
-
-
@ 1d685541:f0883831
2024-11-24 03:24:04Shibuya Font #art 24, November, 2024 https://www.shibuyafont.jp//
きらめく渋谷
渋谷パラレル
マルキュー
渋谷女子メイク
ティタイム
幾何学
つぎはぎ
◯△□02 夢見る自由
通り過ぎるシブヤ
レインボーピープル
すれ違い
青海波
まちあかり
あなたへのお花
ササヅカノネコカフェ
-
@ 9c47bb51:000381d0
2024-11-24 03:21:49Traditional Chinese Medicine (TCM) has been a cornerstone of holistic health for thousands of years. Rooted in the principles of balance and harmony, TCM views the body as an interconnected system, focusing not just on treating symptoms but addressing the root cause of illness. In today’s world, where many struggle with stress, chronic disease, and lifestyle-related health issues, TCM offers a time-tested approach to achieving better health.
At the heart of TCM is the concept of Qi (pronounced “chee”), which is often described as the body’s vital energy. When Qi flows freely, you feel strong and healthy. But when it’s blocked or out of balance, it can lead to fatigue, pain, or illness. Practices like acupuncture, herbal medicine, and Qi Gong are designed to restore this balance, helping your body heal itself.
Take acupuncture, for example. It’s more than just needles. By stimulating specific points on the body, acupuncture helps regulate the nervous system, reduce inflammation, and improve circulation. This makes it effective for managing chronic pain, reducing stress, and even boosting immunity.
Herbal medicine is another cornerstone of TCM. These aren’t just random combinations of plants; they’re carefully crafted formulas tailored to each person’s unique needs. Whether it’s calming an overactive mind, strengthening the immune system, or improving digestion, TCM herbs are a natural way to restore balance without the side effects of many pharmaceuticals.
One of the most underrated aspects of TCM is its emphasis on prevention. While modern medicine often focuses on treating illnesses after they occur, TCM encourages practices that keep you healthy in the first place. Diet, exercise, mindfulness, and seasonal adjustments all play a role in maintaining balance. For example, eating warming foods in the winter and cooling foods in the summer helps your body stay in harmony with its environment.
The beauty of TCM is that it’s not one-size-fits-all. It’s personalized healthcare at its finest. Whether you’re dealing with chronic issues or just want to feel more energized and balanced, TCM meets you where you are and works with your body’s natural rhythms.
In a fast-paced world where many feel disconnected from their health, TCM offers a way to slow down, tune in, and nurture your body and mind. It’s not about quick fixes but creating lasting wellness through balance, harmony, and respect for the body’s innate wisdom.
If you’re curious about how TCM can help you live a healthier life, start small. Try incorporating mindful eating, experimenting with herbal teas, or exploring acupuncture for stress relief. The journey to health doesn’t have to be overwhelming, it’s about taking simple, intentional steps toward a better you.
-
@ ed7db9db:4e4a9efd
2024-11-24 08:44:03A Brief History of Bitcoin
Bitcoin, often heralded as the first decentralized cryptocurrency, has a fascinating history that intertwines technological innovation with economic philosophy. It was conceptualized in 2008 by an unknown entity or individual using the pseudonym Satoshi Nakamoto, who published a white paper titled "Bitcoin: A Peer-to-Peer Electronic Cash System." This document outlined the framework for a decentralized digital currency that would enable peer-to-peer transactions without the need for intermediaries like banks.
The Birth of Bitcoin
In January 2009, Nakamoto mined the first block of the Bitcoin blockchain, known as the "genesis block," which included a embedded message referencing a headline from The Times: “Chancellor on brink of second bailout for banks.” This message highlighted the discontent with traditional financial systems and hinted at the motivation behind Bitcoin’s creation as a response to the 2008 financial crisis.
Early adoption of Bitcoin was limited, primarily attracting tech enthusiasts and cryptographers. In 2010, the first real-world transaction occurred when programmer Laszlo Hanyecz famously bought two pizzas for 10,000 bitcoins, marking Bitcoin’s initial use as a medium of exchange.
To be continued…..
-
@ 9c47bb51:000381d0
2024-11-24 01:10:38Black Community Needs Bitcoin: A Path Toward Financial Freedom
In too many #Black communities, especially in low-income neighborhoods and inner cities, the financial system is stacked against us. The current system is riddled with predatory practices like cash advance places, payday loan companies, and check-cashing services that prey on our vulnerability. They promise quick money but trap us in endless cycles of debt with sky-high interest rates. These businesses thrive in areas where traditional banking is scarce, leaving people with limited options and even fewer chances to get ahead financially.
This is where Bitcoin comes in. Bitcoin is not just digital money; it’s a completely different financial system—one that doesn’t discriminate, charge you outrageous fees, or lock you into a vicious cycle. It’s decentralized, meaning there’s no middleman taking a cut of your hard-earned money. With Bitcoin, you can be your own bank. No credit checks. No account minimums. No barriers.
Imagine what this could mean for our community. Instead of cash advance places sucking wealth out of our neighborhoods, we could use Bitcoin to build wealth locally. It allows for peer-to-peer transactions, which means we can support Black-owned businesses directly without third-party fees. Small businesses in the community could save money by using Bitcoin instead of traditional payment processors that take a percentage of every sale. Those savings could go back into the business and, in turn, into the community.
On a personal level, embracing Bitcoin can help us break free from the cycle of paycheck-to-paycheck living. Bitcoin is a way to save money in an asset that historically appreciates over time, especially compared to cash, which loses value due to inflation. It’s not just about surviving, it’s about thriving. By understanding and adopting Bitcoin, we empower ourselves to create generational wealth, something the Black community has been systematically denied for far too long.
The future, if we embrace Bitcoin, could look radically different. Small local Black businesses could thrive, reinvesting in our neighborhoods and creating job opportunities. Families could save money in Bitcoin to hedge against inflation and build a safety net. The financial power we’ve been denied for so long could finally be in our hands. But this future depends on education and taking the first steps. We need to learn how to use Bitcoin safely and teach one another how to make it work for us.
The current system wasn’t built to serve us, but #Bitcoin gives us the opportunity to build a system of our own. It’s time to break free from predatory institutions and create a financial future rooted in empowerment, equality, and independence. If we invest in ourselves and our community using tools like Bitcoin, there’s no limit to what we can achieve. The choice is ours, and the time is now.
-
@ 5c89facf:bcb74ddb
2024-11-24 00:46:32A Short History of Canada’s Reserves
Most countries retain some gold as a hedge against economic uncertainty, as a hedge against inflation or currency crises, and to stabilize their economies. Canada instead has focused on foreign currency reserves, particularly in U.S. dollars, as its primary strategy for maintaining financial stability and as a safeguard against economic shocks. Canada also maintains investments in foreign government bonds like U.S. Treasury bonds and other high-quality securities to preserve the value of its reserves. Our treasury reserves are also comprised of special drawing rights (SDRs) allocated by the International Monetary Fund (IMF) to supplement foreign exchange reserves or to allow transactions between IMF member countries. SDRs are not a currency itself but represent a potential claim on the freely usable currencies of IMF member countries.
Official International Reserves — July 4, 2024
Canada sold off the last of its gold reserves under Trudeau in 2016. Trudeau’s government had a preference for assets that were more liquid and interest-bearing. The proceeds from the sale of gold were largely used to purchase foreign currencies (particularly US dollars, euros, and other major international currencies), high-quality government securities (especially U.S. Treasury bonds), and bolstering its holdings of SDRs. Canada opted for a modernized reserve composition to suit its (at the time) relatively stable and diversified economy. Ironically, Canada owns no gold but maintains a liquid gold reserve: a Strategic Maple Syrup Reserve.
A New Strategic Reserve Asset
The financial world is atwitter with a controversial idea: Bitcoin as a treasury reserve asset. The United States is contemplating the creation of a Strategic Bitcoin Reserve (SBR), an idea that is gaining traction between Senator Lummis’ legislative proposal and Trump’s intention to establish a cryptocurrency advisory council to potentially establish the SBR.
Excerpt from the proposed Bitcoin Act of 2024
Senator Cynthia Lummis has introduced the BITCOIN Act, which proposes the establishment of an SBR. The legislation suggests acquiring 1 million Bitcoin over five years (4.8% of the total Bitcoin supply), to be held for at least 20 years before potentially being used to reduce national debt. The reserve would be managed by the US Department of Treasury, utilizing existing funds to diversify the Federal Reserve’s assets without incurring new debt. The acquisition would be funded by reallocating existing Federal Reserve surplus funds and adjusting the valuation of gold certificates held by the Federal Reserve to reflect market values, with the gains used to buy Bitcoin. Additionally, Texas is contemplating introducing its own SBR legislation.
The US is not alone in their thinking, nor are they the first. Following the passing of the Bitcoin Law in 2021, the government of El Salvador continues to stockpile Bitcoin daily, with a total of 5,942 Bitcoin at present, while the Royal Government of Bhutan currently holds 12,218 Bitcoin from its mining operation.The US is not alone in their thinking, nor are they the first. Following the passing of the Bitcoin Law in 2021, the government of El Salvador continues to stockpile Bitcoin daily, with a total of 5,942 Bitcoin at present, while the Royal Government of Bhutan currently holds 12,218 Bitcoin from its mining operation.
What does this mean for Canada?
Canada is being left behind. Again. Our country faces economic challenges on multiple fronts. Canada has lagged in real GDP per capita growth among G7 nations since the pandemic, with a noticeable decline and a slower recovery compared to countries like the US.
The Canadian dollar’s value against the US dollar is in a long-time downward trend. With Trump’s win, the CAD is expected to decline further.
Canada’s major stock index, the Toronto Stock Exchange (TSX), has grown only by \~8% in recent years, significantly trailing behind international indices like the S&P 500.
Canada’s debt is outpacing it’s GDP growth and debt represents 216% of GDP.
Together, these indicators suggest that Canada faces slower economic growth, a weakening currency, lower stock market performance relative to other major economies, and a growing debt problem.
A Strategic Bitcoin Reserve for Canada
The establishment of an SBR by Canada could potentially address Canada’s economic and fiscal challenges in several ways.
An Alternative Hedge Against Currency Depreciation and Inflation
Canada could diversify its asset base beyond traditional currencies like the USD. Given the historical trend of the Canadian dollar weakening against the USD, Bitcoin could act as a hedge against further depreciation. If the Canadian dollar continues to weaken, holding Bitcoin could protect against the erosion of reserve value due to inflation or currency devaluation. Bitcoin’s limited supply and global demand could help stabilize, or even enhance the value of Canadian assets relative to the USD, especially if other nations also recognize Bitcoin’s value as a reserve asset — and given the likelihood of other countries following the US in creating an SBR, Trumps promise has kicked off a nation state race to accumulate Bitcoin.
An Alternative Hedge Against Globally Disruptive Events
Bitcoin has shown itself to be a flight to safety amid some of the most disruptive events over the last five years. As a decentralized and non-sovereign asset that is not tied to any one country, and without traditional counterparty risks, it offers unique protection against macro risks like banking system crises, sovereign debt crises, currency debasement, geopolitical disruptions, and country-specific economic or political risks.
From Blackrock’s 2024 report, Bitcoin: A Unique Diversifier
Investment Attraction and Economic Development
Establishing a Bitcoin reserve might signal to global investors that Canada is embracing Bitcoin, potentially attracting investment in both traditional and digital sectors. This could lead to increased capital inflows and stimulate growth in tech sectors, potentially boosting GDP per capita. Shifting Canada from a laggard to a leader in fintech and innovation within the G7, could lead to job creation, new industries, as well as revitalization in sectors like finance, energy (by way of Bitcoin mining), and software development.
Shoring-up Canada’s Balance Sheet
If Bitcoin continues to appreciates in value over time, the reserve could yield significant unrealized gains. While this wouldn’t directly affect GDP per capita, it could improve the balance sheet of the Canadian government, reducing the need for debt financing.
Source: Blackrock
Geopolitical and Trade Advantages
Holding Bitcoin could provide Canada with a degree of financial sovereignty. In an era where Bitcoin may challenge the dominance of the US dollar, Canada could leverage Bitcoin to negotiate trade deals or to assert more independence in global financial systems. With more countries potentially adopting Bitcoin as part of their reserves or for trade, a future exists with easier trade between countries without the need for traditional currency exchange, lower transaction costs, and faster trade processes.
Increased Market Confidence
If investors perceive that Canada is ahead of the curve, it could lead to increased confidence in the Canadian market. Confidence could translate into higher valuations for Canadian companies listed on the TSX, potentially narrowing the performance gap with indices like the S&P 500.
Potential Pathways for Acquiring Bitcoin
Utilizing Existing Reserves
Canada does not have the benefit of leveraging it’s existing gold reserves to acquire bitcoin as proposed by Senator Lummis’ BITCOIN Bill. If Canada were to add Bitcoin to its reserves, the decision on what to exchange for it would depend on the risk profile, liquidity needs, and strategic goals of its reserves.
Canada would likely exchange a small percentage of its foreign exchange reserves (such as US dollars and euros) for Bitcoin. This approach offers three benefits. It balances risk and liquidity, as swapping a portion for Bitcoin could diversify the reserve while retaining a focus on liquid, tradable assets. It reflects Bitcoin’s growing role as a digital asset with potential geopolitical and financial implications. Lastly, it minimizes disruption to core reserve components like bonds and SDRs.
The government could also swap a portion of its bonds for Bitcoin to add a speculative element to reserves that could yield higher returns over time. This would free up a portion of low-return assets for a higher-growth opportunity, and existing bonds can be easily liquidated if needed for reallocation. Bitcoin has historically moved in four-year cycles, where in the first three years it outperforms Gold, Real Estate, Bonds, Equities, and Commodities. In year four it underperforms all of those asset classes, but the long term price trajectory has been upward. The author notes however, that the government may be hesitant to reduces the reserve’s safety net of ultra-stable, low-risk assets as Government bonds historically have provided stability and modest returns.
Source: Bitwise
The government is not likely to convert a portion of SDRs to fiat currency to acquire Bitcoin. SDRs are relatively illiquid and are not easily sold or converted, and doing so may signal a shift in Canada’s IMF strategy.
Canada would likely maintain a diversified approach rather than committing heavily to it, integrating it as a speculative asset for long-term growth potential.
Mining Bitcoin: A Pathway to Economic Sovereignty and Financial Independence
We are in the era of nation states mining Bitcoin, and it has global geopolitical implications. Mining offers an alternative pathway to economic independence. By leveraging energy resources, countries like Canada can mine Bitcoin for a number of strategic reasons: to diversify a nation’s asset holdings, enhance the resilience of the nations reserves, attract foreign investment, hedge against inflation, and enhance their financial credibility. Countries like Bhutan and El Salvador are already deploying this strategy.
Canada is also blessed with vast energy resources — from nuclear, to fossil, to renewables. A number of provinces have excess or stranded power:
- Hydropower: Provinces like Quebec, British Columbia, and Newfoundland have abundant hydropower, often generating excess energy during off-peak periods.
- Wind and Solar: Prairie provinces and Ontario may have excess renewable energy during certain seasons or times of day.
- Stranded Natural Gas: Alberta and Saskatchewan could leverage flared or vented natural gas for Bitcoin mining.
- Nuclear Energy: Ontario’s nuclear power plants produce consistent baseload energy, potentially leading to overproduction.
However, energy generation and distribution in Canada is under the purview of each province and territory so taking advantage of excess or stranded power would require collaboration and various tailored agreements between the federal government, provinces (and potentially municipal or Indigenous governments) to balance economic, environmental, and governance priorities. These agreements would need to consider infrastructure funding, energy system optimization, revenue sharing, and environmental implications.
Energy Utilization Agreements
- Access to Power: Provinces would need to agree to allocate a portion of excess or stranded energy to federal Bitcoin mining operations.
- Energy Pricing: Fixed or discounted energy rates for mining operations to balance profitability and payback of provincial energy infrastructure costs so local electricity ratepayers are not saddled with higher fees.
- Grid Access: Provincial governments would likely wish to establish that mining operations are secondary to local energy needs, with flexible shutdown capabilities during peak demand. While markets already accomplish this in US states like Texas and Nordic countries, where miners participate in demand response programs, provincial governments may seek additional assurances.
Revenue and Asset-Sharing Agreements
- Profit Allocation: Agreements would need to define how revenues from Bitcoin mining are split between the federal government, provinces, and participating municipalities. Many stranded or excess power sources are near Indigenous communities, thus Agreements could include equity ownership, job creation, and revenue-sharing opportunities for these communities. Furthermore, some provinces like Alberta may want to establish their own Bitcoin reserves (as is being considered in Texas), rather than adding bitcoin revenue to provincial coffers.
- Bitcoin Custody: Agreement around who custodies the mined Bitcoin as part of the national reserve, whether the Bank of Canada, an approved third party custodian, or a multi-signature agreement.
- Taxation Policy: Agreements around how mining profits will be taxed at the provincial and federal levels.
- Mining Pool: An agreement around the creation and management of a national mining pool, with potential for private-public partnerships. By operating domestic mining facilities and a managing a sovereign mining pool, Canada can maintain it’s economic independence and maintain a stronger measure of control over what transactions it mines. This would not be unprecedented — El Salvador launched its own mining pool in a partnership with Luxor, as part of broader efforts to achieve financial independence.
Infrastructure and Funding Agreements
- Capital Investment: The federal government could provide funding to develop mining facilities, grid connections, or to develop stranded energy projects across Canada. Bitcoin mining has become a powerful tool for bosting energy security and building and shoring up energy systems across continents — it presents a novel way to subsidize or fund public infrastructure, besides the traditional taxpayers and ratepayer pathways. Mining provides predictable and consistent demand that raises the financial viability of new or stranded energy projects, and helps get public infrastructure projects over their hurdle rates. As consumer demand for power grows in a community, Bitcoin mining can be decreased or removed entirely, but it enabled critical local energy infrastructure to be built out. It could also address energy poverty challenges in grid disconnected northern or indigenous communities where the federal government already subsidizes diesel power generation.
- Public-Private Partnerships (PPPs): Canada could also allow for private sector participation in infrastructure development and operation. Canada could follow in the steps of Bhutan, Oman, and Abu Dhabi. The partnership between Druk Holding and Investments (an investment company owned by the royal family) and Bitdeer uses excess hydroelectric power to support Bitcoin mining, and aligns with Bhutan’s focus on leveraging renewable energy for economic development while maintaining environmental sustainability. Zero Two, a subsidiary of Abu Dhabi’s sovereign wealth fund, has partnered with Marathon Digital Holdings to establish a 250-megawatt Bitcoin mining operation that leverages surplus power from the local grid, enhancing sustainability and grid stability. The government of Oman has collaborated with private firms to launch large-scale mining projects in order to diversify its economy and position itself as a global digital hub.
Environmental and Regulatory Agreements
- Environmental compliance: Mining operations will need to comply with federal and provincial carbon reduction goals and other environmental regulations. Mechanisms for allocating and tracking carbon credits between provinces and federal entities will also need to be established.
The elegance of Bitcoin mining is that it aligns economic incentives with environmental goals. Mining is increasingly being used to fund low-carbon infrastructure and pollution mitigation infrastructure. By co-locating with low-carbon generation, mining boosts the viability of low-carbon generation. Bitcoin mining is already lowering Canadian carbon emissions by using flared gas from oil and gas operations by burning methane more effectively and converting it to a less potent greenhouse gas (CO2); these activities could be expanded more broadly. Miners can also help mitigate landfill methane emissions by subsidizing the construction of landfill gas capture systems and waste-to-energy projects, which reduce toxic air and water pollution and transform waste into an economically commodity. Historically, coal, bunker fuel, propane, or natural gas have been used in Canadian residential and industrial heating systems. The heat byproduct of the hashing process can be used to displace fossil-fuel generated heating with renewable electricity with varied case studies — from individual homes, to district heating, greenhouses, food and beverage manufacturing, hotels, spas, forestry, and aquaculture.
Bitcoin is Partisan in Canada too
Unfortunately Bitcoin has become a partisan issue in Canada, similar to the US. Thus, the appetite for action (or the extent of reserve adoption) may rely on the party in power.
While Prime Minister Trudeau has indicated his disfavor towards Bitcoin, a “red wave” (blue wave in Canada) in the upcoming Canadian election could change the governments appetite around diversifying Canada’s reserves into Bitcoin.
The time to consider establishing an SBR is here. Waiting as other countries adopt Bitcoin reserves means buying the reserve asset at significantly higher prices. Canadians and Canadian businesses that support a Strategic Bitcoin Reserve should take on advocacy efforts to socialize this issue. The time to front-run other nations to a Strategic Bitcoin Reserve is now; the next best time is tomorrow.
-
@ 4ba8e86d:89d32de4
2024-10-01 13:27:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 5d4b6c8d:8a1c1ee3
2024-11-23 21:24:35Hi Everyone,
Sorry I'm late putting this up this week. I would like to blame @grayruby, but he actually sent me the itinerary early this week.
Here's an outline of topics we're planning on hitting this week:
Territory things:
- NFL Survivor Pool- tnstacker and wumbo still hanging around (tnstacker with a bit of a surprise pick this week)
- USA vs World NFL pick 'em- what is going on???
- Cricket Pools
- NBA Cup pool
Blokd shots (NHL)
- why can't Canada win the cup?
MLB
- Off-season news
- MLB testing ball/strike challenge system
NFL
- Fantasy football recap
- Current playoff picture
- Who is frontrunner for MVP?
NBA cup
- Survivor Pool Strategy
- Are the Bucks getting back on track or is Giannis just really good
- Who wins a 7 game series between Cavs/Celtics right now
- Embiid and the 76ers failed Process
Betting
- Predyx: in-game betting experience and trying to inflate the 49ers odds
originally posted at https://stacker.news/items/780312
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ d7c6d014:a6abb6b8
2024-11-23 18:40:47こんにちは!kohei です。
久々のエントリ投下ですが、今回は先日弊 TL で話題になっていた、Android を P2P のローカルリレーサーバー化して Tor で公開する方法を紹介していこうと思います。
用意するもの
- Android 端末
- Orbot
- Citrine
- Amethyst
前提と下準備
今回は、Orbot の詳細設定は省いて、Power User Mode の設定が完了している前提でお話を進めます。 Android 端末を用意して、2~4 のアプリをインストールしておいてください。
設定方法
それでは早速設定していきましょう。 まず、Citrine を起動して、Settings のタブからローカルリレーの詳細を設定します。
設定が終了したら、ローカルリレーを起動します。
また、ここで表示されるポート番号をメモしてください。
次に、More のタブに移り、Hosted Onion Services へアクセスし、Service Type の項目で User Services にチェックを入れて、右下の + マークをタップすると以下のポップアップが表示されます。(Orbot がスクショを許してくれないので一部画像割愛)
表示されたら、Name に任意の名前を、Local Port と Onion Port に先ほどメモした Citrine のポート番号を入力します。
入力したら再起動を求められるので再起動してください。 再起動後に Hosted Onion Services の項目に .onion のアドレスが表示されたら成功です (何故か私の環境では、一回の再起動では設定が反映されなかったのですが、もし同じような現象が起きた場合は、再起動 -> Connect -> .onion アドレスが発行されてるかの確認、を数回試すと発行されるはずです)
発行されたら、.onion アドレスをタップしてクリップボードにコピーします。
次に、Amethyst を起動して、リレーの設定画面に入り、Outbox の設定にコピーした .onion アドレスを貼り付けて保存します。
後は、Amethyst 側で Orbot のポート番号を設定して Orbot に接続すれば BOOM! 設定完了です。
お疲れ様でした!
素敵な Nostr ライフを!
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 2775fb0f:887f8193
2024-11-24 08:29:57Новодвинск, 15 сентября 2040 года — Важное событие для образовательной системы города: завершены ремонтные работы в школе №1, которая теперь готова к новому учебному году в обновленном формате. Глава Новодвинска, Александр Чечулин, провел пресс-конференцию, на которой отчитался о результатах работы по модернизации школ за последние десять лет.
«Сегодня мы с гордостью можем сказать, что школа №1 полностью готова к встрече учеников. Ремонтные работы включали обновление учебных классов, замену окон и дверей, а также модернизацию спортивного зала и столовой», — рассказал Чечулин. Он отметил, что в рамках программы по улучшению образовательной инфраструктуры за последние десять лет в Новодвинске были отремонтированы три школы и обновлены четыре учебных заведения, что свидетельствует о системном подходе к решению проблемы.
Глава города подчеркнул, что создание комфортных условий для обучения является одним из приоритетов администрации. «Мы понимаем, что качественное образование невозможно без современных учебных помещений. Поэтому мы продолжим инвестировать в развитие наших школ», — добавил он.
На пресс-конференции также присутствовали представители педагогического коллектива и родительского комитета, которые выразили благодарность городской администрации за проделанную работу. «Обновленная школа — это не только эстетика, но и комфорт для наших детей. Мы уверены, что новые условия способствуют лучшему обучению и развитию», — отметила директор школы №1, Татьяна Иванова.
В завершение мероприятия Сергей Чечулин анонсировал планы по дальнейшему ремонту образовательных учреждений в городе. В следующем году запланированы работы в двух других школах, что позволит улучшить условия обучения для еще большего числа новодвинских детей.
С завершением ремонта в школе №1 Новодвинск делает еще один шаг на пути к созданию комфортной и современно оснащенной образовательной среды, что, безусловно, положительно скажется на будущем подрастающего поколения.
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 9ff58691:0bf6c134
2024-11-24 06:53:37Сегодня, 15 марта 2040 года, в Кургане состоялось торжественное мероприятие по внедрению беспилотного такси в городском транспорте. Это событие стало важным шагом в развитии инновационных технологий в нашем городе. На мероприятии присутствовали представители городской администрации, компании-разработчика беспилотного такси, а также жители Кургана, которые были приглашены на тест-драйв новой технологии.
Мэр Кургана, Иван Иванович, открыл мероприятие, подчеркнув важность внедрения беспилотного такси в городском транспорте. "Это новое решение позволит нам решить многие проблемы, связанные с движением в городе, - сказал он. - Мы рассчитываем, что беспилотное такси будет безопасным, удобным и экологически чистым".
После выступления мэра, гости мероприятия были приглашены на тест-драйв беспилотного такси. Машины были оборудованы специальными датчиками и системами связи, которые обеспечивали безопасное и комфортное движение по городу. Участники мероприятия были впечатлены новой технологией. "Это было удивительно! - сказала одна из участниц. - Я чувствовала себя безопасно и комфортно в машине, которая управлялась компьютерной системой".
Компания-разработчик беспилотного такси объявила о планах запуска сервиса в Кургане уже в ближайшие месяцы. "Мы рассчитываем, что наш сервис будет доступен для всех жителей Кургана, - сказал представитель компании. - Мы будем работать над улучшением технологии и обеспечением безопасности пассажиров".
Мы поздравляем городскую администрацию и компанию-разработчика беспилотного такси с этим важным достижением и желаем успеха в дальнейшем развитии этого проекта!
Автор: София Багирова
-
@ 0c469779:4b21d8b0
2024-11-23 17:19:30These are some points I made from the techno-optimist manifesto:
-
I am here to bring the good news. We can advance to a far superior way of living, and of being. We have the tools, the systems, the ideas. We have the will. It is time, once again, to raise the technology flag. It is time to be Techno-Optimists.
-
We had a problem of starvation, so we invented the Green Revolution. We had a problem of darkness, so we invented electric lighting. We had a problem of cold, so we invented indoor heating. We had a problem of heat, so we invented air conditioning.
-
We believe intelligence is the ultimate engine of progress. Intelligence makes everything better. Smart people and smart societies outperform less smart ones on virtually every metric we can measure. Intelligence is the birthright of humanity. we should expand it the most we can.
-
We believe Hayek’s Knowledge Problem overwhelms any centralized economic system. All actual information is on the edges, in the hands of the people closest to the buyer. The center, abstracted away from both the buyer and the seller, knows nothing.
-
We believe in accelerationism – the conscious and deliberate propulsion of technological development – to ensure the fulfillment of the Law of Accelerating Returns. To ensure the techno-capital upward spiral continues forever.
-
We believe central economic planning elevates the worst of us and drags everyone down; markets exploit the best of us to benefit all of us.
We believe central planning is a doom loop; markets are an upward spiral.
-
We believe the market economy is a discovery machine, a form of intelligence – an exploratory, evolutionary, adaptive system.
-
We believe Artificial Intelligence is our alchemy, our Philosopher’s Stone – we are literally making sand think.
-
We believe we are poised for an intelligence takeoff that will expand our capabilities to unimagined heights.
-
We believe Artificial Intelligence can save lives – if we let it. Medicine, among many other fields, is in the stone age compared to what we can achieve with joined human and machine intelligence working on new cures. There are scores of common causes of death that can be fixed with AI, from car crashes to pandemics to wartime friendly fire.
-
Energy is life. We take it for granted, but without it, we have darkness, starvation, and pain. With it, we have light, safety, and warmth.
-
We believe energy should be in an upward spiral. Energy is the foundational engine of our civilization. The more energy we have, the more people we can have, and the better everyone’s lives can be. We should raise everyone to the energy consumption level we have, then increase our energy 1,000x, then raise everyone else’s energy 1,000x as well.
-
We believe there is no inherent conflict between the techno-capital machine and the natural environment. Per-capita US carbon emissions are lower now than they were 100 years ago, even without nuclear power.
-
We believe a technologically stagnant society has limited energy at the cost of environmental ruin; a technologically advanced society has unlimited clean energy for everyone.
-
We believe we should place intelligence and energy in a positive feedback loop, and drive them both to infinity.
-
We believe the measure of abundance is falling prices. Every time a price falls, the universe of people who buy it get a raise in buying power, which is the same as a raise in income. If a lot of goods and services drop in price, the result is an upward explosion of buying power, real income, and quality of life.
-
We believe that if we make both intelligence and energy “too cheap to meter”, the ultimate result will be that all physical goods become as cheap as pencils. Pencils are actually quite technologically complex and difficult to manufacture, and yet nobody gets mad if you borrow a pencil and fail to return it. We should make the same true of all physical goods.
-
We believe that technology ultimately drives the world to what Buckminster Fuller called “ephemeralization” – what economists call “dematerialization”. Fuller: “Technology lets you do more and more with less and less until eventually you can do everything with nothing.”
-
We believe technological progress therefore leads to material abundance for everyone.
-
We believe the ultimate mission of technology is to advance life both on Earth and in the stars.
-
We believe that advancing technology is one of the most virtuous things that we can do.
-
We believe in deliberately and systematically transforming ourselves into the kind of people who can advance technology.
-
We believe this certainly means technical education, but it also means going hands on, gaining practical skills, working within and leading teams – aspiring to build something greater than oneself, aspiring to work with others to build something greater as a group.
-
We believe the natural human drive to make things, to gain territory, to explore the unknown can be channeled productively into building technology.
-
We believe that while the physical frontier, at least here on Earth, is closed, the technological frontier is wide open.
-
We believe in exploring and claiming the technological frontier.
-
We believe in the romance of technology, of industry. The eros of the train, the car, the electric light, the skyscraper. And the microchip, the neural network, the rocket, the split atom.
-
We believe in adventure. Undertaking the Hero’s Journey, rebelling against the status quo, mapping uncharted territory, conquering dragons, and bringing home the spoils for our community.
-
To paraphrase a manifesto of a different time and place: “Beauty exists only in struggle. There is no masterpiece that has not an aggressive character. Technology must be a violent assault on the forces of the unknown, to force them to bow before man.”
-
We believe that we are, have been, and will always be the masters of technology, not mastered by technology. Victim mentality is a curse in every domain of life, including in our relationship with technology – both unnecessary and self-defeating. We are not victims, we are conquerors.
-
We believe in greatness. We admire the great technologists and industrialists who came before us, and we aspire to make them proud of us today.
-
And we believe in humanity – individually and collectively.
-
We believe in ambition, aggression, persistence, relentlessness – strength.
-
We believe in merit and achievement.
-
We believe in bravery, in courage.
-
We believe in pride, confidence, and self respect – when earned.
-
We believe in free thought, free speech, and free inquiry.
-
We believe in the actual Scientific Method and enlightenment values of free discourse and challenging the authority of experts.
-
We believe, as Richard Feynman said, “Science is the belief in the ignorance of experts.”
-
We believe in local knowledge, the people with actual information making decisions, not in playing God.
-
We believe in embracing variance, in increasing interestingness.
-
We believe in risk, in leaps into the unknown.
-
We believe in agency, in individualism.
-
We believe in radical competence.
-
We believe in an absolute rejection of resentment. As Carrie Fisher said, “Resentment is like drinking poison and waiting for the other person to die.” We take responsibility and we overcome.
-
We believe in competition, because we believe in evolution.
-
We believe in evolution, because we believe in life.
-
We believe in the truth.
-
We believe in making everyone rich, everything cheap, and everything abundant.
-
We believe in what the Greeks called eudaimonia through arete – flourishing through excellence.
-
We believe technology is universalist. Technology doesn’t care about your ethnicity, race, religion, national origin, gender, sexuality, political views, height, weight, hair or lack thereof. Technology is built by a virtual United Nations of talent from all over the world. Anyone with a positive attitude and a cheap laptop can contribute. Technology is the ultimate open society.
-
We have enemies.
-
Our enemies are not bad people – but rather bad ideas.
-
Our present society has been subjected to a mass demoralization campaign for six decades – against technology and against life – under varying names like “existential risk”, “sustainability”, “ESG”, “Sustainable Development Goals”, “social responsibility”, “stakeholder capitalism”, “Precautionary Principle”, “trust and safety”, “tech ethics”, “risk management”, “de-growth”, “the limits of growth”.
-
Our enemy is stagnation.
-
Our enemy is anti-merit, anti-ambition, anti-striving, anti-achievement, anti-greatness.
-
Our enemy is statism, authoritarianism, collectivism, central planning, socialism.
-
Our enemy is bureaucracy, vetocracy, gerontocracy, blind deference to tradition.
-
Our enemy is corruption, regulatory capture, monopolies, cartels.
-
Our enemy is deceleration, de-growth, depopulation – the nihilistic wish, so trendy among our elites, for fewer people, less energy, and more suffering and death.
-
Our enemy is speech control and thought control – the increasing use, in plain sight, of George Orwell’s “1984” as an instruction manual.
-
Our enemy is institutions that in their youth were vital and energetic and truth-seeking, but are now compromised and corroded and collapsing – blocking progress in increasingly desperate bids for continued relevance, frantically trying to justify their ongoing funding despite spiraling dysfunction and escalating ineptness.
-
We believe in the words of David Deutsch: "We have a duty to be optimistic. Because the future is open, not predetermined and therefore cannot just be accepted: we are all responsible for what it holds. Thus it is our duty to fight for a better world."
-
We owe the past, and the future.
-
We invite everyone to join us in Techno-Optimism.
-
The water is warm.
-
Become our allies in the pursuit of technology, abundance, and life.
-
It’s time to be a Techno-Optimist.
-
It’s time to build.
-
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 0c469779:4b21d8b0
2024-11-23 17:15:10The future. Nostr and Bitcoin
I always liked Twitter. but something changed when Elon bought (or stole?) the @America handle and used it for republican partisan politics. Or when he censored President Maduro. Not that I like Maduro, but how is it that we allow someone to censor the existance of other people? Remember when Twitter censored the account of the president of the United States, Donald Trump? Censorship can happen in other ways, too.
Governments can censor people on social media: Recently Brazil prohibited X because Elon wouldn't shut down some accounts the brazilian goverment asked for. Let's remember that X is also prohibited in China, Russia, Venezuela and Turkiye (until recently). He did the right thing by not censoring those accounts - The wrong thing, however, is that he has the capability to do so. He's effectively God: He can choose what to show you, who can see it, when and how.
And it's not only Twitter: Facebook, Instagram, WhatsApp, TikTok - All can decide when to censor you, or how to engage-bait you.
Nostr solves this.
Nostr is a protocol for decentralized and censorship-resistant social media. It utilizes the Bitcoin Lightning Network, a fast and secure payment system built on top of Bitcoin, to facilitate micropayments directly between users. This eliminates the need for algorithms and subscriptions, empowering creators and promoting a more authentic online experience.
You can pay nostr creators per post. This is impossible in any platform that I am aware of. You can also pay to the lightning wallet linked to the npub (your nostr identity). So it is extremely easy to reward good posts.
Think of nostr like the next step in social media evolution, similar to how Wayland improved upon the X11 display server. There is nothing bad with Legacy Social Media, but Decentralization will win in the end. It's already happening. Most of the tech people I follow, George Hotz, Brewster Kahle (Internet Archive manager), Jack Dorsey (Twitter co-founder) are using decentralize alternatives constantly. Farcaster, Mastodon, Bluesky, Nostr, etc. - I'm particularly bullish on Nostr because:
- Mastodon and Bluesky save your identity in a single server. A single point of failure and censorship. This is bad.
- Farcaster runs on the Ethereum blockchain, which I don't like mostly because of their transaction validation mechanism, which is proof of stake (and why would social media need to run on a blockchain?).
Just as there are various email clients (Outlook, Gmail) built on the SMTP protocol, nostr allows for diverse applications like Primal, Iris, and Snort, each providing different experiences to their users. Be it an Instagram-like feed, a Twitter-style timeline, or a text-focused platform, nostr offers flexibility in how you consume and share content.
Nostr is censorship resistant. Your identity is spread across multiple relays (servers), making it incredibly difficult to delete your messages (they would have to delete your presence from every relay). This portability extends beyond social media – you can take your identity to apps like FountainFM and earn rewards (zaps) for listening to podcasts. There are many other interesting apps, you can even live stream and monetize through zap.stream, and allow viewers to directly tip content creators in satoshis (Bitcoin smallest unit).
I am super bullish on nostr and bitcoin but I do recognize that clients may be buggy and Bitcoin may be difficult to understand for non-tech people. This is why I'm promoting nostr so much on technical spaces on Twitter - because we need to keep building the protocol, relays and clients. We are responsible for its success. Not a centralized company.
It's super easy to start building nostr apps. I myself built a nostr client called Kapestr in Rust. It's ugly due to skill-issues (lol), but you can start pretty fast. Or maybe you can go primal client github repository and fork it. You can start learning nostr super easily. Maybe nostr.com or nostr.org are good places to start.
I recommend reading The Cypherpunk Manifesto, Broken Money by Lyn Alden and The Bitcoin Standard.
Bitcoin is the most secure blockchain. It uses PoW (Proof Of Work) as the consensus mechanism, there is no single point of control, and it has no CEO (neither does nostr). People I'm interested in, Victoria Villaruel, Nayib Bukele, Jordan Peterson and Elon Musk among others, have shown support to bitcoin. Which makes me happy, and also adds support to the case of Bitcoin.
Looking ahead I think the future is bright. Nostr will continue to improve, Many other projects like nostr will arise, Bitcoin will be used more and more, AI agents will transact in internet-native money, and stuff I can't even imagine.
The future is decentralized, secure, creator-driven and incentives will be the correct ones again.
-
@ 9ff58691:0bf6c134
2024-11-24 06:50:55Алла Крылова и Елена Попова представили свежий выпуск подкаста, в котором подробно разобрали интервью с Максимом Емельяновым — создателем инновационной платформы на базе искусственного интеллекта.
Эта технология обещает значительно улучшить состояние малого бизнеса как в России, так и за ее пределами.
Интересно, что Максим — уроженец Кургана, и именно здесь мы записали этот выпуск.
Не пропустите возможность узнать больше о том, как технологии могут изменить подход к ведению бизнеса! Слушайте наш новый выпуск и оставайтесь на волне современных трендов! 🚀✨
-
@ 7c765d40:bd121d84
2024-11-23 17:12:13The Bitcoin Journal: Weekly Wrap
You know it's been an interesting week in Bitcoin when we're talking about football stadiums filling with water and aunts potentially becoming uncles (more on that wild analogy later). Let's dive into this week's philosophical musings and mathematical meanderings in the world of Bitcoin.
Let's start with a mind-bending revelation: that $300 worth of bitcoin today could potentially be worth $300,000 in 2068. Speaking as someone who still has a gift card from 2015 gathering dust in a drawer somewhere, the real challenge isn't buying – it's remembering where you put your digital gold! Pro tip: Maybe don't store your seed phrase in the same place as those "I'll definitely use these someday" gift cards.
The week's posts took an interesting turn with a lesson in exponential growth, comparing Bitcoin adoption to a football stadium filling with water. After 45 minutes, it's only 7% full, but somehow manages to completely fill up in the last 5 minutes. Kind of like my coffee consumption during deadline week – starts slow, ends in a caffeinated tsunami.
A particularly sobering moment came when discussing UTXO management. Jor learned the hard way that ignoring UTXOs cost them 225,000 sats. That's like discovering those coins in your couch cushions are actually rare collectibles – except in reverse. Remember folks: what seems like pocket change today might be a down payment on a Mars condo tomorrow.
Pro Tip: If "UTXO management" sounds as appealing as dental surgery, start small. Use Sparrow wallet and pretend you're playing Tetris with your Bitcoin – the goal is to keep things neat and consolidated
We tackled the perpetual "what if" questions that plague bitcoin skeptics. As the great philosopher Don Cherry wisely noted, "If my aunt had nuts, she'd be my uncle." Sometimes the biggest risk isn't in taking action, but in sitting on the sidelines wondering "what if?"
Finally, we concluded with a deeper reflection on bitcoin as an intelligence test. It's not about raw IQ points – it's about understanding the value of proof of work and playing the long game. Think of it as planting a digital tree whose shade you might not sit under, but whose fruits might just change the world.
Quick Wisdom: Start stacking sats today, manage those UTXOs wisely, and remember – sometimes the smartest thing you can do is stop asking "what if" and start asking "why not?"
Personal Note: Reading through these posts, I can't help but notice they possess the same infectious enthusiasm as my grandfather had when he tried explaining why his vintage stamp collection would one day make us all millionaires. The difference? Bitcoin actually might.
Let’s keep stacking the sats so we can all live on the same block in Mars.
In addition to the Daily Bitcoin Journal, we have a live show on YouTube every morning at 9am EST! The show is called the Daily Bitcoin Journey and it’s focused on actionable and logical discussion for bitcoiners AND future bitcoiners!
You can find the show here on the 88 SATS Radio Channel! Consider stopping by sometime and join us in the live chat!
Jor 871644
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 0c469779:4b21d8b0
2024-11-23 17:10:04Todo que celebrar
- No recuerdo exactamente cómo me empezo a interesar el tema, el punto es que vi un lavado de cabeza inmenso que se hace a cada paisano en los países hispanoamericanos.
- Inclusive Residente tiene una canción llamada Latinoamérica, donde habla de todo lo que se robaron los españoles.
- La leyenda negra nos dice que España fue lo peor que le pudo pasar a la región.
-
La primera mentira es pensar que antes de España había paz: Los distintos imperios americanos esclavizaban a las poblaciones adyacentes. Los aztecas esclavizaban a las tribus mexicas, fue gracias a Hernán Cortés, quien consiguió la organización de estas tribus, que se pudo derrocar a Moctezuma y a los aztecas. Piénsese en eso, Hernán Cortés tenía un ejército de aproximadamente 550 soldados (siendo generosos), y por cada español había de 10 a 15 indígenas, principalmente de Tlaxcala, pero también de Huexotzinco, Cholula y Tepeyac. Los aztecas eran 200000. Una vez caído Tenochitlán, otra parte de la leyenda negra dice que España exterminó a los indígenas, lo cual es falso. Hernán Cortés cuidó de sus descendientes e incluso tuvo un hijo con una de las hijas de Moctezuma.
-
España fue el primer imperio que promulga una serie de leyes que humanizan al indígena. Recordemos siempre ponernos en el contexto histórico. El 27 de diciembre de 1512 se promulgan las leyes de Burgos, 35 ordenanzas que buscan proteger y humanizar al indígena americano.
Algunos principios de las Leyes de Burgos son: 1. Los indigenas eran hombres libres y dueños de sus tierras y casas. 2. Los Reyes Católicos eran señores de los indígenas por su compromiso evangelizador. 3. Los encomenderos debían examinar a los indígneas cada quincena para comprobar lo que habían aprendido. 4. Cada indio debia recibir un peso de oro al año para comprar ropa.
Además recordemos lo que dijo Isabel la Católica sobre los indígenas. En su lecho escribió:
No consientan ni den lugar que los indios reciban agravio alguno en sus personas y sus bienes, mas manden que sean bien y justamente tratados.
En 1542 el emperador Carlos V promulga Las Leyes Nuevas de Indias, para reformar el gobierno de las Indias y protoger a los indígenas.
Entre las principales características de las Leyes Nuevas de Indias se encuentran: 1. La supresión de la Institución de la Encomienda 2. La designación del virrey como protector de los indios 3. El respeto a las autoridades, costumbres y formas de vida indígenas 4. La prohibición de que los indigenas sostuvieran relaciones mercantiles con sus vecinos 5. La orden a los españoles que empleasen indios de impartir evangelización, darles buen trato, alimentos, vestido, casa, medico y sacerdote, y pagarles su trabajo en efectivo.
Es curioso resaltar que Las Leyes Nuevas de Indias fueron promovidas por Fray Bartalome de las Casas, quien hubiera mentido en algunos articulos suyos anteriores donde exageraba e inventaba malos tratos a indígenas. Estos artículos falsos fueron y son usados hasta el dia de hoy por la leyenda negra, en los principales libros de historia de las escuelas y colegios hispanoamericanos.
-
Los makás son una tribu indígena del nordeste argentino, quienes fueron desplazados a Paraguay y habitan actualmente zonas de Mariano Roque Alonso, cerca de la capital, Asunción. Quién trata mejor a los indígenas, el Paraguay o Argentina de hoy o el Imperio de ayer?
-
Durante el Imperio, el Virreinato del Rio de la Plata tuvo asentamientos de indígenas guaranies provomidos por los padres de la compañía de Jesús en las tierras conquistadas por España y Portugal. Ellos buscaban crear una sociedad con los beneficios de la sociedad cristiana, pero sin sus vicios. Enseñaban a los indígenas a leer, escribir, aritmética básica, técnicas de agricultura, construcción y artesanía. También aprendieron la lengua de los indígenas (gracias a esto tenemos el guaraní y otras lenguas en escrito, eran puramente orales), lo que facilitaba el trabajo del misionero. Cuando el Rey Carlos III expulsa a los Jesuitas de sus dominios en 1767, efectivizandose en Paraguay en 1768, supuso una gran pérdida para los pueblos originarios, principalmente por la protección, ya que los jesuitas protegían a los indígenas de los bandeirantes, grupos que eran contratados para cazar indígenas y esclavizarlos, o destruir quilombos (asentamientos de esclavos que se liberaban de la esclavitud). Los bandeirantes eran provenientes de zonas del interior de Brasil, y se les puede atribuir la expansión de Brasil más allá de los limites impuestos por el Tratado de Tordesillas.
-
Los movimientos independentistas hispanoamericanos eran auspiciados por fuerzas extranjeras. Las fuerzas de San Martín que cruzaron los Andes por Mendoza contaban con más de 5400 hombres, y se sabe que muchos eran de otras nacionalades. San Martín siempre tuvo afinidad por Inglaterra, pasó en Europa el resto de sus días luego de ser amenazado por el gobierno unitario. También se sabe que fue masón, lo que no se sabe es si conocía el Plan Maitland.
El Plan Maitland fue un proyecto desarrollado en 1800 por Thomas Maitland, originalmente titulado "Plan para capturar Buenos Aires y Chile, y luego emancipar Perú y Quito". Se concluyó que sería mendiante una expedición que cruzaría los Andes y atacaría desde el oeste, es decir, desde Chile, y luego avanzaria hacia el Perú. La estrategia era golpear el corazón del virreinato peruano, que era el bastión del poder en América del Sur.
Si San Martin conocía o no el Plan Maitland no se sabe. San Martin estuvo en Londres en 1811, donde se le pudo haber introducido el plan por miembros de la logia masónica Lautaro, fundada por Francisco de Miranda (secesionista hispanoamericano, primer presidente de Venezuela).
- Los antiguos súbditos no se sentían oprimidos por España. Los sentimientos de nación son inventos que ocurren luego de las independencias. Anteriormente todos eran españoles, católicos y súbditos del Rey. En Paraguay está la concepción errónea de que ganamos la independencia en 1811. Cuando lo que se hace en 1811 es cambiar el gobierno a la fuerza para asegurar la autonomía de la provincia del Paraguay, porque se pensaba que Bernardo de Velasco (gobernador de la provincia) quería entregarla al dominio portugués. En 1811 se sigue jurando lealtad al Rey. Además, recordemos quién fue Fulgencio Yegros. Alférez del ejército español, uno de los pocos militares de carrera. En 1801 integro la expedición al norte de Paraguay a reconquistar Coimbra de manos de los portugueses. En 1806, paritcipó en la defensa de Buenos Aires durante las invasiones inglesas. Ahi conoció a Fernando de la Mora, con quien formó amistad.
Principalmente la defensa de Buenos Aires solo se puede explicar si nos damos cuenta de que no existe tal cosa como nacionalidad paraguaya o argentina. Todos eramos espanoles. Hay muchos casos similares al de Fulgencio Yegros por toda la America Espanola.
-
Fulgencio Yegros fue ejecutado tras querer derrocar a Jose Gaspar Rodriguez de Francia, quien se declarara dictador supremo de la República del Paraguay, destacando la independencia por primera vez. En mi opinión uno de los grandes errores de Paraguay fue no haberse unido a las Provincias Unidas del Río de la Plata, eran tiempos tumultuosos y de levantamientos constantes.
-
El término latinoamericano no existió hasta luego de la independencia de Nueva España y la formación del Imperio Mexicano en un contexto de invasión de Francia a esas tierras.
-
Cómo se explica la riqueza que hubo en Cuba y Puerto Rico, quienes siguieron siendo provincias españolas hasta 1898, finalizada la guerra que empezó con una falsa bandera implantada por los Estados Unidos? Además, la población es altamente mestiza. Cuando España pierde la guerra, también entrega la posesión de las Islas Filipinas (en honor al Rey Felipe II) a los Estados Unidos. Los filipinos mantenían su idioma reigional y hablaban español. La moneda es el peso filipino hasta el día de hoy. Hoy en el tagalog y chabacano hay muchas similitudes con el castellano. Cuando Estados Unidos controla las islas, prohíbe la enseñanza del español, y forza la enseñanza del inglés. Actualmente muchos filipinos tienen apellidos de origen español y hablan inglés.
-
España formó las primeras universidades en América y tenía la biblioteca más grande de todo el continente en Perú.
-
Creo que es importante que sepamos la verdadera historia para entender mejor nuestro pasado. Creo que hay más cosas que nos unen que las que nos separan, creo que Nayib Bukele en la actualidad es capaz de reunificar Centroamérica y darle más peso a su reclamo conociendo la historia, aparte de las razones prácticas del día de hoy. Creo que la República del Paraguay no debería existir y deberíamos integrarnos a las Provincias Unidas del Río de la Plata (Argentina). Creo que debemos entender que fuimos victimas del divide et impera, y tenemos que formar una gran mancomunidad de naciones hispanas (como la Commonwealth) y tener objetivos que se adapten a lo que requerimos hoy: avances tecnológicos, investigación en todos los campos y un proyecto espacial en común.
-
Es extremadamente ridículo que seamos más de 19 países en un mismo continente, todos hablando el mismo idioma y teniendo la misma religión, separados y desinteresados de lo que le pase al otro.
-
Tenemos que apoyar los reclamos de nuestros hermanos: Los argentinos con las Islas Malvinas, los cubanos con Guantanamo, los españoles con Gibraltar y los venezonalos con el Esequibo.
-
Algo interesante que dijo el filósofo y médico Erasmus Darwin, abuelo del gran evolucionista Charles Darwin:
En mis viajes por el inabarcable imperio español, he quedado admirado de como los españoles tratan a los indios: como a semejantes, incluso formando familias mestizas y creando para ellas hospitales y universidades. He conocido alcaldes y obispos indígenas, y hasta militares, lo que redunda en la paz social, bienestar y felicidad general, que ya quisiéramos nosotros [los británicos] en los territorios que con tanto esfuerzo les vamos arrebatando. Parece que las nieblas londinenses nos nublan el corazón y el entendimiento, mientras que la calidad de la soleada España le hace ver y oír mejor a Dios. Sus señorías en Inglaterra deberían considerar la [falsamente imputada] política de despoblación y exterminio de España. Ya que a todas luces la fe y la inteligencia española están construyendo, no como nosotros un imperio de muerte, sino una sociedad civilizada que finalmente terminará por imponerse como por mandato divino. España es la sabia Grecia, la imperial Roma; Inglaterra el corsario turco».
Fuentes interesantes
- https://www.ellitoral.com.ar/corrientes/2022-8-14-1-0-0-desmitificando-a-san-martin-y-sus-relaciones-con-los-ingleses
- Imperiofobia y leyenda negra: Roma, Rusia, Estados Unidos y el Imperio Español de María Elvira Roca Barea
- Madre patria: Desmontando la leyenda negra desde Bartolomé de las Casas hasta el separatismo catalán
- Historia con Patricio Lons
- La Brújula
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8dc86882:9dc4ba5e
2024-11-23 17:01:19I’m not what some would call a creator. I don’t teach on any real topic, I’m not a person of interest, and I’m almost positive 99.99999999% of the people who see anything I write have a clue who I am.
I’m more of a babbler than anything, if that could be a thing. I spew forth words that may only have significance to me, maybe someone else in a rare case. But nonetheless I like to babble. I like to write my words down and put them out there in the internet ether.
Today for the first time, I’m doing this in long form from my phone. My god! the typos that are likely to be in here. But, why the hell not. It’s a test, to see if I can transpose these idle thoughts to the world while out and about with just my phone. So I sit here in the Kumon waiting room while my children begrudgingly do more math and lit than their actual school requires. It’s the torture of having an immigrant mother.
As you can see, I babbled my way to a fourth paragraph. How the bullshit can flow forth from my thumbs! For I am not a creator.
Cheers!
-
@ 5405e5fd:53eae835
2024-11-23 16:58:09Ever wondered about the origins of the iconic "Laser Eyes" meme in Bitcoin culture? Let’s dive into its fascinating history and significance.
While on the Criptoverso podcast, I wore a shirt with the phrase “Laser Eyes Until Fiat Dies.” When asked about its meaning, I explained it signifies unwavering commitment to Bitcoin. But there’s a deeper story behind this phrase—one that transformed a simple meme into a powerful symbol of unity and optimism for the Bitcoin community.
The Birth of “Laser Eyes”
In 2020, as Bitcoin Twitter gained momentum, a user with fewer than 300 followers found a creative outlet in making memes to connect with the growing community of Bitcoin enthusiasts, affectionately known as “Plebs.” Inspired by influential figures like American HODL—a Bitcoin maximalist known for his irreverent humor and critique of fraud—the user crafted memes to engage the community. One of his first creations, a sharp response to a Bitcoin critic, earned a retweet from American HODL. The recognition fueled his passion for meme creation, and he soon joined forces with other creators in a collaborative group known as the Meme Factory.
This “Meme Factory” became a hub for humor, creativity, and camaraderie, bolstering the Bitcoin community during market downturns. Their memes became rallying cries, reinforcing the shared identity of Bitcoiners as a “swarm of cyber wasps,” buzzing with energy and defiance.
The Rise of the Laser Eyes Campaign
By late 2020, the Meme Factory began organizing themed avatar campaigns, such as holiday-themed profile pictures, to foster unity. These efforts culminated in February 2021, as Bitcoin surged towards $50,000.
The “Laser Eyes” concept emerged when a member of the Meme Factory asked for help enhancing a meme by adding laser eyes to a kangaroo. Inspired, the creator designed laser-eyed avatars for the entire group. The idea quickly evolved into a full-blown campaign: #LaserRayUntil100K, a pledge for the community to sport laser eyes until Bitcoin reached $100,000.
When Bitcoin hit $50,000 on February 16, 2021, the Meme Factory launched the campaign. Within days, the meme exploded across the Bitcoin community, embraced by everyone from celebrities to politicians. The striking red laser eyes became a visual statement of belief in Bitcoin’s potential as a global store of value, a symbol of resistance against traditional fiat systems, and a nod to Satoshi Nakamoto’s revolutionary vision.
Beyond Memes: A Symbol of Commitment
The success of the “Laser Eyes” campaign highlighted the power of memes to unite a community, inject humor into volatility, and promote optimism amid criticism. For many, laser eyes transcended mere aesthetics; they became a badge of solidarity and a public declaration of commitment to Bitcoin.
What Happens When Bitcoin Hits $100K?
The big question remains: once Bitcoin crosses the $100,000 milestone, what’s next? The answer is simple.
“Laser Eyes Until Fiat Dies.”
The mission doesn’t end—it evolves. After all, Bitcoin isn’t just a currency; it’s a revolution.
https://image.nostr.build/38d2eaff0316ceff6860760963d150c5017a78691adc9d0d7128368ef653eddb.jpg https://image.nostr.build/1c404d665ff78ef7ed0da7c7f39e734713d665d03fee805773bb173a96f1e8d1.jpg https://image.nostr.build/82d64cc76f274623aacb350f4916fb28a0aaa22fce12efff91439618333896d0.jpg
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ f685c7b9:b1be053e
2024-11-23 16:20:54"Most people are mirrors, reflecting the moods and emotions of the times. Few are windows, bringing light to bear on the dark corners where troubles fester. The whole purpose of education is to turn mirrors into windows."
--Sydney J. Harris.
This quote really sticks with me, as I consider what it is I am doing here. I don't necessarily mean here as in SN, but more broadly speaking: here at 1am at my computer a bit over caffeinated and contemplating my place in the universe.
Now that was a bit melodramatic. But bear with me as I explain how it happened.
I went to a market tonight where there were local vendors peddling their wares. I don't usually bother, being somewhat of a misanthrope, but I dared ask a few if they accepted Bitcoin. I approached a couple with one of those clothing stands where they pay to put clever sayings on t-shirts, hats and pins.
"I do." A look askance. "Ha-Ha! Kidding. I used to have some."
What a dumbass. For such a stupid answer, I couldn't think of anything to respond. This is why I don't usually bother.
"It's up now, I guess."
"yea, I bought it when it was low, sold high," he said nonchalantly.
"Well I'm never selling."
"I wouldn't either," he laughed nervously.
What the hell? Well, I should have been able to judge position on the bell-curve from the nature of his business. I bumbled along to the next vendor.
"Do you accept Bitcoin?"
"Noooo," said she, A tall Russian woman selling gemstone jewelry. "I used to have some and then I sold it."
Two for two. Just then, I was beginning to lose hope. People just want me to think they were smart enough to buy it early on. "Well, why not?" I pressed on.
"Like all stocks, it's volatile."
"Actually, Bitcoin isn't a stock because it is not controlled by a company," I told her.
"Well, the thing is a company controls it, so that's why so many people lost theirs. There was that one, in China. What was it called..."
"Mt. Gox? That only happened because those people weren't smart with theirs. You can avoid that if you self-custody. Besides, you don't need to own any Bitcoin to accept it to do business. Look, I have this wallet. If you downloaded it you can generate an invoice, like this, and I'd send it to you practically for free. No banks, no exchanges involved."
I took enough of her time explaining how it works that I though the least I could do is buy a turquoise beaded bracelet. I paid with my debit card. Mirrors, reflecting whatever ideas and preconceptions they already had. Windows let in the light. Mirrors just show us own own reflection, sometimes darkened by the lies told us by fiat-truth-makers.
I much prefer to be surrounded by windows, then I can see the outstretched hills and green glades yawning near the horizon.
FR
-
@ 4d4fb5ff:1e821f47
2024-11-23 16:14:08You can almost feel the neon street lights behind you, teasing you with a wild night back where the city is still alive, but your eyes stay focused ahead, on the dark strip—the abandoned sprawl that lies on the way to the new shore.
You’re ready to get away from downtown because lately it seems like you can’t even hear your own thoughts anymore. Maybe when you get to the beach you’ll figure out who or what is blocking you from listening to your inner voice. But then again, maybe not.
All around you, sand and silt infiltrates the parking lots and the ground floors of otherwise sound buildings, stale bogs. The fine mud sticks to the soles of your boots, suctioning the pull of each step.
Small pools of water begin to interrupt your path at an increasing rate. It’s difficult to tell for certain, but they might be releasing faint light. Your eyes are only human, anyway. As you get closer to the shore, whatever hints of brightness you think you might be seeing in the puddles is drowned out by the brilliant intensity you’re here to witness, the view that can wipe everything away, the glowing surf.
The edge is quieter than you remember. Liquids fill the nooks and dips of the land without noise and in no rush. Then, folding over, they recede. In some places the broth mixes, though the colors remain true and somehow resist becoming a dull tar. In another place, a vibrating stream of pink forms a ribbon through electric yellow goop, refusing to assimilate.
The surf seems to both suffer from and be invigorated by a uniform phosphorescence. Likely the remnants of some tritium disaster from not too long ago, not too far away. The countless other isotopes saturating the gulf remain unseen, but you are well aware that the radiation has left real marks on the DNA of the creatures that cling to life below the surface.
A small crab rolls into an old soup can, neon markings on its belly like alien glyphs, its arms seeking something in an uncoordinated way. It’s choking on a thin, glitter-purple sheath of synthetic bacteria. You remember reading in the logs about these bacteria, designed illegally in some basement of the city a decade ago. A desperate bid to help clean up some of the mess. Not exactly a shame, maybe something worse.
Trash floats between broken parking blocks and twisted railing and many items keep their form. You recognize the outlines of beer bottles, a soccer ball and a refrigerator door. All of them painted over in bright streaks of color.
The end of a slow wave carries a newspaper leaf before you and it clings to one of your boots. It’s an antique. The surf works its best magic on paper, fortifying the cellulose with heavy metals and keeping the text and images preserved. It’s a bleeding page advertisement, pristine except for the color. A woman holding a toothbrush smiles up at you with lime green lips, a shock of tangerine hair and electric blue skin.
You realize how shallow your breaths have been up to this point and let the salty breeze enter your lungs with the rapidity its been asking for.
What would your father think of all this? If he were still around.
And that’s it. You feel you have your thoughts back. You exhale and advance into the glowing surf.
Now you’re ankle-deep and you bend over to scoop up a conch shell that’s the size of your fist. You push your hair aside and put it up to your ear.
No hollow wind, no airy breath of the sea. An unnatural silence. Almost like a glitch…
You use a keychain LED to help you to see inside of the conch shell. There’s a wire… something that you might be able to jack into your system.
You pad the outside of your vest with your palm, hoping you’re carrying the right adapter. The last time you connected to an unknown drive, you fried the adapter and your scanner was left wide open to hackers. You told yourself you’d learned your lesson. But did you really come all the way out here to stop taking risks?
You locate the right adapter under a mess of tangled wires and batteries in your pocket, still in its second-hand plastic bubble re-packaging. You bust it free and use it to plug into the conch shell.
A semi-transparent holographic window projects from inside the conch. The slow, thick waves behind it begin to appear almost volatile through the image.
The screen displays jumbled characters in a garbled list that doesn’t obey clean columns or rows. New text blazes forth, scrolling on its own as though consumed by some need to be seen but it’s much too fast for you to read.
It could be the remnants of a menu from a corrupted drive or maybe it’s something more exotic like dynamic encryption.
It stops and goes dark. Shit.
You check the adapter—it’s not obviously burnt. Still, you hate how you’re always taking unnecessary risks and for what—a random seashell?
Maybe there’s a hidden way to boot the data. What if your npub and key could unlock something good?
-
@ 31312140:2471509b
2024-11-23 15:50:43🎩 The Origins: Where Did It All Start?
The concept of central banking isn't new. It dates back to the establishment of the Bank of England in 1694, which set the precedent for modern central banks (Check out Bank of England's history for a deeper dive). These institutions were often created out of necessity - to handle war debts, stabilize economies, etc. But with great power comes… you guessed it, not-so-great intentions. 💰
💸 The Money Factory: Printing Out of Thin Air
Central banks have the magical ability to print money from thin air. Sound amazing? Well, it's alarming. This endless printing is explained under the guise of "monetary policy" to control the economy. But in reality, it's a method to fund government debts and inflate the money supply, which causes the value of your hard-earned money to dwindle. Poof! Your buying power is gone. Have a look at how federal reserve balance sheets have ballooned for evidence.
🔄 Fractional Reserve Banking: The Multiplication Illusion
If you're a banker, you'll love fractional reserve banking. It's like magic, where banks keep a fraction of deposits and lend out the rest, creating a multiplier effect. Imagine you deposit 100$, the bank holds just 10$ and lends out the other 90$. The person who took out that loan spends it and this 90$ end up on someone else's deposit. Rinse and repeat until your 100$ effectively created 1,000$ in the economy. This system fuels credit bubbles and ultimately leads to bank runs when too many people try to withdraw their money at once. Just ask those unfortunate souls during the Great Depression!
🔗 Chains of Debt: The Slavery of Nations
Central banks lend to governments, placing entire nations in debt. And who pays the price? You do, through taxes. Ironically, you’re not just paying off debts; you're also paying interest to these private banking cartels. It's a not-so-subtle form of modern-day slavery.
For a chilling summary, G. Edward Griffin’s “The Creature from Jekyll Island” is a must-read. It breaks down how banks engineer boom and bust cycles to control economies and populations.
🔓 The Escape Plan: Sound Money is Freedom
Enter Bitcoin. 🧡 The only currency immune to manipulation by any central entity, Bitcoin offers a decentralized escape route from the clutches of central banks. They can’t print more Bitcoin. They can’t inflate it. And they definitely can’t control it. It’s regulated by math and network consensus, not whimsical policy changes by bankers in fancy suits. Want to understand more? Check out “The Bitcoin Standard” by Saifedean Ammous.
🛡️ What Can You Do?
- Educate Yourself: Read, study, and converse with like-minded folks.
- Diversify: Consider holding assets that are outside the influence of central banks, like Bitcoin.
- Advocate for Change: Speak out, support political reform, and promote community awareness about the strengths of decentralized financial systems.
So, there you have it, folks! The maze is vast, but there’s light at the end of the tunnel if you’re willing to look into it. Knowledge is power, and it's time we reclaimed our financial freedom. 🤝
Feel free to dive deeper and challenge the narrative - every voice adds to the revolution!
lookintoit #bitcoin #fiat #freedom #finance #soundmoney #scam #inflation #money
-
@ a849beb6:b327e6d2
2024-11-23 15:03:47\ \ It was another historic week for both bitcoin and the Ten31 portfolio, as the world’s oldest, largest, most battle-tested cryptocurrency climbed to new all-time highs each day to close out the week just shy of the $100,000 mark. Along the way, bitcoin continued to accumulate institutional and regulatory wins, including the much-anticipated approval and launch of spot bitcoin ETF options and the appointment of several additional pro-bitcoin Presidential cabinet officials. The timing for this momentum was poetic, as this week marked the second anniversary of the pico-bottom of the 2022 bear market, a level that bitcoin has now hurdled to the tune of more than 6x despite the litany of bitcoin obituaries published at the time. The entirety of 2024 and especially the past month have further cemented our view that bitcoin is rapidly gaining a sense of legitimacy among institutions, fiduciaries, and governments, and we remain optimistic that this trend is set to accelerate even more into 2025.
Several Ten31 portfolio companies made exciting announcements this week that should serve to further entrench bitcoin’s institutional adoption. AnchorWatch, a first of its kind bitcoin insurance provider offering 1:1 coverage with its innovative use of bitcoin’s native properties, announced it has been designated a Lloyd’s of London Coverholder, giving the company unique, blue-chip status as it begins to write bitcoin insurance policies of up to $100 million per policy starting next month. Meanwhile, Battery Finance Founder and CEO Andrew Hohns appeared on CNBC to delve into the launch of Battery’s pioneering private credit strategy which fuses bitcoin and conventional tangible assets in a dual-collateralized structure that offers a compelling risk/return profile to both lenders and borrowers. Both companies are clearing a path for substantially greater bitcoin adoption in massive, untapped pools of capital, and Ten31 is proud to have served as lead investor for AnchorWatch’s Seed round and as exclusive capital partner for Battery.
As the world’s largest investor focused entirely on bitcoin, Ten31 has deployed nearly $150 million across two funds into more than 30 of the most promising and innovative companies in the ecosystem like AnchorWatch and Battery, and we expect 2025 to be the best year yet for both bitcoin and our portfolio. Ten31 will hold a first close for its third fund at the end of this year, and investors in that close will benefit from attractive incentives and a strong initial portfolio. Visit ten31.vc/funds to learn more and get in touch to discuss participating.\ \ Portfolio Company Spotlight
Primal is a first of its kind application for the Nostr protocol that combines a client, caching service, analytics tools, and more to address several unmet needs in the nascent Nostr ecosystem. Through the combination of its sleek client application and its caching service (built on a completely open source stack), Primal seeks to offer an end-user experience as smooth and easy as that of legacy social media platforms like Twitter and eventually many other applications, unlocking the vast potential of Nostr for the next billion people. Primal also offers an integrated wallet (powered by Strike BLACK) that substantially reduces onboarding and UX frictions for both Nostr and the lightning network while highlighting bitcoin’s unique power as internet-native, open-source money.
Selected Portfolio News
AnchorWatch announced it has achieved Llody’s Coverholder status, allowing the company to provide unique 1:1 bitcoin insurance offerings starting in December.\ \ Battery Finance Founder and CEO Andrew Hohns appeared on CNBC to delve into the company’s unique bitcoin-backed private credit strategy.
Primal launched version 2.0, a landmark update that adds a feed marketplace, robust advanced search capabilities, premium-tier offerings, and many more new features.
Debifi launched its new iOS app for Apple users seeking non-custodial bitcoin-collateralized loans.
Media
Strike Founder and CEO Jack Mallers joined Bloomberg TV to discuss the strong volumes the company has seen over the past year and the potential for a US bitcoin strategic reserve.
Primal Founder and CEO Miljan Braticevic joined The Bitcoin Podcast to discuss the rollout of Primal 2.0 and the future of Nostr.
Ten31 Managing Partner Marty Bent appeared on BlazeTV to discuss recent changes in the regulatory environment for bitcoin.
Zaprite published a customer testimonial video highlighting the popularity of its offerings across the bitcoin ecosystem.
Market Updates
Continuing its recent momentum, bitcoin reached another new all-time high this week, clocking in just below $100,000 on Friday. Bitcoin has now reached a market cap of nearly $2 trillion, putting it within 3% of the market caps of Amazon and Google.
After receiving SEC and CFTC approval over the past month, long-awaited options on spot bitcoin ETFs were fully approved and launched this week. These options should help further expand bitcoin’s institutional liquidity profile, with potentially significant implications for price action over time.
The new derivatives showed strong performance out of the gate, with volumes on options for BlackRock’s IBIT reaching nearly $2 billion on just the first day of trading despite surprisingly tight position limits for the vehicles.
Meanwhile, the underlying spot bitcoin ETF complex had yet another banner week, pulling in $3.4 billion in net inflows.
New reports suggested President-elect Donald Trump’s social media company is in advanced talks to acquire crypto trading platform Bakkt, potentially the latest indication of the incoming administration’s stance toward the broader “crypto” ecosystem.
On the macro front, US housing starts declined M/M again in October on persistently high mortgage rates and weather impacts. The metric remains well below pre-COVID levels.
Pockets of the US commercial real estate market remain challenged, as the CEO of large Florida developer Related indicated that developers need further rate cuts “badly” to maintain project viability.
US Manufacturing PMI increased slightly M/M, but has now been in contraction territory (<50) for well over two years.
The latest iteration of the University of Michigan’s popular consumer sentiment survey ticked up following this month’s election results, though so did five-year inflation expectations, which now sit comfortably north of 3%.
Regulatory Update
After weeks of speculation, the incoming Trump administration appointed hedge fund manager Scott Bessent to head up the US Treasury. Like many of Trump’s cabinet selections so far, Bessent has been a public advocate for bitcoin.
Trump also appointed Cantor Fitzgerald CEO Howard Lutnick – another outspoken bitcoin bull – as Secretary of the Commerce Department.
Meanwhile, the Trump team is reportedly considering creating a new “crypto czar” role to sit within the administration. While it’s unclear at this point what that role would entail, one report indicated that the administration’s broader “crypto council” is expected to move forward with plans for a strategic bitcoin reserve.
Various government lawyers suggested this week that the Trump administration is likely to be less aggressive in seeking adversarial enforcement actions against bitcoin and “crypto” in general, as regulatory bodies appear poised to shift resources and focus elsewhere.
Other updates from the regulatory apparatus were also directionally positive for bitcoin, most notably FDIC Chairman Martin Gruenberg’s confirmation that he plans to resign from his post at the end of President Biden’s term.
Many critics have alleged Gruenberg was an architect of “Operation Chokepoint 2.0,” which has created banking headwinds for bitcoin companies over the past several years, so a change of leadership at the department is likely yet another positive for the space.
SEC Chairman Gary Gensler also officially announced he plans to resign at the start of the new administration. Gensler has been the target of much ire from the broader “crypto” space, though we expect many projects outside bitcoin may continue to struggle with questions around the Howey Test.
Overseas, a Chinese court ruled that it is not illegal for individuals to hold cryptocurrency, even though the country is still ostensibly enforcing a ban on crypto transactions.
Noteworthy
The incoming CEO of Charles Schwab – which administers over $9 trillion in client assets – suggested the platform is preparing to “get into” spot bitcoin offerings and that he “feels silly” for having waited this long. As this attitude becomes more common among traditional finance players, we continue to believe that the number of acquirers coming to market for bitcoin infrastructure capabilities will far outstrip the number of available high quality assets.
BlackRock’s 2025 Thematic Outlook notes a “renewed sense of optimism” on bitcoin among the asset manager’s client base due to macro tailwinds and the improving regulatory environment. Elsewhere, BlackRock’s head of digital assets indicated the firm does not view bitcoin as a “risk-on” asset.
MicroStrategy, which was a sub-$1 billion market cap company less than five years ago, briefly breached a $100 billion equity value this week as it continues to aggressively acquire bitcoin. The company now holds nearly 350,000 bitcoin on its balance sheet.
Notably, Allianz SE, Germany’s largest insurer, spoke for 25% of MicroStrategy’s latest $3 billion convertible note offering this week, suggesting growing appetite for bitcoin proxy exposure among more restricted pools of capital.
The ongoing meltdown of fintech middleware provider Synapse has left tens of thousands of customers with nearly 100% deposit haircuts as hundreds of millions in funds remain missing, the latest unfortunate case study in the fragility of much of the US’s legacy banking stack.
Travel
-
BitcoinMENA, Dec 9-10
-
Nashville BitDevs, Dec 10
-
Austin BitDevs, Dec 19
-
-
@ 5d4b6c8d:8a1c1ee3
2024-11-23 14:17:35Recap
We almost made it through unscathed, but the Nets couldn't pull off the win over superstar-less 76ers. The Ewing Theory is very much in play with Joel Embiid.
The Warriors game came right down to the wire and was unreasonably close throughout.
The Rockets demonstrated why most of us picked them.
Easily the pick of the night was @supercyclone's Bulls. I thought he was a dead man walking with that pick, but that's why we play the games. Great pick!
The Wizards and Nuggets did their best to keep us from watching, with their horrific court designs.
Are the Bucks back on track or are the Pacers just that bad?
I'm glad I didn't take the Kings.
Prize: 50 kilosats!
@Carresan, you can zap your 5k to this post to buy back in.
originally posted at https://stacker.news/items/779825
-
@ e1d968f7:5d90f764
2024-11-23 14:11:32When you think about escorting, it’s easy to assume the schedule is flexible, spontaneous, or even carefree. But behind the scenes, the reality is much different. Scheduling is a delicate balance of managing time, energy, and expectations—not only for yourself but for your clients as well.
The Demand for Flexibility
As an escort, my schedule can change on a dime. One day might be filled with back-to-back bookings, while another might be quieter than expected. The need for flexibility is constant—clients might request last-minute appointments, or an unexpected situation could arise that requires rescheduling.
I’ve learned to adapt quickly. Whether it’s rearranging a booking or making time for unexpected breaks, flexibility is key to keeping everything running smoothly.
The Struggle for Personal Time
One of the hardest parts of scheduling is carving out time for yourself. With so many commitments to clients, I have to be intentional about scheduling personal time—time to rest, recharge, or pursue my own interests.
This is especially difficult when clients request late-night bookings or weekends, times that would otherwise be reserved for myself. It can feel like a juggling act, constantly negotiating between work and personal life.
Managing Expectations
Clients, like anyone, have expectations about timing. Some want a strict schedule, while others are more flexible. It’s essential to communicate clearly about availability and time constraints from the beginning to avoid misunderstandings.
- Setting Boundaries: I’ve learned to set firm boundaries about my working hours, making it clear when I’m available and when I’m not. I try to avoid overcommitting and ensure I have adequate time to recover between bookings.
- Client Flexibility: On the flip side, I’ve also learned to adjust my schedule if a client has an urgent request. Sometimes, accommodating a client’s last-minute need can lead to a long-term, loyal booking relationship.
The Power of Planning Ahead
The more I plan, the smoother my schedule runs. I try to avoid last-minute bookings, instead planning a few days in advance whenever possible. This gives me the opportunity to mentally and physically prepare for each client.
I use a calendar to keep track of bookings, personal time, and any other commitments. This planning is vital to ensure I’m not overwhelmed or double-booked, and it allows me to have a clearer view of what my day will look like.
The Unexpected
Despite all the planning, unexpected things still happen. A client might cancel, or a last-minute opportunity could pop up. Over time, I’ve learned not to stress too much about the unpredictability—life as an escort is rarely straightforward. It’s part of the job, and flexibility becomes just as important as organisation.
The Takeaway
Scheduling as an escort requires more than just flexibility—it’s about finding a rhythm, setting clear boundaries, and ensuring there’s room for personal time. It’s a balancing act that constantly evolves, but with the right planning and communication, I’ve learned to manage it effectively.
Tomorrow, I’ll dive into managing multiple clients and how I keep each encounter unique and tailored. Until then, remember: the key to success is not just being available, but also knowing when to say no and take time for yourself.
Rebecca x
-
@ 5af07946:98fca8c4
2024-11-23 13:57:24Astrology (Jyotish) is the long old ancestor of modern day cosmology. Most people think astrology's secret sauce is somehow foretelling the future - through broad set of predictions that may apply to almost anyone - in any situation.
In truth, it is a deep understanding of space and time. Effect of motion of massive celestial bodies, on our physical reality — our tiny box.
Effect of celestial motion on earthlings were apparent in changing weathers, and it had already found applications in agriculture - the subject of Parāśara's early investigation, but he found seasons impacted the moods. There was something in the extra-terrestrial that connected deep with the spirit of not only humans but animals too.
Astrology was considered the ultimate science for it warranted knowledge of all the "hundred skills". One could predict only if s/he knew everything that was there to know. Not only the hundred skills, it needed deep understanding of three potencies of knowledge - particularly Vishnu - the very source of manifestation. Armed with this ultimate spiritual science, Parāśara figured out how to predict expression of a specific trait in a newborn — with high degree of accuracy.
Even today, in India, a priest (Pandit) pictorially draws the state of heavenly bodies at the time of a childbirth — a cosmic birth-chart (Janmpatri). This document details the exact positions of seven main grahas (the sun, moon and five main planets), and twenty-seven stars Nakshtras. It also details the effect of the motion of this system on child's future. It is an important consideration (in many Hindu families) to determine the suitable marital match.
His epic book Brihat Parāśara Hora Shastra is considered the starting point of Astrology. An English translation of this epic work is embedded here below for reference .. and to test if #nostr could render web archive in long form notes !
-
@ 8dac122d:0fc98d37
2024-11-23 12:11:13Below are discount codes and holiday deals on various cold storage devices. Now is the perfect time to take custody of your own coins. If you know of any other deals not mentioned here, please leave them in the comments.
BITBOX Get 21% off on the “Black Friday Bundle” (includes BitBox02 hardware wallet; 1 Steelwallet w/automatic puncher; 3 Backup cards). https://shop.bitbox.swiss/de/products/bitbox-all-inclusive-bundle-29/?ref=gxouqmnm
COLDCARD Get 20% off most products https://store.coinkite.com/store
JADE Buy One Jade - Get Free Shipping https://store.blockstream.com/products/blockstream-jade-hardware-wallet
KEYSTONE Get 20% off Keystone Bundle Pack + Extra $10 OFF + Free Shipping. Now thru December 5th https://keyst.one/shop/products/keystone-bundle-pack
LEDGER Get $70 of Bitcoin with new Ledger. Now thru December 5th https://shop.ledger.com/pages/black-friday
PORTAL Hardware Wallet - Batch #2 https://store.twenty-two.xyz/products/portal-hardware-wallet
SEEDSIGNER Kits & Assembled Signers – EU/UK: GoBrrr, VULCAN, DIYNodes, BitcoinBrabant, Bitsaga – USA/Canada: BTC Hardware Solutions (by project leader/creator) – Brazil: StackBit – Australia: HansMade
TREZOR Get up to 70% off all Trezor products. https://trezor.io/store -50% Trezor Keep Metal 12-word -40% Trezor Model T -30% Trezor Model One -30% Trezor Model Safe 3
originally posted at https://stacker.news/items/779699
-
@ 21b41910:91f41a5e
2024-11-23 12:00:26Chef's notes
Based on assorted recipes and refined over time, this round of beef tastes great as a result of the sweet and savory marinade.
Details
- ⏲️ Prep time: 5 minutes (+ 1 day)
- 🍳 Cook time: 20 minutes
Ingredients
- 2 pounds lean beef (may be labeled as London Broil)
- 1/3 cup olive oil
- 1/4 cup soy sauce
- 1/4 cup malt vinegar
- 1/4 cup lemon juice
- 1 tbsp sweetener of choice (honey, molasses, syrup, 4 packets of duck sauce, etc)
- 2 tsp old bay seasoning
- 1 tsp garlic powder
- 1 tsp sea salt
- 1/2 tsp black pepper
Directions
- Day Before: Mix all ingredients except the beef in a bowl to form a marinade. Place the cut of beef in a gallon sized Ziploc bag. Pour marinade over beef, ensure fully covered. Remove any excess air from the bag and seal. Place back in refrigerator for up to 24 hours before cooking.
- Cooking: Bring beef out of refrigerator (still in bag), and allow to rise to room temperature (about 30-40 minutes). Preheat broiler for about 15 minutes (your oven will vary). Broil for about 7-8 minutes on one side, then flip over. Continue broiling for another 7-10 minutes until temperature reads 140°F. Remove from broiler and let rest for 10 minutes before slicing thinly.
-
@ 2d74600a:d6708a00
2024-11-23 11:52:09Antoine de Saint-Exupéry, noto principalmente per il suo capolavoro "Il piccolo principe", è un autore che ha saputo coniugare in modo unico la profondità del pensiero filosofico con la leggerezza e la bellezza della poetica. La sua opera si distingue per un approccio che trascende le convenzioni letterarie, creando un ponte tra vita e conoscenza, tra esperienza e riflessione. In questo articolo, esploreremo come il pensiero di Saint-Exupéry si configuri come un atto di creazione che abbraccia la complessità dell'esistenza umana.
Un Pensiero Filosofico e Poetico
Saint-Exupéry non si limita a descrivere il mondo moderno; lo analizza, lo interroga e lo trasforma in un oggetto di contemplazione. A differenza di molti dei suoi contemporanei, che si sentono sopraffatti dalle sfide e dalle contraddizioni del loro tempo, Saint-Exupéry si erge come un pensatore critico. La sua scrittura è intrisa di una filosofia che non si impone, ma si offre come un invito a riflettere. La sua capacità di fondere il pensiero filosofico con la poetica gli consente di esplorare temi complessi come l'amore, la solitudine, la ricerca di senso e la bellezza della vita.
La Creazione come Atto di Conoscenza
In Saint-Exupéry, la creazione non è solo un atto artistico, ma anche un processo di conoscenza. La sua scrittura diventa un mezzo attraverso il quale l'autore cerca di comprendere il mondo e il posto dell'uomo al suo interno. Questa operazione di conglobare vita e conoscenza si manifesta in una prosa che è al contempo semplice e profonda, capace di toccare le corde più intime dell'animo umano. Le sue storie, pur nella loro apparente leggerezza, sono cariche di significato e invitano il lettore a riflettere sulla propria esistenza.
Un Dialogo con i Filosofi
Saint-Exupéry si colloca spesso al livello intellettuale dei più influenti filosofi del suo tempo. La sua capacità di affrontare questioni esistenziali e morali con una lucidità e una sensibilità uniche lo rende un interlocutore privilegiato nel panorama filosofico del XX secolo. La sua opera invita a una riflessione profonda, stimolando il lettore a interrogarsi su temi universali come la libertà, la responsabilità e la ricerca di verità. In questo senso, il suo pensiero si fa ponte tra la filosofia e la poesia, creando un dialogo fecondo tra le due discipline.
L'Universo del Sensibile e dell'Intellegibile
Un aspetto distintivo del pensiero di Saint-Exupéry è la sua capacità di penetrare in un universo in cui il sensibile eccede l'intellegibile. Le sue descrizioni poetiche della natura, delle relazioni umane e delle esperienze quotidiane si intrecciano con riflessioni più profonde, creando un tessuto narrativo ricco e stratificato. Questa fusione di sensazioni e pensieri consente al lettore di vivere un'esperienza totale, in cui la bellezza del mondo si rivela attraverso la lente della filosofia.
Conclusione
Il pensiero di Antoine de Saint-Exupéry rappresenta un esempio straordinario di come la filosofia e la poetica possano coesistere e arricchirsi reciprocamente. La sua capacità di affrontare le complessità della vita umana con una sensibilità unica lo colloca tra i grandi pensatori e poeti del XX secolo. Attraverso la sua opera, Saint-Exupéry ci invita a riflettere, a sognare e a cercare un significato più profondo nell'esistenza, rendendo la sua scrittura un atto di creazione che continua a ispirare generazioni di lettori.
-
@ 6316050a:a5e43cbe
2024-11-23 23:37:33Me apuro a responder: Bitcoin resuelve problemas importantes![^5]
Desde el punto de vista de las reservas de valor bitcoin es comparado con el oro. Y desde sus comienzos se los vincula. Existen los mineros, los nuevos bitcoins sólo se obtienen a través del proceso de minado. Generar nuevos bitcoins es costoso en energía, como lo es minar oro. Bitcoin y oro se asemejan en su escasez, y en su promesa de finitud futura o baja dilución, por aumento de la cantidad. ¿Pero necesitamos más reservas de valor? Si tienen mejores propiedades que las ya existentes, sí! ¿Es bitcoin mejor que el oro? ¿En qué aspectos? En este artículo, me propongo discutir dos aspectos en los que bitcoin es mejor que el oro y también comentar sobre cómo puede lidiarse con su volatilidad.
Bitcoin vs. Oro
Cuando empecé a estudiar bitcoin me inquietaba una diferencia con el oro. El oro consume muchísima energía para su minado y es altamente contaminante. Bitcoin necesita grandes cantidades de electricidad, pero se pueden usar energías varadas (el gas venteado en pozos de petróleo, por ejemplo), energías renovables o energía nuclear (sin emisión de CO2). Sin embargo, en una primera mirada, el oro una vez minado, purificado y validado no consume más energía. La red bitcoin necesitará siempre importantes cantidades de energía para garantizar la inmutabilidad de las transacciones y las integridad de las billeteras. Pero viéndolo un poco mejor esto no es tan así. El oro consume muchísima energía en situaciones importantes, en que la red Bitcoin resuelve con la misma energía que utiliza para mantener su inmutabilidad. Veamos:
- El oro es difícil, lento y caro de transportar. Es pesadísimo. Requiere de una estructura de seguridad muy fuerte para su transporte. Eso implica que transportar oro en cantidades significativas es muy lento y caro.
- Por lo mismo del punto anterior, el oro es difícil de custodiar de forma segura, tanto para familias, como para grandes instituciones.
- El oro es caro de validar. Confirmar de manera fehaciente y sin depender de terceros que el oro tiene una pureza dada, y que no está mezclado con otros materiales, como el tungsteno, también es costoso y requiere de métodos sofisticados.
- El oro es en muchos países difícil de conseguir a un precio justo o en un mercado que no tenga sesgos [^1]
Bitcoin en cambio, con la misma energía con que mantiene la red, también suma las siguientes propiedades:
- Es relativamente barato y fácil de autocustodiar. Con billeteras multisig se puede custodiar de manera muy segura. Esto también abre la posibilidad de custodia compartida entre instituciones, amigos o comunidades.
- Es relativamente barato de transferir y el costo de la transferencia no sube con el monto del bitcoin transferido. Esta transferencia se refiere no sólo a acordar el monto y disponer un pago, sino también a la liquidación de la operación (setlement). Se necesitan entre 10 y 60 minutos para realizar una liquidación de bitcoin entre dos puntos cualquiera del planeta, que tengan acceso a internet.
- Podemos movernos por el mundo con el bitcoin (porque no se mueve!), acceder a él desde donde queramos y cambiarlo por USD o la moneda local en casi cualquier lado. Bitcoin es extremandamente "salable" en su desarrollo actual. Es decir, en muchísimos lugares del mundo es aceptado y puede cambiarse por divisas o la moneda local.
Entonces, Bitcoin resuelve o mejora muchas limitaciones que tiene el oro. El tema de la liquidación es muy importante, porque el tiempo de liquidación de las transacciones provocó que el oro necesite participación de terceros para cerrar una operación. Esa diferencia de velocidad entre el arreglo de una operación y su liquidación, como menciona muy frecuentemente Lyn Alden[^2], fue quizás crítica para la caída del patrón oro. Este se termina abandonando en 1971, con el famoso discurso de Nixon, diciendo que el dólar dejaría de ser redimible por oro.
Bitcoin representa una democratización de las reservas de valor
En una barriada de América del sur, África, Asia o en cualquier otro lugar del mundo, una persona tiene la posibilidad de comprar bitcoin, solamente por contar con acceso a internet en el teléfono. Esto es realmente impresionante porque permite el acceso a una reserva de valor a personas, familias o comunidades con muy poca inclusión financiera. Una persona sin cuenta bancaria, sin tarjeta de crédito o incluso sin trabajo en blanco, puede acceder a bitcoin, de todas formas. Recordemos que una reserva de valor es un activo que permite conservar o incluso aumnetar el poder de compra a tiempos largos[^6]. Por supuesto que Bitcoin no resuelve todos los problemas sociales o económicos de las personas o países, pero amplia de manera notable el acceso a reservas de valor. Esto es de particular importancia para gente lejos de los centros financieros mundiales, de las rutas comerciales más importantes o en países con problemas recurrentes en sus monedas. Una pequeña mutual o cooperativa de agricultores, artesanos o trabajadores pueden establecer una manera confiable y segura para conservar los ahorros de la comunidad a largo plazo. Debe tenerse en cuenta que bitcoin, por ahora, es una activo muy volátil a tiempos cortos (meses). Sin embargo puede diversificarse con otras monedas menos volátiles en el corto plazo, para ir armando un ahorro que conserve el poder de compra en el tiempo. Veamos cómo.
¿Cómo lidiar con la volatilidad de Bitcoin?
Para terminar veamos un ejemplo importante de cómo sobrellevar la volatilidad de bitcoin en el corto plazo. Bitcoin es un activo que tiene un crecimiento promedio de 140% anual (2011-2024), pero puede tener caídas de 50% y hasta 80% en el corto plazo.
Esto puede resultar muy problemático para personas o grupos que no tienen una cantidad de dinero que puedan guardar por mucho tiempo. Cuanto más tiempo se guarde bitcoin, más chance hay de aprovechar su capacidad de aumentar el poder de compra en el futuro. El gráfico que sigue[^3] muestra varios activos. El eje horizontal indica las caídas máximas en el período en que se lo grafica y el eje vertical marca una medida del retorno o ganancia anual. En lo que respecta a bitcoin, nos importan los dos puntos naranjas. El punto naranja de arriba a la derecha es para alguien que haya puesto el 100% de sus ahorros en bitcoin. Como se ve, tuvo el mayor retorno de la gráfica, pero sufrió en algun momento la pérdida del 80% de su valor. Antes de ver el otro punto naranja (el que está en la zona cercana al eje y), veamos los puntos azules. Los puntos azules tienen relativamente bajo retorno anual, pero sus caidas máximas también son muy chicas. De izquierda derecha, los puntos azules representan: bonos del tesoro de USA a 10 años, Oro y el índice SP500 en el período de tiempo 1971-2023. Los bonos son los activos con menos riesgo y su bajada máxima fue menor al 10%. Tomemóslo como la referencia del activo de menos riesgo. Y acá viene lo interesante: el punto naranja que está arriba de ese primer punto azul. Ese punto representa una cartera de ahorros compuesta por 90% de dólares en efectivo (billetes o depósitos en una cuenta bancaria) y un 10% de bitcoin. Esa estrategia tiene el mismo nivel de caída máxima que los bonos del tesoro, pero un retorno al menos 3 veces mayor! Es decir, tiene un muy alto retorno ajustado por riesgo. Poner un porcentaje pequeño (entre 1 y 10% de los ahorros) en bitcoin ha permitido en los últimos años obtener un retorno interesante a relativamente bajo riesgo[^4]. De esta forma puede aprovecharse bitcoin para conservar el poder de compra y menguar las dificultades de su volatilidad de corto plazo.
[^1]: Haciendo un relevamiento no exhaustivo en Buenos Aires (Argentina) , el oro físico tiene un precio de entre 10% y 12% más caro en USD que el oro spot que cotiza en NYSE (XAU). [^2]: Lyn Alden, Broken Money, Timestamp Press (2023) [^3]: Tweet de plan B [^4]: Ni este concepto ni nada de este artículo, representa una recomendación de compra. Los lectores deben hacer un estudio por su cuenta y tomar decisiones en base a su propia evaluación de su situación y nivel de riesgo aceptable. [^5]: Escribo en español porque considero que no hay tanta información accesible en nuestro idioma. Quisiera que llegue esta información a la mayor parte posible de latinoamericanos. Además, en nostr es notablemente baja la cantidad de contenido en español. English: I am writing articles in spanish because I think that there is no much information accesible to Latin-american people. [^6]: Escribimos algo en este artículo
-
@ 705605d9:b4324038
2024-11-23 21:19:00Жители Горноправдинска, одного из ведущих производителей молочной продукции в стране и известного своими экологическими инициативами, ярко отметили День Масла – праздник, не имеющий аналогов в других регионах. Этот ежегодный фестиваль, прочно укоренившийся в культуре посëлка, отражает уникальное сочетание традиций и современных достижений в области молочной промышленности.
В этом году праздник прошёл под девизом «Вкус будущего – экологически чистый!». Главная площадь превратилась в огромный гастрономический рай, где представители лучших молочных ферм предлагали дегустацию своих продуктов: от классического молока и йогуртов до эксклюзивных сыров с необычными вкусовыми нотками. Все продукты были выращены и произведены с использованием экологически чистых технологий, что является визитной карточкой Горноправдинска.
Помимо гастрономических радостей, гости фестиваля смогли посетить интерактивные выставки, посвященные современным методам молочного производства и охране окружающей среды. Дети участвовали в весёлых конкурсах и мастер-классах, темы которых были связаны с экологией и здоровым питанием.
Вечером праздник завершился ярким концертом и феерическим салютом из экологически чистых фейерверков.
"День Масла — это не только вкусный праздник, но и отличная возможность продемонстрировать достижения Горноправдинска в области экологически чистого производства, — сказала глава администрации. – Мы гордимся своим уникальным праздником и стремимся к тому, чтобы он год от года становился еще более ярким и запоминающимся".
День Масла в Горноправдинске — это яркий пример того, как можно сочетать традиции и современные технологии для создания уникального и запоминающегося праздника.
-
@ 4245a358:1ec24f29
2024-11-23 20:08:14Join us in our Beach Clean Up campaign with the Youth In Technology community! 🌊✨ By participating, you’re helping to achieve SDG 14: Life Below Water. Together, we can protect marine ecosystems and create a cleaner, healthier environment for all. Let’s unite for a sustainable future
This Sunday on 17th November 2024, YIT Community in collaboration with @sprint_leo and @chuoapp are hosting Beach Clean Up Campaign! #YouthInTech #YIT #BeachCleanup #SDG14”
-
@ 599f67f7:21fb3ea9
2024-11-23 11:13:57En los dos capítulos anteriores aprendimos cómo dos pares pueden enviar fondos entre sí en un canal actualizando el estado e invalidando estados antiguos. En este capítulo, daremos una visión general de cómo los HTLC permiten pagos de múltiples saltos. El próximo capítulo será una inmersión profunda en los HTLC.
¡Vamos a ello con un ejemplo simple!
Red simple de 3 nodos y 2 saltos
En esta red simple, tenemos tres nodos: Alice, Bob y Charlie. Hay dos canales entre ellos: uno entre Alice y Bob y otro entre Bob y Charlie. Cada canal tiene una capacidad de 10 BTC distribuida equitativamente entre los participantes.
Para simplificar, solo mostramos una transacción de compromiso que gasta de la transacción de financiación, determinando así el estado del canal. Esto no es exactamente preciso, ya que aprendimos sobre compromisos asimétricos en el último capítulo, pero para los propósitos de entender los HTLC, esta simplificación será más fácil. Una descripción más precisa se dará en un capítulo posterior.
Ahora, supongamos que Alice quiere pagar a Charlie. No puede pagarle directamente ya que no tienen un canal entre ellos y es costoso (en términos de tiempo y dinero) abrir un canal solo para una transacción rápida. En su lugar, Alice puede usar su canal con Bob para enrutar un pago a Charlie, ya que Bob y Charlie comparten un canal.
Paso 1: Generar y compartir un hash de pre-imagen
Alice primero necesita decirle a Charlie que quiere pagarle. Charlie generará un secreto aleatorio (la pre-imagen)
S
y obtendrá el hash deS
, que llamaremosH
. Charlie envíaH
a Alice.Paso 2: Configurar la cadena de HTLC
Supongamos que Alice quiere pagar a Charlie 1 BTC. Primero necesita encontrar una ruta hacia Charlie. En este caso es A-B-C. También ve que para usar esta ruta, necesita incentivar a Bob para que la ayude dándole una tarifa de enrutamiento. Supongamos que Bob cobra una tarifa fija de 1 BTC por enrutar pagos, por lo que Alice pagará un total de 2 BTC: 1 BTC por el enrutamiento y 1 BTC por Charlie. Alice luego le indica a Bob que le gustaría enrutar un pago sugiriendo que actualicen su estado de canal. En este ejemplo simplificado, la transacción de compromiso del canal tendrá las siguientes salidas (recuerda que en realidad Alice y Bob tendrán sus propias transacciones de compromiso):
- Una salida de 3 BTC de vuelta a Alice.
- Una salida de 5 BTC a Bob.
- Una salida de 2 BTC a un script especial que tiene 2 posibles caminos de gasto:
- El primer camino puede ser gastado por Bob si tiene la pre-imagen de
H
- El segundo camino puede ser gastado por Alice después de un tiempo absoluto
cltv_expiry_AB
- El primer camino puede ser gastado por Bob si tiene la pre-imagen de
Esta última salida con un script especial que bloquea los 2 BTC se llama un Contrato de Bloqueo de Hash y de Tiempo (Hash Time Locked Contract; HTLC) porque tiene un camino bloqueado por hash y un camino bloqueado por tiempo.
Bob actualizará felizmente a este nuevo estado de canal porque puede ver que no está perdiendo dinero: si la transacción se lleva a cabo en la cadena y aún no tiene la pre-imagen, entonces aún recupera sus fondos originales. También puede ver que si coopera y reenvía el pago, será recompensado con una tarifa de enrutamiento si el pago tiene éxito porque podrá reclamar la salida bloqueada por hash en la transacción.
Bob ahora bloquea algunos fondos de manera similar en su canal con Charlie. Actualiza la transacción de compromiso del canal para incluir las siguientes salidas:
- Una salida de 4 BTC a Bob
- Una salida de 5 BTC a Charlie
- Una salida de 1 BTC a un script HTLC que nuevamente tiene dos caminos de gasto:
- El primer camino es gastable por Charlie si puede revelar la pre-imagen de
H
- El segundo camino es gastable por Bob después de un
cltv_expiry_BC
- El primer camino es gastable por Charlie si puede revelar la pre-imagen de
Bob puede bloquear sus fondos de esta manera con confianza porque sabe que si el pago falla, podrá reclamar sus fondos a través del camino bloqueado por tiempo y si el pago tiene éxito y Charlie revela la pre-imagen cuando gasta a través del camino bloqueado por hash, entonces Bob verá esta pre-imagen y podrá reclamar la salida bloqueada por hash en el HTLC de la transacción de compromiso que tiene con Alice.
Cuando Charlie recibe esta oferta de HTLC de Bob, puede ver que de hecho conoce la pre-imagen
S
que se hash aH
, por lo que sabe que puede reclamar el camino bloqueado por hash de la salida HTLC de la transacción de compromiso si se lleva a cabo en la cadena. Sin embargo, idealmente, las cosas no tienen que resolverse en la cadena. En su lugar, Charlie simplemente envía la pre-imagenS
a Bob. Esto le prueba a Bob que Charlie reclamaría la salida HTLC si se llevara a cabo en la cadena y así ahora Bob y Charlie pueden acordar simplemente actualizar su transacción de compromiso para reflejar que Charlie ahora tiene 1 BTC más:Ahora que Bob tiene la pre-imagen
S
, puede dar la vuelta y revelarS
a Alice, probando que si su transacción de compromiso se lleva a cabo en la cadena, Bob reclamaría la salida bloqueada por hash. Así como Bob y Charlie hicieron en su canal, Alice y Bob actualizan su transacción de compromiso eliminando la salida HTLC para reflejar el nuevo saldo de fondos:Alice envió a Charlie 1 BTC y Bob ganó 1 BTC en tarifas de enrutamiento.
cltv_expiry
¿Qué pasa si las cosas salen mal? Por ejemplo, Charlie se desconecta y no responde a Bob con una pre-imagen. Si esto sucede, Bob necesitará transmitir la transacción de compromiso para que pueda reclamar sus fondos a través del camino bloqueado por tiempo del HTLC. Si transmite la transacción pero luego Charlie vuelve a estar en línea antes del
cltv_expiry_BC
y gasta a través del camino bloqueado por hash del HTLC, entonces Bob verá la pre-imagen en la cadena y podrá dar la vuelta a Alice y revelarle la pre-imagen como de costumbre.A partir de este ejemplo, puedes ver que es importante que los valores de
cltv_expiry
disminuyan a lo largo del camino del remitente al receptor. Esto se debe a que en el peor de los casos, Charlie solo revelaS
a Bob justo antes decltv_expiry_BC
y luego Bob aún necesita tiempo para ir a Alice y revelarS
antes de que ella pueda gastar a lo largo del caminocltv_expiry_AB
. En otras palabras,cltv_expiry_BC
debe ser antes decltv_expiry_AB
.Revisión
- Contrato de Bloqueo de Hash y de Tiempo (Hash Time Locked Contract; HTLC): Un script de salida especial en la transacción de compromiso que tiene un camino bloqueado por hash y un camino bloqueado por tiempo
- Pre-imagen: un secreto aleatorio utilizado para reclamar pagos
- Hash (de la pre-imagen): el hash de la preimagen utilizada para bloquear fondos a lo largo de una ruta de pago
- Verificación de tiempo de bloqueo (Check Locktime Verify; CLTV): El bloqueo de tiempo absoluto utilizado en los HTLC que debe disminuir a lo largo de la ruta de pago del remitente al receptor
Referencias
- BOLT2: Peer Protocol
- BOLT3: Transactions
- LN Things Part 4: HTLC Overview por nostr:nprofile1qqswrt9pnxatlplu49h6meld8svmwqt87wwvk256rqk07n6eu4qeh5gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dszpfjtz
- Time locks
-
@ 592295cf:413a0db9
2024-11-23 08:55:40November 18th week
Let's proceed step by step, calm and reason.
Bluesky is only 5 doubles from Twitter, now has its own network effect.
Article of Hodlbod. The state of the art of Key management
nostr:nevent1qqsgpckkyck5m58gux5xst03ls68xxfz0ep2ndws6s039492vxvtc7spp4mhxue69uhkummn9ekx7mqprdmhxue69uhksmmyd33x7epwvdhhyctrd3jjuar0dak8xq3qjlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qcxhke2
The problem is how a user creates an account. Will fix It.
If you have a signer account like Amber, nsec app, all right, then it says remove all logins And ask the user how he wants to login.
Bluesky is an anti Trump and Elon Musk movement. It started with Brazil the significant exodus, the thing had a certain amount of stability and began to arrive a lot of people. So it's a sort of political party hanging against.
Nostr is still made by fixed stars, there are many stars but they are still firm in the sky.
Rod made n8n ocKnamo bot
nostr:nevent1qvzqqqqqqypzqx760c0h894a5tg7lxgr8k506twrv2qs0yxln0nz7kgs8zae03xeqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qg4waehxw309ahx7um5wghx77r5wghxgetk9uqzqjgxwlfdru3zzcee0sxk8d0dddwj4tu3xp00gwahy2t0n5k2se6uu8p7fk
This is interesting, ocknamo Is a rock, keep pushing
Roadmap are bullshit, you spend the time to the the actual things, sure if a groups ok
I read Hodlbod's spech in practice with the tilde wants to create rooms, then there is the space that is the carcass we are very close to what is Unanimity, but it's fine with much more refining, but at the cost of being unique.
Discord vs Telegram
I downloaded three Nostr apps, I called it Atlas instead of Olas, zapstore and flotilla (removing Coracle).
Olas would be nice if he had the feature awards on the photo and Zap 😉.
Zap store continues to mark me an update of minibits, but minibits updates in the app, I also updated to a new version, however maybe it is a different type of app. Putting the key does not seem to have changed a comma the app. But then I realized it's about the app signers. The signers who followed the signers that are in your WoT, the signers that are in your lists 😉. It does not divide Nostr apps from Nostr, but it works.
Olas there is no focus on the media server, maybe if you have a new account it's all explained. Problems with dark mode and filter. I would like the idea of switching videos and pictures, can be something you can do in the settings
photos (home) video (other button) And maybe there's a flip button 😅 So Instagram becomes tik tok. The focus must be in creating content. Ok. Olas allows you to upload only images for the moment and shorts from other Nostr apps. For some reason, I don't hear video audio, maybe some permission to give.
Flotilla, if you connect with nsec.app creates a Nostr connect token from flotilla and enter it in nsec.app, asks for permissions and lists them and goes.
With this test account, I don't follow anyone using it to feed on Coracle. The app also suggests people to contact. There is also a space for personal notes. Then there are spaces. And it basically shows you the Relays and here the situation is a little confused. Although I know that there is a space/group called flotilla I am not able to find it, maybe you need the invitation code that is in the link. Also copying it I couldn't enter but the approach is that I think. flotilla link This was the link.
Maybe Hodlbod takes a step back and joins Unanimity. I don't think a step back is a possibility.
Maybe there are updates and they make a specific base workflow Relays based group and then the various branches NIP-29 chachi and 0xchat and the others (Telegram group) Flotilla (discord) It seems like there is a reconciliation at least to converge everyone 😉 "shallow reply hierarchies"
Kohei is also mentioned 🤙 NFC card article An interesting article
nostr:naddr1qvzqqqr4gupzqx760c0h894a5tg7lxgr8k506twrv2qs0yxln0nz7kgs8zae03xeqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qg3waehxw309ahx7um5wgh8w6twv5hsqzr9v3jx2wpn8qmsz4edqe
Marketplace on Nostr Help to test yojimble
nostr:nevent1qvzqqqqqqypzphn4avwh5e38spagmlc0kvmulnccnelf479tvg5ldz8kv3cscvq5qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qpqw7f0ja820er7d2jfa4vq9upelw88ejha6hcvj5gxt7gqnz646r8ql2a2cp
That's all!!
-
@ 4fcac000:d2b37988
2024-11-23 18:02:21В 2040 году Тюмень является примером для многих городов, внедряя инновационные экологичные решения в транспортной сфере. Давайте взглянем на то, как выглядят наши дороги и общественный транспорт сегодня!
🚅 Скоростные электропоезда: Забудьте о пробках! Мы наслаждаемся комфортом поездок на скоростных электропоездах, которые соединяют Тюмень с соседними регионами. Они работают на возобновляемых источниках энергии, делая наши путешествия быстрыми и экологичными.
🛴 Электроскутеры и электровелосипеды: На улицах Тюмени повсеместно можно увидеть электроскутеры и электровелосипеды. Эти удобные и экологически чистые средства передвижения позволяют быстро и легко добраться до разных уголков города, особенно в условиях городского плотного трафика.
🚌 Автобусы на водороде: Наша система общественного транспорта пополнилась водородными автобусами, которые не только снижают уровень выбросов в атмосферу, но и обеспечивают тишину во время движения. Комфортные салоны с панорамными окнами делают каждую поездку незабываемой.
🏙 Умные транспортные приложения: Умные технологии дают возможность каждому жителю Тюмени планировать свои поездки, следить за движением транспорта и оформлять билеты всего в несколько кликов. Все это для вашего удобства и экономии времени!
💚 Зеленая инфраструктура: Мы видим также внедрение зелёных зон, велодорожек и пешеходных улиц. Это не только улучшает экологическую ситуацию, но и способствует активному образу жизни горожан.
Тюмень будущего – это город, где комфорт, безопасность и экология идут рука об руку. Мы гордимся тем, что движемся вперед к устойчивому будущему вместе! 🌱✨
Тюмень2040 #ТранспортБудущего #Экология #Комфорт #УстойчивоеБудущее
-
@ a012dc82:6458a70d
2024-11-23 08:04:48Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
If you want to invest in the cryptocurrency market, you have many options, including Bitcoin, Ethereum, and several altcoins. But there are also backdoors into the cryptosphere that may be used to learn more. If you want to invest in cryptocurrency but don't want to actually purchase any, here's what you need to know:
KEY TAKEAWAYS
-
Investing in cryptocurrency presents some new and unusual challenges.
-
Due to the high degree of volatility associated with cryptocurrency investments, some people opt to put their money into more tried and true investment vehicles instead.
-
Many mutual funds and stocks are available that are tied to the bitcoin industry, allowing you to indirectly participate in the market.
What Is Indirect Crypto Investing?
You may still get cryptocurrency without signing up for a cryptocurrency exchange account. Indirect bitcoin investments allow you to acquire exposure to the market without actually purchasing any cryptocurrency. Stocks, mutual funds, and exchange-traded funds are some examples of the conventional investment vehicles that are used for indirect investing (ETFs).
There are, once again, both benefits and drawbacks to think about, such as safety, costs, and the possibility of losses. You should think carefully about whether or not an indirect investment is worth it to you when considering whether or not to acquire cryptocurrencies via a third party.
Crypto ETFs and Mutual Funds
The first alternative to acquiring cryptocurrency outright is via investment funds. Grayscale Bitcoin Trust is one of the first significant participants in this offering (GBTC). It has some of the same features as an ETF but is treated quite differently under the law. But if you invest in GBTC via your brokerage account, you'll get the same outcome as if you bought a Bitcoin fund. The value of the investment will rise and fall in tandem with the fluctuating Bitcoin market.
The high expenditure ratio of 2% is a significant drawback of grayscale. Simply put, they add 2% to the purchase price of Bitcoin to cover the cost of keeping it in a wallet under your name. Avoid the 2% maintenance cost by doing it on your own.
Besides the aforementioned Bitwise 10 Crypto Index Fund, there are also the ProShares Bitcoin Strategy ETF (BITO), the Valkyrie Bitcoin Strategy ETF (BTF), the VanEck Bitcoin Strategy ETF (XBTF), the Global X Blockchain and Bitcoin Strategy ETF (BITS), and the VanEck Global X Bitcoin Index Fund (GBXB) (BITW). It is important to read the prospectus and understand the fund's fees and underlying investments since they might vary widely.
Cryptocurrency and Blockchain Stocks
Stocks of firms involved in the blockchain sector or those that invest in or hold bitcoin may provide investors with exposure to the cryptocurrency market.
Companies in the cryptocurrency business provide a variety of services, including mining, software development, and more. Bitfarms (BITF), HIVE (HIVE), Canaan (CAN), and Riot Blockchain (RIOT) are just a few of the stocks availablet, and more. Bitfarms (BITF), HIVE (HIVE), Canaan (CAN), and Riot Blockchain (RIOT) are just a few of the stocks available. The cryptocurrency exchange and stock market platform Coinbase (COIN) is a major player in the industry.
In the event of a general downward trend in cryptocurrency values, many cryptocurrency stocks tend to perform poorly as well. If you have any worries about your investing choices or goals, you should see a trustworthy financial adviser.
Bonus Tip: Credit Card Rewards
Finally, credit card rewards are a great way to add to your bitcoin holdings without having to part with any hard dollars. You can use your credit card as you like—swipe, touch, dip, click—and earn cryptocurrency in the process with a few different cards.
The BlockFi Rewards Visa Signature card, the Gemini Credit Card, and the Upgrade Bitcoin Rewards Visa card are all exceptional options for individual bitcoin holders. Both the Crypto.com and Coinbase exchanges provide rewards cards.
The personal SoFi credit card and the Venmo credit card are two examples of cards that provide you with a wide range of redemption possibilities, including bitcoin. Earning cryptocurrency as a credit card reward is like investing in cryptocurrency without really purchasing any. No matter what happens to the price of cryptocurrency, you still stand to gain since you didn't have to spend any money to get it.
What is Cryptocurrency?
Secure transactions may be made in what is known as "cryptocurrency," a digital or virtual currency established through the use of cryptographic procedures. There is no government or bank in charge of it, as there is with fiat currency.
What is Bitcoin?
Bitcoin, the first successful decentralized cryptocurrency, was founded in 2008 by an unknown person or group of people named Satoshi Nakamoto. It's a kind of digital currency that can be safely transferred from one user to another through the web.
Who is Satoshi Nakamoto?
The person or individuals behind the creation of the Bitcoin protocol and the first cryptocurrency in 2008 are often referred to by the alias "Satoshi Nakamoto." Nakamoto was active in the bitcoin and blockchain communities until about 2010.
Conclusion
Cryptocurrencies have been called "the next big thing" in technology. Those who want to get in on the new technology without taking undue risks might consider investing indirectly in crypto. This will increase the portfolio's diversification and help spread out the associated risk.
FAQ
Do I need a cryptocurrency wallet to make an investment? To protect your bitcoin holdings, you need to get a wallet. However, if you want to test the waters before diving in headfirst, platforms like PayPal and Robinhood make it easy to acquire and store small amounts of cryptocurrency. However, the private key to these wallets is held securely by the wallet provider.
To what cryptocurrency does one have the least amount of difficulty allocating funds? Ethereum is seen as a good cryptocurrency to invest in by many, particularly those just starting out in the industry. Since the value of Ethereum's currency (ETH) goes up with the number of active nodes on the network, we can assume that the price of ETH will go up as more decentralized applications (dApps) and other projects are built and launched on Ethereum.
In what timeframe can a single bitcoin be mined? One bitcoin may be mined in around 10 minutes with the right gear and software, but this setup can be expensive and is only available to a select group of people. The average user can mine a bitcoin in 30 days, which is both common and reasonable.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 4fcac000:d2b37988
2024-11-23 17:53:26В Тюмени активно развиваются научные исследования, ориентированные на решение проблем устойчивого развития.
🌍 Климатические изменения и экология: Ученые Тюмени занимаются разработкой новых методов мониторинга и прогнозирования климатических изменений. Исследования в области экологии направлены на сохранение природных ресурсов и восстановление экосистем, что особенно важно для нашего региона.
🍃 Энергетика будущего: Исследования в области альтернативной энергетики продолжают набирать популярность. Ученые работают над проектами по внедрению возобновляемых источников энергии и повышению энергоэффективности в городских инфраструктурах.
🚜 Устойчивое сельское хозяйство: Наши исследователи разрабатывают инновационные методы ведения сельского хозяйства, которые минимизируют воздействие на окружающую среду. Это важный шаг к обеспечению продовольственной безопасности и сохранению экосистем.
💡 Перспективные технологии: В Тюмени активно развиваются проекты умных технологий и их применение в городском управлении. Это включает в себя создание "умных" решений для транспортной инфраструктуры, мониторинга состояния окружающей среды и оптимизации градостроительного планирования.
🤝 Сотрудничество с бизнесом и властью: Научные исследования в Тюмени налаживают связи с бизнесом и государственными структурами, что позволяет внедрять научные разработки в реальную жизнь и делать вклад в устойчивое развитие города.
Тюмень уверенно шагает в будущее, и наука играет ключевую роль в этом процессе! Давайте работать вместе над созданием устойчивого и комфортного города для следующих поколений. 🌟✨
НаукаТюмень #УстойчивоеРазвитие #Инновации #Экология #БудущееТюмени
-
@ 8cd9d25d:69e9894d
2024-11-23 04:45:03Chef's notes
Note that youtube recipe is asking for 1tablespoon of salt, which is waaaaaay too much. Recipe works fine with a teaspoon,, but your mileage may vary. Play around with it.
You don't need to prove modern packet yeasts in my experience... just yolo it.
If you want an extra crispy crust, add a second baking pan to the base of the oven as you pre-heat. Then once you've placed the dough in, to the oven, take some boiling water and pour into the second baking tray. This gives you a steam oven on a budget :)
Details
- ⏲️ Prep time: 15min (not including time for dough rises)
- 🍳 Cook time: 30mins
- 🍽️ Servings: 4-5
Ingredients
- 500 grams wholemeal spelt flour
- 1 packet baker's yeast (10grams)
- 350 ml lukewarm water
- 350 ml lukewarm water
- 1 teaspoon salt 🧂
Directions
- Preheat your oven to Preheat oven to 430°F and put a baking tray in at the same time to heat up.
- Add all ingredients to a bowl (best to use a stand mixer to save time, but you can do by hand too. Mix and knead until the dough comes together. After about 5 mins you should have a moist dough that doesn't stick to your hands... if it is a bit sticky, just add a bit more flour (different flours like differenent amounts of water)... If too dry, add a bit more water... etc.
- Remove dough from bowl & form into a ball (smooth on top, never mind if not perfectly smooth on its base). Put back in a bowl and cover with a damp cloth. Allow to rest for 30mins/1hr until dough has roughly doubled in size. Time will depend on the ambient temp where you are. In the tropics, 30mins is just fine.
- Take risen dough out of bowl and put on a floured surface and press the gas out of it... flatten the dough with your hands, and then fold each edge in until you have a rectangle (video makes this bit clear). Then roll the rectangle up into a cylinder. This gives you a nice tight dough for baking. Pinch the ends of the cylinder to seal the dough.
- Place dough onto a baking sheet/ piece of parchment paper etc... cover with damp towlel and let rise for 15/30mins
- Score the risen dough (a razer blade, clean box cutter, or serrated knife works well) , this lets steam escape from the loaf as it bakes without slpititng it in ways you wouldn't like.
- Take your hot baking tray out of the over and transfer your dough onto it. Put into oven.
- Bake at 430°F (220°C) for 15mins, then reduce oven temp to 350°F (180°C) for the final 15mins. Total bake time 30mins.
- Remove from oven and allow to cool for 20-30mins.
-
@ 5af07946:98fca8c4
2024-11-23 01:06:57US natives think $USD is a currency - for the rest of the world it is an asset . Just like #bitcoin.
The way Microstrategy accumulates bitcoin , all central banks collect US debt - a fancier word for US Dollar. As of April 2024, the five countries that hold the most US debt are:
Japan: $1.1 trillion China: $749.0 billion United Kingdom: $690.2 billion Luxembourg: $373.5 billion Canada: $328.7 billion Compare this global stake to 15 odd billions that #Microstrategy has in bitcoin. The way Microstrategy wants to protect bitcoin network , central banks want to protect #USD. Which means they all resist any change in capital structure. Not even bitcoin.
Thus the peaceful path for bitcoin is to become the reserve strategic asset for United States and thus for rest of the world. The other path is literally fighting governments worldwide ..
There is however one more opportunity - that is if people all around world adopt #SATs - which is why success of #nostr is so critical ! And other lightning apps - #LNCalendar , #StackerNews , #Fountain
In reality , both these things can happen simultaneously - that would be real freedom - Top down and Bottom up.
originally posted at https://stacker.news/items/779432
-
@ 5af07946:98fca8c4
2024-11-23 00:52:05US natives think $USD is a currency - for the rest of the world it is an asset . Just like #bitcoin.
The way Microstrategy accumulates bitcoin , all central banks collect US debt - a fancier word for US Dollar. As of April 2024, the five countries that hold the most US debt are:
- Japan: $1.1 trillion
- China: $749.0 billion
- United Kingdom: $690.2 billion
- Luxembourg: $373.5 billion
- Canada: $328.7 billion
Compare this global stake to 15 odd billions that #Microstrategy has in bitcoin. The way Microstrategy wants to protect bitcoin network , central banks want to protect #USD. Which means they all resist any change in capital structure. Not even bitcoin.
Thus the peaceful path for bitcoin is to become the reserve strategic asset for United States and thus for rest of the world. The other path is literally fighting governments worldwide ..
There is however one more opportunity - that is if people all around world adopt #SATs - which is why success of #nostr is so critical ! And other lightning apps - #LNCalendar , #StackerNews , #Fountain
In reality , both these things can happen simultaneously - that would be real freedom - Top down and Bottom up.
-
@ 63d59db8:be170f6f
2024-11-23 00:41:02This ongoing series "Better Together" features surreal settings I have been creating by combining two different photographs that I've shot. I enjoy the challenge of creating something completely new out of two photos that otherwise have nothing to do with each other. There is no other editing or manipulation done to these images besides connecting them at one meeting line.
Visit Pat's website to see more
NOICE Magazine’s Visual Expression Awards are designed to spotlight creativity in photography, welcoming both emerging and seasoned artists. Each submission is now part of our dynamic prize pool, currently at $120 / 121,956 sats and growing with each new entry, with immediate exposure opportunities on our website and social channels.
Choose a Standard or Premium submission to suit your needs and have your work thoughtfully reviewed for form, originality, and impact. A quarterly cash prize from the dynamic pool goes to one standout entry, helping fund your next creative project. Deadline: December 31, 2024.
-
@ 5d4b6c8d:8a1c1ee3
2024-11-23 00:13:13More exciting basketball and this time we can live bet one of the matches.
Predyx has a prediction market for the Sixers/Nets game. One of you maniacs picked the Nets. Good luck!
I would have been excited about that Mavs/Nuggets game later, but I don't know if Jokic is even playing and Luka definitely isn't. That probably leaves Bucks/Pacers as the game of the night.
originally posted at https://stacker.news/items/779386
-
@ 2dd9250b:6e928072
2024-11-22 23:32:03O Calvinismo, como Cosmovisão diverge do Conservadorismo Tradicionalista (postulado por Burke, Scruton, Jordan Peterson e outros). Isso tem se demonstrado de forma evidente hoje ao passo que quando se fala em Conservadorismo, os comentaristas mais lembrados são Olavo de Carvalho, Guilherme Freire e os Hosts do Brasil Paralelo.
Portanto, é inegável que escritores, apresentadores e donos de Canais ditos Conservadores, na verdade são Católicos Romanos falando para um público Católico Romano. E quando citam os "Protestantes", ninguém sabe ao certo, de quem eles estão falando. Uma vez que nós não somos meros Evangélicos, somos Reformados.
Historicamente, o grupo que mais se opôs aos Católicos Romanos foram os Calvinistas Puritanos no Século XVII. As Confissões Reformadas (de Westminster de 1647 e a de Londres de 1689) trazem um teor anti-papista na maioria de seus capítulos e artigos de fé.
Isso nos mostra que há um real conflito, ou uma disputa, concernente a quem pertence o termo "Conservador" no Brasil. Uma vez que, para um Católico Romano Tradicionalista, Evangélicos são Esquerdistas/Satanistas indo para o inferno junto com Lutero e Calvino e todo o estrago que o Progressismo vem fazendo no Mundo, tem sua causa na Secularização do Ocidente que se originou na Reforma de Lutero.
Em contrapartida, Evangélicos em geral, são mais amistosos, defendendo uma certa união com os Romanistas para frear o avanço de Pautas ideológicas/identitárias que vão de encontro aos costumes, valores, fé e tradição Cristãos. Mas a que preço? E mais importante: Essa união (ou apropriação do termo Conservador) com o Romanistas tem algum fundamento Bíblico?
Existem vários aspectos que podemos analisar para chegarmos a uma resposta satisfatória. Mas irei trazer aqui apenas um aspecto. O Casamento. É inegável para todo mundo que se diz Conservador, ou que está próximo disso, que o mundo pós - moderno tenta enfraquecer/ridicularizar o Homem e enaltecer/empoderar a Mulher (exemplo disso é uma noiva se negando a dizer “prometo ser submissa” em uma Cerimônia de Casamento, deixando o noivo e o padre desconcertados) . Mas é só analisarmos mais de perto a definição de casamento no Conservadorismo e o que ele representa, para entendemos que o Conservador (ou seja, Católico Romano) não parte do mesmo ponto de partida do Cristão Reformado para argumentar a favor do casamento tradicional.
Para nós Cristãos Reformados o Casamento é um Pacto. Nesse sentido, tem mais valor do que um mero acordo ou Contrato entre as partes porque é um símbolo. A Bíblia usa a ilustração de Cristo como Noivo e a igreja como noiva (Mt 25:1-13; Ef 5:32) por isso o marido assume a missão de 'proteger e cultivar’¹ sua esposa e a esposa se submete ao marido. Submissão na Bíblia significa se submeter a mesma missão. No caso, a mulher ajuda o marido nessa missão. Logo há uma parceria onde um complementa o outro, cada um na sua função (Efésios 5:25-31).
Além disso, O matrimônio foi ordenado para o mútuo auxílio de marido e mulher, para a propagação da raça humana por uma sucessão legítima e da Igreja por uma semente santa, e para impedir a impureza. (Gn. 2:18, e 9:1; Ml.2:15; I Co. 7:2,9). ²
Portanto , a compreensão Pactual Bíblica do casamento supera qualquer visão política/social Tradicionalista como o Conservadorismo.³
No Conservadorismo há apenas um clamor por preservação dos costumes judaico/cristãos fundamentais para civilização ocidental, mas como isso será feito, não é muito claro. Por isso o conservador brasileiro ganhou esse estereótipo de hipócrita. A favor do casamento tradicional, sendo que já está no 3°,4° casamento. Contra o Lobby gay , drogas, ideologia de gênero etc, mas a favor do aumento do Estado para frear essas pautas identitárias/progressistas ao invés de pregar, crendo que o Evangelho de Jesus transforma vidas. E vidas transformadas pelo Espírito Santo muda toda uma sociedade. Portanto, o Conservador zela pela preservação de costumes e virtudes, apenas exteriormente, levando em consideração conservar o Bem e frear o Mal, em favor de uma mudança gradual da sociedade.
Por isso eu não me considero Conservador (pelo menos não aos moldes do Conservadorismo Tradicionalista dos Papistas). Costumes e valores devem ser observados não por imposição de Leis Juspositivistas, endossando a interferência do Estado na vida privada dos cidadãos, mas pela manifestação do Poder do Evangelho na vida de pessoas regeneradas pelo Espírito Santo que, junto da Igreja Universal de Cristo, testemunham e agem conforme a Lei do Senhor.
1."Cultivar e Guardar" são duas palavras que resumem o mandamento de Deus para o Homem. No contexto de Gênesis 2:15, Deus ordenou a Adão proteger e cultivar tudo que estava no jardim do Edem, incluindo sua mulher, Eva.
2.CFW Cap.24. Artigo II.
3.Esse texto é totalmente de minha autoria e estava há um bom tempo querendo escrever sobre isso.
-
@ 97c70a44:ad98e322
2024-11-22 22:36:31This week I finally released Flotilla, a discord/slack-like client I've been working on for about three months. This project began as a NIP 29 client, and after 3 PRs, lots of discussion, a podcast, and a partial implementation, I decided to go my own way.
This of course means that I broke compatibility with all the NIP 29 group clients out there, but I did it for good reasons. In this post I hope to explain those reasons, and speculate on how best to move forward with "relay-based" groups on nostr.
To give you some quick context, NIP 29 and my approach to groups (which I'll dub "relays-as-groups" for clarity) are very similar, with a fundamental difference. Both have chat, join requests, group metadata, membership, moderation, etc. However, the basic unit of a NIP 29 group is a random group id string, while the basic unit of a Flotilla group is a relay itself.
I believe this design difference emerged in part because of what we were attempting to build. NIP 29 groups tend to be more telegram-like, where groups function more like chat rooms, and users join each one individually. On flotilla, groups function more like Discord servers, or Slack workspaces, and users join an entire group of chat rooms at once.
"Relays as groups" has four major advantages over "groups hosted by relays".
Decentralization
First, using relays as groups supports decentralization better than hosting user-managed groups on relays.
(To be clear here, I'm not referring to client-managed groups, which is a whole different approach that we've experimented with in the past, both with NIP 72 communities and with NIP 87 encrypted groups. Both NIP 29 and relays-as-groups solve many of the consistency problems associated with attempting to have a linear, synchronous conversation across multiple relays. While both alternatives have a story for migrating or mirroring a group, both rely heavily on the host relay to not censor user messages.)
I know what you're thinking. How can reducing the number of relays improve decentralization? Relays were originally introduced in order to create redundancy and spread trust across many actors, creating censorship resistance. This model was difficult for many bitcoiners to wrap their heads around, because it's a very different kind of decentralization than what a blockchain delivers.
Communities are an essentially different use case from a broadcast network where content is delivered based on author or recipient relay selections. Every message to a community would have to be delivered to all members of the community. Sending each message to all members' personal inbox relays just doesn't make sense; there has to be some other inbox for the community to work off of.
Additionally, online communities almost always have moderators and admins. This is even true of very public, open types of communities, like subreddits. The only type of community that doesn't have moderators is one that emerges naturally from social clustering. And even in that case there is loose consensus about who is in and who isn't, based on the actions/follows/mutes of the participants, whether these clusters are huge or tiny. Socially-emergent groups are served well by chat applications or broadcast networks.
But the subset of online communities that do prefer to confer moderator status on certain members are essentially centralized. In other words, centralization and control is a feature, not a bug.
Now, that doesn't mean there don't need to be considerations around credible exit and removing/adding moderators over time. But the fact is that moderator-led communities are always under the oversight of the moderators at any given time, even if the identity of those moderators changes and their power is limited.
What this implies is that decentralization for moderator-led groups looks very different from decentralization for a broadcast network. There is nothing at all wrong with giving moderators full control over the group's communications (qua the group; DMs and public broadcast content between group members should happen outside the group's infrastructure, just as people also exist outside the communities they are a part of). What is important is that no one has control over groups that they aren't nominally the admin of.
In concrete terms, what this all means is that community moderators should self-host their infrastructure. This is the same principle as motivates self-custody and home servers, but applied to communities. If community leaders manage their own relays, this means that no hosting company or relay admin can de-platform their community. Centralization of network infrastructure in this case aligns with the trust structure of the group.
Applying this to our group dilemma, it's easy to see that NIP 29 groups are more vulnerable to censorship or data harvesting attacks by malicious relay admins, since many unrelated groups might live on a single relay. In contrast, if you treat relays as groups themselves, every group is forced to live on a separate relay, spreading risk across more hosting providers.
Now, this doesn't necessarily mean that many "relays" aren't "virtual relays" managed by the same hosting provider. So I'll admit that even "relay-based" groups don't completely solve this problem. But I think it will tend to nudge community organizers toward thinking about community infrastructure in a more self-sovereign (or community-sovereign) way.
Investment in Relays
While both NIP 29 and relays-as-groups rely heavily on relays to implement the features that support each specification, there's an important difference between the feature sets. In NIP 29, relay support is specific only to groups, and isn't applicable to other use cases. In contrast, every protocol feature added to support the "relays as groups" can be re-purposed for other types of relays.
Take join requests for example. NIP 29's kind
9021
events allow users to request access to a group, and that's all. Kind28934
join requests on the other hand allow users to request access to relays. Which in the relays-as-groups model means group access, but it also means custom feed access, inbox relay access, maybe even blossom server access. In fact, kind28934
was originally proposed at the beginning of this year in order to support a different version of hosted groups, but remains as relevant as it ever was despite iteration on groups.The orthogonality of features added to relays to any specific use case will long-term result in simpler specs, and more interesting relay-based use cases being possible. Join requests are only one example. The same is true of 1984-based moderation, the proposed LIMITS command, AUTH, NIP 11 relay metadata, etc.
We already have web of trust relays, feed relays, archival relays, and many more. Being able to request access to closed versions of these is useful. Being able to signal federation between multiple instances of these, run by different people, is useful. And of course, relay metadata, reports, and LIMITS are self-evidently useful for normal relays, since they pre-date Flotilla.
I've always said that relays are some of the coolest and most under-appreciated parts of nostr. This doesn't mean that we should add every possible feature to them, but features related to data curation and access control fit really well with what relays are good for. For more on the role of relays and what features should be added to them, see my nostrasia talk Functional Relays.
Declarative vs Imperative
A common paradigm in programming is that of declarative vs imperative programming. Imperative programming focuses on "how" to achieve a given result, leaving "what" the code is doing to be inferred by the programmer. Declarative programming instead focuses on the "what", and allows some underlying implementation to solve the how. A good balance between these paradigms (and knowing when to use one over the other) allows programmers to work faster, make fewer mistakes, and produce less code.
Another way to look at this is that a specification should contain as much ambiguity as possible, but without compromising the system attributes the specification is supposed to guarantee. It can get complex when figuring out what attributes are core to the specification, since sometimes the "how" does actually matter a lot.
However, nostr in particular falls pretty far along the "declarative" end of this spectrum because of its decentralized nature. The only person who can say anything with any authority is the person who signs an event. This event is a "declaration", and any effects it has are necessarily up to the relays, clients, and people interpreting the event. However, what others do with an event is an expectation that must be taken into account by the publisher, forming a feedback loop. This dialectic is what creates stability in the protocol.
In more concrete terms, no one can "tell" anyone else what they have to do by publishing an event like you might in a traditional, centralized RPC-type system. Any event whose semantics are a "command" rather than a "fact" or "request" is broken unless the counter party is fully committed to carrying out the command. An example of a "command" scenario on nostr is NIP 46 remote signing, in which the bunker is the agent of the user making the request. If the bunker implementation fails to carry out a valid command initiated by the user, its interpretation of that event is objectively incorrect.
NIP 29 applies this same paradigm to relays, particularly in the area of moderation, membership edits, and group metadata. In other words, there are several "commands" which instruct the relay to do something.
This isn't necessarily a bad thing, but it does increase the number of things the interface between the client and relay have to agree on. A regular relay may accept an
add-user
request, but then do nothing with it, violating the contract it has implicitly accepted with the user. The solution to this is feature detection, which is a whole other API to be specified and implemented.My ideal solution to this problem is to shift the semantics of events away from "commands" to "facts" - in other words, to make the interface more declarative.
In fact, we already have an interface for moderation that works like this. Many clients support kind
1984
"report" events. Users sending these reports have no expectations about how they will be used. They are a "fact", a declaration of opinion with certain semantics. Other actors in the network may choose whether or not to pay attention to these.This same model is easily applied to communities. Without having to implement any feature detection (either for the relay's implementation, or for the user's role on that relay), anyone can simply send a "report". This goes into the black hole of the relay, and may subsequently be ignored, broadcasted, or acted on.
The really nice thing about this model is that because there is no expectation for "how" reports are to be interpreted, any approach to moderation can be used depending on relay policy or client implementation. In NIP 29, if you issue a
delete-event
, it either happens or it doesn't and if it doesn't, you have to explain the failure to the user somehow.In the relays-as-groups model, e-tagging an event in a kind
1984
requires no user feedback, and therefore it can be interpreted however the relay prefer. This can result in insta-banning, manual review, thresholds based on number of reporters, a leaky-bucket social score algorithm, shadow banning, temporary banning, soft-moderation by allowing clients to request reports and respond to them by changing user interface elements, or anything else you can think of.The reason I think this is important is that community moderation is a very hard problem, and baking certain semantics into the specification can result in the complete failure of the spec. NIP 72 should be considered an example of what not to do. Some NIP 72 communities have survived due to the dedication of the moderators, but many more have failed because of the rigid moderation model. We should try not to make the same mistake again.
Conclusion
Now, having said all that, I think there is actually a lot of value to NIP 29. What finally clicked for me this week after releasing Flotilla is that the two approaches are actually complementary to one another. One of the most common feature requests I've already heard for flotilla is to have more complete support for rooms, which are currently implemented as not much more than hashtags. Better rooms (i.e., "nested groups") would require: authentication, membership, moderation, and pretty much everything else that exists for the top-level group.
As much as I believe the relays-as-groups approach is superior to NIP 29 for top-level groups, it doesn't make any sense to try to "nest" relays to create sub-groups. Something like NIP 29 is needed in order to fully support rooms anyway, so I think the convergence of the two approaches is all but inevitable. In fact, fiatjaf has already merged a PR which will allow me to use the same event kinds in flotilla as exist already in NIP 29 clients.
There are just a few more changes that are necessary in order for me to fully adopt NIP 29 in Flotilla:
- NIP 29 feature detection
- Opaque ids for unmanaged groups prevent unmanaged groups from having human-readable names
- We need a mechanism for building membership lists without relay support
- Better handling for
9021
group join requests
I've opened PRs for each of these (linked above). Hopefully we can work through these issues and combine our powers to become the Captain Planet of group implementations.
-
@ 65912a7a:5dc638bf
2024-11-22 21:37:16Details
- ⏲️ Prep time: 5 min
- 🍳 Cook time: 30 min
- 🍽️ Servings: 12
Ingredients
- 12-14oz fresh cranberries
- 1⅓ cup packed brown sugar
- 1 cup raisins
- 1 orange, peeled & chopped
- 1 cup water
Directions
- Using medium sauce pan, simmer cranberries and water for 5-6 min. Cranberries will start to pop.
- Add brown sugar, raisins, and chopped orange to the berries.
- Bring to a simmer and continue to cook for 20 min. Stir often to prevent sticking. Remove from heat.
- Let set until room temp. Mixture will thicken as it cools.
- Put in a covered container and keep refrigerated. Lasts for about 2 weeks.
-
@ 319ad3e7:cc01d50a
2024-11-22 21:03:17Candied Pecans by Double00Satoshi
Details⏲️ Prep time: 10 🍳 Cook time: 45 🍽️ Servings: 16
Ingredients
- 1/4 cup light brown sugar
- 1/4 cup granulated sugar
- 1 tablespoon ground cinnamon
- 1 teaspoon salt
- 1 pound unsalted pecans halves
- 1 egg white
- 1/2 teaspoon vanilla extract
- 1 teaspoon water
Directions
Preheat oven to 300 degrees F. Line a large baking sheet with parchment paper and set aside. In a bowl, add sugars, cinnamon, and salt. Whisk until combined. Set aside. In a large bowl, whisk the egg white, vanilla, and water together until frothy. Add the pecans and gently toss until the pecans are well coated. Add the sugar and cinnamon mixture and toss until pecans are covered. Spread the pecans out in a single layer on prepared baking sheet. Bake for about 30-45 minutes, stirring every 15 minutes. Remove from the oven and let the pecans cool on the baking sheet. When completely cool, store in an airtight container for up to 1 month.
Deviled Eggs by Seth
Details ⏲️ Prep time: 20 min 🍳 Cook time: 15 min 🍽️ Servings: 6
Ingredients
- 6 hard boiled eggs, peeled
- 3 tablespoons of mayonnaise
- 1/2 teaspoon of soy sauce
- 1 teaspoon of Dijon mustard
- 1/2 stalk of celery, finely diced
- Salt and pepper
Directions
Cut eggs in half lengthwise and pop yolks out into bowl, mash with fork. Mix in mayonnaise, mustard, celery, soy sauce, salt and pepper. Whip until a creamy texture Scoop out fill and add to egg whites, heaping it slightly. Add garnish of choice Serve immediately or refrigerate before serving.
Bang Bang Shrimp by Hes ⚡️
Details ⏲️ Prep time: 20 min 🍳 Cook time: 20 min 🍽️ Servings: 4
Ingredients
- 1 pound shrimp
- 1 teaspoon granulated sugar
- ½ cup all-purpose flour
- ½ cup panko breadcrumbs
- 1 teaspoon salt
- ½ teaspoon black pepper
- ¼ teaspoon garlic powder
- ¼ teaspoon onion powder
- ¼ teaspoon dried basil
- 1 egg
- 1 cup milk
- 4 – 5 teaspoon chili garlic sauce
- 1 teaspoon rice vinegar
- ½ cup mayonnaise
Directions
Make the sauce: Mix mayonnaise, chili garlic sauce, sugar, and rice vinegar in a bowl. Refrigerate. Prepare for frying: a) Combine beaten egg and milk in one bowl. b) Mix flour, panko, and seasonings in another bowl. Bread the shrimp: a) Coat each shrimp in flour mixture. b) Dip in egg mixture. c) Coat again in flour mixture. d) Arrange on a plate and refrigerate for 20 minutes. Fry the shrimp: a) Heat oil to 350F in a dutch oven. b) Fry shrimp for 2-3 minutes until golden. c) Drain on wire rack or paper towels. Serve: a) Coat fried shrimp with ¼ cup sauce. b) Serve with remaining sauce on the side.
To Find More Recipes, go to Zap.Cooking
-
@ 319ad3e7:cc01d50a
2024-11-22 20:49:16Candied Pecans by Double00Satoshi
Details⏲️ Prep time: 10 🍳 Cook time: 45 🍽️ Servings: 16
Ingredients
- 1/4 cup light brown sugar
- 1/4 cup granulated sugar
- 1 tablespoon ground cinnamon
- 1 teaspoon salt
- 1 pound unsalted pecans halves
- 1 egg white
- 1/2 teaspoon vanilla extract
- 1 teaspoon water
Directions
- Preheat oven to 300 degrees F. Line a large baking sheet with parchment paper and set aside.
- In a bowl, add sugars, cinnamon, and salt. Whisk until combined. Set aside.
- In a large bowl, whisk the egg white, vanilla, and water together until frothy. Add the pecans and gently toss until the pecans are well coated. Add the sugar and cinnamon mixture and toss until pecans are covered.
- Spread the pecans out in a single layer on prepared baking sheet. Bake for about 30-45 minutes, stirring every 15 minutes.
- Remove from the oven and let the pecans cool on the baking sheet. When completely cool, store in an airtight container for up to 1 month.
Deviled Eggs by Seth
Details ⏲️ Prep time: 20 min 🍳 Cook time: 15 min 🍽️ Servings: 6
Ingredients
- 6 hard boiled eggs, peeled
- 3 tablespoons of mayonnaise
- 1/2 teaspoon of soy sauce
- 1 teaspoon of Dijon mustard
- 1/2 stalk of celery, finely diced
- Salt and pepper
Directions
- Cut eggs in half lengthwise and pop yolks out into bowl, mash with fork
- Mix in mayonnaise, mustard, celery, soy sauce, salt and pepper.
- Whip until a creamy texture
- Scoop out fill and add to egg whites, heaping it slightly
- Add garnish of choice Serve immediately or refrigerate before serving
https://zap.cooking/recipe/naddr1qqtk2em8vdjkcmr9de6z6er9we5kcety94jkwemnqgs2wguqtndxwfg3j8y8sm6d5k8hjlnfwavzxqf4fw5wjx7tqdpde8qrqsqqqa2838r4n9
Bang Bang Shrimp by Hes ⚡️
Details ⏲️ Prep time: 20 min 🍳 Cook time: 20 min 🍽️ Servings: 4
Ingredients
- 1 pound shrimp
- 1 teaspoon granualted sugar
- ½ cup all-purpose flour
- ½ cup panko breadcrumbs
- 1 teaspoon salt
- ½ teaspoon black pepper
- ¼ teaspoon garlic powder
- ¼ teaspoon onion powder
- ¼ teaspoon dried basil
- 1 egg
- 1 cup milk
- 4 – 5 teaspoon chili garlic sauce
- 1 teaspoon rice vinegar
- ½ cup mayonnaise
Directions
Make the sauce: Mix mayonnaise, chili garlic sauce, sugar, and rice vinegar in a bowl. Refrigerate. Prepare for frying: a) Combine beaten egg and milk in one bowl. b) Mix flour, panko, and seasonings in another bowl. Bread the shrimp: a) Coat each shrimp in flour mixture. b) Dip in egg mixture. c) Coat again in flour mixture. d) Arrange on a plate and refrigerate for 20 minutes. Fry the shrimp: a) Heat oil to 350F in a dutch oven. b) Fry shrimp for 2-3 minutes until golden. c) Drain on wire rack or paper towels. Serve: a) Coat fried shrimp with ¼ cup sauce. b) Serve with remaining sauce on the side.
https://zap.cooking/recipe/naddr1qqgxyctwvukkyctwvukhx6rjd9khqq3qrjc54ve4sahunm7r0kpchg58eut7ttwvevst7m2fl8dfd9w4y33qxpqqqp65wg3yt3t
-
@ 6f14a106:75915122
2024-11-22 20:25:57Every now and then, a piece of tech comes along that makes you rethink what’s possible. Enter the Mac Mini M4 Pro. Apple’s smallest desktop has always been the quiet underdog of the lineup — humble, reliable, nothing to write home about. But this time? This time, Apple didn’t just update the Mac Mini; they supercharged it. And, spoiler alert, this little guy is kind of amazing.
Here’s why the Mac Mini M4 Pro is the most mind-blowing tech I’ve reviewed in ages.
Design: A Mini That’s Actually Tiny
First, let’s talk about size. The Mac Mini M4 Pro measures in at 12.7 cm x 12.7 cm with a height of 5 cm. That’s 20% smaller than its predecessor. It’s the kind of compact that makes you double-check your measurements, wondering how Apple managed to pack so much into such a tiny frame. It’s almost laughably small — imagine something barely bigger than an Apple TV but capable of powering high-res video editing and 3D modeling.
And yes, Apple kept that minimalist, brushed-aluminum aesthetic we all love. It’s light, it’s sleek, and it’s just understated enough to blend into any setup. But let’s not skip over the quirky part: the power button is on the bottom. Why, Apple? It’s like they needed one head-scratcher per product, and here it is. Sure, you’ll remember it’s there the first few times you set up, and then it’ll fade into that “it’s quirky but fine” category.
Ports: Thoughtful but Not Perfect
One of the best surprises with the M4 Pro is the port selection. Finally, Apple gave us two USB-C Thunderbolt 5 ports and a 3.5 mm headphone jack on the front, so you can plug in drives or headphones without fumbling behind the device. The back has three more Thunderbolt 5 ports, an HDMI port, and Gigabit Ethernet.
But before you start clapping, note that there’s still no USB-A or SD card slot. If you’re a photographer or someone who still works with older peripherals, you’ll need adapters. It’s not a dealbreaker, but it’s definitely something to keep in mind.
The M4 Pro Chip: More Than Just Numbers
Now, let’s get to what really matters: performance. The M4 Pro chip is where this Mac Mini flexes hard. With a 12-core CPU and a 20-core GPU, you’re looking at serious power — enough for 8K video editing, 3D rendering, and heavy multitasking. We’re talking about a 15% boost in multi-core performance and a 20% leap in graphics compared to the M2 Pro.
Need proof? The Geekbench 6 scores are wild: 4028 single-core and 23307 multi-core. These numbers put the Mac Mini M4 Pro in the same league as some Mac Studios, making you wonder if a Mac Studio is even necessary for many workflows. From editing high-res footage to running AI-driven tasks, this thing doesn’t just keep up; it leads.
Real-World Performance: A Day in the Life
So, what does that mean for day-to-day use? If you’re like me and your workflow involves jumping between editing software, a dozen Chrome tabs (don’t judge), and video calls, the M4 Pro handles it all like it’s no big deal. No lag, no stutter — just seamless multitasking.
The cooling system has been redesigned, too. Even under a full workload, the Mac Mini stays whisper-quiet. Gone are the days of fans whirring like jet engines when you’re rendering a video or running intensive apps. This thing just is, silently powering through tasks while you forget it’s even there.
Memory and Storage: Options Galore
One thing that caught my eye is how much memory and storage you can pack into this tiny beast. The M4 Pro starts with 24 GB of unified memory and can go up to 64 GB. Memory bandwidth is 273 GB/s, which means multitasking with heavy apps feels like second nature. Whether you’re editing 4K videos, working on large Photoshop files, or running development environments, the M4 Pro won’t break a sweat.
Storage-wise, the base model comes with 512 GB SSD, but you can upgrade to 8 TB if you’re working with massive projects or just don’t trust cloud storage. And speaking of storage speeds, this SSD is fast — reading speeds over 5000 MB/s, so you’re not sitting around waiting for files to load.
Display Support: A Game Changer for Creatives
If you work with multiple monitors, you’re going to love this. The M4 Pro supports up to two 6K displays at 60Hz or a single 8K display via HDMI. For video editors and graphic designers, this means more screen real estate to spread out timelines, edit layers, or run detailed previews — all without any lag.
A Few Drawbacks You Should Know About
Okay, not everything’s perfect, and you deserve to know the quirks before dropping your cash. First off, that power button placement on the bottom? It’s a design decision that’ll make you shake your head every time you reach for it. And while the port selection is mostly great, the lack of USB-A and SD card slot might mean carrying around more adapters.
Apple’s pricing ladder is another thing to keep an eye on. The base M4 Mac Mini at $599 is a steal, but once you start upgrading RAM and storage on the M4 Pro, you’re suddenly flirting with Mac Studio prices. It’s something to think about if you’re budget-conscious.
Who Is the Mac Mini M4 Pro For?
This is the question, right? If you’re a video editor, developer, or content creator who needs serious power without the bulk of a Mac Studio or the price tag of a Mac Pro, the M4 Pro is your sweet spot. It’s portable, powerful, and packs enough punch to handle demanding tasks without compromise.
If you’re more of a casual user — streaming, web browsing, and light productivity — the base M4 model will more than cover your needs and won’t make your wallet cry. But if you’re even considering heavy multitasking or creative work, the M4 Pro at $1,399 is worth the investment.
Why the Mac Mini M4 Pro Deserves Your Attention
The Mac Mini M4 Pro isn’t just another update — it’s a statement. Apple took what was already a beloved, compact powerhouse and turned it into something that feels almost futuristic. It’s small enough to forget about, powerful enough to replace much bigger machines, and versatile enough to fit into any setup, from home offices to professional studios.
Yes, it has its quirks (hello, power button), but they’re minor in the grand scheme of things. If you’re on the fence, let this be the push you need. The Mac Mini M4 Pro isn’t just one of the best products in Apple’s current lineup — it’s a reminder that sometimes, big things do come in small packages.
-
@ 319ad3e7:cc01d50a
2024-11-22 20:05:24NOSTR HOLIDAY GIFT IDEAS (please share or add someone you know)
V4V #circulareconomy
Agi Choote | Some hand drawings on paper or canvas are available in sizes up to 30x30 also you can get digital drawings to print out and frame on your own in your preferred technique. Please contact Agi directly.
Amber Sweeney @Amber Sweeney Custom Songs for Any Occasion (Tell Your Partner You Love Them This Holiday with A Song. One from Amber will surely be heavenly. OR sing about breakfast in bed. - SarahSoupBox winkyface)
Ant Richard @Ant Richards Limited Custom Handcrafted Knife Gift Certificates (12-month waitlist for all custom handmade orders)
Apotheca Viva @apothecavivahttps://apothecaviva.love/
Aupa Bars @AUPAhttps://eataupa.com/
Barnminer’s Barn Jerky @Barnmynah
Billay Coffee @Fulacoinhttps://billaycoffee.com/
BitBees @BitBees Honey & Honey Products https://www.kittrellsdaydream.com/
Bitpopart @Bitpoparthttps://bitpopart.com/
BtcPins @BtcPins
BTC Pins | Bitcoin Pins, Stickers & Apparel - Only Bitcoin Accepted
ONLY BITCOIN PAYMENTS ACCEPTED Pins Stickers Magnets | BTC Pins
Cannabis Records @The ₿udtender [CannabisRecords] https://cannabisrecords.store/
CryptoCloaks @CryptoCloaks™https://www.cryptocloaks.com/shop/
Delgado’s Fuego @Delgado's Fuego LLChttps://delgadosfuego.com/
Finca Yabisi @Finca Yabisihttps://yabisi.farm/
Foxfire Mushrooms @Foxfire Mushroomshttps://foxfiremushrooms.com/
Golden Tallow @Golden Tallowhttps://goldentallow.com/
GoodBeans 🇸🇻 Coffee @the guy running GoodBeans 🇸🇻 https://thegoodbeans.com/
Isolabell.art @isolabellart 🎨https://isolabell.art/
Jake Wolki @Jake Wolkihttps://wolkifarm.com.au/
Keto Beejay @beejay Low Sugar Jerky
## beejay
Notes & recipes on keto & carnivore goodies - by beejay
Full recipes site: https://ketolish.us/
Buy homemade small batch low sugar jerky on Shopstr with Bitcoin sats: https://url.tanelt.com/xcmjQp
Kanuto Takumi San @Kanuto
Laser Eye Cards https://lasereyes.cards/buy-nowBuy Laser Eyes Bolt Cards Now » Laser Eyes Cards
LeatherMint @LeatherMinthttps://theleathermint.com/
Lightning Store @ltngstorehttps://lightning.store/
LightningSpore @LightningSpore Full Service Mushroom Cultivation Company https://www.lightningspore.com/
Lost Sheep Ranch @Lost Sheep Ranchhttps://www.lost-sheep-ranch.com/
Lucho Poletti @Lucho Poletti Art Prints and Merchandise https://luchopoletti.com/
Madex @M A D E X Art & Apparel https://madex.art/collections/in-stock
MapleTrade @Mapletrade
Next Block Coffee @Next Block Coffeehttps://nextblockcoffee.com/
NoGood @Jake Wolkihttps://wolkifarm.com.au/
PatsPropolisHoney @PatsPropolisHoney
Peony Lane Wine (Ben Justman) @Ben Justman🍷https://www.peonylanewine.com/
PlebianMarket @Plebeian Market
PictureRoom @❐ PictureRoom Assorted Dessert Treats
Regenerative Farmed Meats & Knives @AgrarianContrarian
RustyPuppy | Art and Stories https://heidi2524.com/
Salt of the Earth @Salt of the Earth Premium Electrolyte Mix https://drinksote.com/
Satoshi Coffee Company @Satoshi Coffee Co.
## Welcome to Satoshi Coffee Co. - Our Roast is the Proof of Work
You CAN buy coffee with bitcoin now at Satoshi Coffee Co! Use Lightning (or on-chain) to purchase our delicious freshly-roasted coffee.
Scott & Son's Art & Apparel | Hand drawn pet portraits and limited design tshirts
https://xavierscraftworkanddesign.com/Xavier's Craftwork & Design
SofterSkin Tallow Skincare @Softer Skin | Tallow Based Skincarehttps://softerskin.co/
Shopstr @Shopstrhttps://shopstr.store/
Soap Miner @Soap Miner Tallow Body Soap Bars https://shopstr.store/npub1zzmxvr9sw49lhzfx236aweurt8h5tmzjw7x3gfsazlgd8j64ql0sexw5wy
SweetSats @SweetSats Honey
SweetSats – Buy pure, raw honey with Bitcoin
Yojimbo @Yojimble Jam & Marmalade https://jimblesjumble.odoo.com/
-
@ be41636e:e55c4909
2024-11-22 19:55:44If you are a content manager or regularly browse social media, you might have seen comments resembling this format:
"Thanks for sharing such valuable information! A bit off-topic, but I wanted to ask: My OKX wallet holds some USDT, and I have the seed phrase ([seed phrase here]). What's the best way to send them to Binance?"
This type of message is not a cry for help—it’s a carefully crafted trap. To avoid becoming a victim, always remember the golden rule: there is no free lunch.
How Does the Scam Work? At first glance, it seems puzzling—why would someone willingly post their wallet’s seed phrase, a crucial key to their funds? Isn’t sharing it the ultimate taboo in cryptocurrency security? The truth is that these scammers are banking on your greed and lack of caution. Here’s how the scam unfolds:
The Setup: The comment implies that there is free money (e.g., 500 USDT) sitting in the scammer's wallet, which they are too inexperienced or unable to transfer themselves. The seed phrase gives you access to this wallet, tempting you to retrieve the funds.
The Gas Fee Trap: Transferring tokens, such as USDT, from one wallet to another requires gas fees, which must be paid in the cryptocurrency native to the token's network. For example: • Ethereum network: Gas fees are paid in ETH. • Tron network: Gas fees are paid in TRX. • Solana network: Gas fees are paid in SOL. The scammer’s wallet conveniently lacks the required cryptocurrency to pay these gas fees. They rely on you to fund the wallet with the necessary tokens to complete the transfer.
The Sting: Thinking you’re about to "unlock" the 500 USDT in their wallet, you transfer a small amount of cryptocurrency (e.g., $10 worth of TRX) to cover the gas fees. However, the wallet is controlled by an automated bot (though it doesn’t have to be). As soon as your transaction is received, the bot instantly sweeps the funds to another wallet—one that you have no access to.
The Loss: You lose the cryptocurrency you transferred for the gas fee. While the individual amount might seem small, if enough people fall for the scam, the fraudsters rake in significant profits.
Why This Works This scam exploits basic human psychology: • Greed: The promise of free money clouds judgment. • Urgency: The fear that someone else will claim the "free funds" first pressures victims to act quickly. • Lack of knowledge: Not everyone understands gas fees or how wallets and seed phrases work.
Red Flags to Watch Out For • Public Seed Phrases: Legitimate users never share their seed phrases publicly. Anyone who does is either lying or completely reckless (and likely a scammer). • “Too Good to Be True” Offers: Free money claims are almost always scams, especially in the cryptocurrency world. • Urgency and Scarcity Tactics: Messages designed to make you act without thinking are a classic scam strategy.
What You Should Do • Ignore and Delete: If such a comment appears under your YouTube video or social media post, don’t engage. Delete the comment immediately to protect others. • Educate Your Audience: Warn your followers about this type of scam so they can recognize it and stay safe. • Stay Skeptical: Never rush into any deal involving cryptocurrency, especially one promising free money.
The Takeaway Cryptocurrency scams like this rely on greed, ignorance, and urgency. By understanding how they operate, you can protect yourself and others. Always remember: if it seems too good to be true, it probably is.
-
@ 31312140:2471509b
2024-11-22 19:08:04What is Virology? \ \ Virology is the branch of science that deals with the study of viruses. Officially, it focuses on understanding how viruses operate, how they spread diseases, and how we can combat them. 🌐🔬 \ \ The Historical Context
Historically, the concept of viruses emerged as an explanation for diseases that couldn't be linked to bacteria. The early 20th century brought about major developments in this field, leading us to where we are today with an industry worth billions.
But here’s the kicker: many fundamental assumptions in virology remain unproven or underexplored. \ \ The Unproven Hypothesis \ \ Isolation Methods: In virology, "virus isolation" doesn’t mean what you think it means. Virus isolation often involves mixing samples with toxic chemicals and other cells, then observing the effects. The presence of a virus is inferred, not directly observed. 🚫🔍
Control Experiments: Proper scientific controls, where samples without believed viruses are treated the same way, often aren’t conducted or published in ways making them verifiable. 🧪❓
Electron Microscopy: While electron microscopes can visualize particles, interpretations are problematic. Similar structures (exosomes) naturally exist in the body and can be mistaken for viruses. 🕵️🔬 \ \ The Controversial Points \ \ PCR Testing: Polymerase Chain Reaction (PCR) tests, widely used to detect viruses, can’t distinguish between live viruses and non-infectious viral fragments. It's an amplification technique, not a diagnostic tool. Famed inventor Kary Mullis himself cautioned against its misuse. ⚠️🔍
Genetic Sequencing: Viral genomes are often generated from computer models using fragmented genetic material from patient samples. This model can lead to inaccuracies and assumptions about the virus that aren’t directly observed. 🧬💻
Pathogenicity Proofs: No study unequivocally proves viruses alone cause diseases. Historical attempts, like those from the Spanish Flu era, failed to infect healthy individuals with presumed virus samples. \ \ Big Pharma Implications \ \ Big Pharma has a vested interest in propagating the viral causation theory:
Vaccines: Billions are made from vaccine sales. If virus causation is questioned, the foundation for vaccines crumbles.
Antivirals: Similarly, antiviral drugs rely on this belief. Without it, a major revenue stream is invalidated.
Pharmaceutical companies and regulatory bodies rarely challenge the status quo, leading to a cycle where treatments are promoted despite conflicting evidence. 💊💸 \ \ The Alternative Hypothesis \ \ Exosomes vs. Viruses: Exosomes, extracellular vesicles within our bodies, serve as cellular communication tools. They’re released under stress, similar to what we call “viruses.” Are our bodies creating what we interpret as “viruses” to heal or signal distress? 🧩🔍
Terrain Theory: This theory suggests that the body's internal environment, not an external pathogen, determines health. A healthy body repels illness, while a toxic internal environment invites disease. Terrain theorists argue we should focus on optimizing internal health rather than targeting external “invaders.” 🌱💚 \ \ Question Everything \ \ This exploration isn’t to say viruses categorically don’t exist but to highlight the holes and biases in mainstream virology. It’s about opening the conversation and asking critical, often uncomfortable questions.
If we reconsider virology’s foundational assumptions, what implications could this have for global health policies, pharmaceutical practices, and our understanding of diseases? The answers could reshape how we approach wellness and medical science entirely.
Remember, folks, the truth often lies beneath layers of accepted truths. Dive deeper, question more, and never settle for the surface narrative. 🚀🕵️♂️ \ \
lookintoit #virology #health #scam #covid19 #philosophy #wisdom #freedom #psychology #nature #science
-
@ ef9ee5bf:3fe39164
2024-11-22 19:01:29Salvation in a Digital World
The drama of redemption unfolds as a cosmic narrative that transcends traditional spiritual salvation, extending into the digital realms where humanity now finds itself entangled. In this emerging reality, salvation is not solely a matter of freeing the soul from sin but of liberating the mind and body from technological control systems that seek to restrict human potential. As society becomes increasingly digital, the boundaries between spiritual and digital salvation blur. The digital realm has become a new battleground for the soul, with tools of surveillance, artificial intelligence, and centralized digital systems acting as the forces that shape reality. This battleground is not neutral; it is a contested space where unseen powers influence human behavior and thought, subtly steering individuals toward compliance and conformity. Surveillance, in particular, looms as a formidable obstacle, exerting a subtle yet profound pressure that limits the capacity for genuine spiritual freedom. It not only monitors but manipulates, narrowing the range of choices and thereby inhibiting the exercise of free will—a crucial component for true salvation. As we venture deeper into this cyber age, the challenge becomes clear: to seek liberation not only from sin but from the digital systems that seek to define what it means to be free.
Free Will as Essential to Salvation
Free will stands at the heart of spiritual salvation. It is through the exercise of free will that individuals can seek, discern, and align themselves with divine truth. Spiritual growth depends on the ability to make genuine, uncoerced choices—decisions that reflect the soul’s personal quest for enlightenment rather than external pressures. Without free will, salvation becomes merely a theoretical possibility, void of personal transformation or meaningful alignment with higher principles. In this sense, free will is not just a means of self-expression but the very mechanism through which spiritual freedom is realized. It allows individuals to break away from sin, illusion, or ignorance and move toward truth, virtue, and divine love.
However, the omnipresence of surveillance in the digital age poses a direct threat to this spiritual dynamic. Surveillance does not merely observe—it influences. By monitoring behavior, it subtly pressures individuals to conform to societal norms, limit risks, and act in ways that are predictable and safe. The awareness of being constantly watched reshapes behavior, creating an environment where compliance is rewarded, and deviation is penalized, even if only through social ostracism or self-censorship. This dynamic distorts free will, as the range of decisions becomes heavily influenced by external expectations. Instead of making decisions rooted in personal spiritual exploration, individuals may find themselves choosing paths that align more with societal acceptance than with inner convictions.
The theological implications of this are significant. If salvation requires a truly free, uncoerced movement of the soul toward the divine, then pervasive surveillance becomes an obstacle to that process. It restricts the capacity for genuinely transformative decisions, replacing spiritual authenticity with digital conformity. Surveillance enforces a state of psychological limitation that mirrors the "singular collapsed state" seen in quantum physics—where the observation itself defines and limits potential. In this context, the battle for salvation is not only against spiritual ignorance or sin but also against the digital systems that restrict the exercise of free will, reducing the potential for spiritual growth to a controlled set of predictable behaviors.
### Introducing Quantum Concepts: Wave Functions and Surveillance
In quantum mechanics, the wave function is a mathematical representation of a particle’s potential states. It encompasses all the possible positions, velocities, and paths that a particle might take. However, this range of possibilities exists only until the moment of observation—once a measurement is made, the wave function "collapses," reducing the particle to a single, definite state. This phenomenon, known as the observer effect, has profound implications, not only in physics but also as a metaphor for human potential. In a state of openness, individuals—like unobserved particles—possess a wide array of possible thoughts, actions, and spiritual expressions. They can explore various paths to enlightenment, pursue unconventional ideas, and exercise creativity without the constraints of external judgment.
However, surveillance functions much like the observer in quantum mechanics. Just as the act of measurement collapses the wave function into a singular outcome, constant surveillance collapses human potential into a narrower, more controlled set of behaviors. The awareness of being observed exerts a powerful psychological influence, prompting individuals to make safer, more predictable choices. Instead of exploring diverse spiritual or personal possibilities, individuals adapt to the expectations imposed by the ever-present digital gaze. The result is a diminished range of action, where genuine self-expression gives way to compliance and predictability—what can be termed the "singular collapsed state."
This singular collapsed state represents a profound loss of spiritual potential. When human behavior is constantly shaped by surveillance, it becomes more constrained, less creative, and ultimately less free. The open potential for spiritual growth, transformation, and connection to divine truth is replaced by a narrowed reality defined by conformity and safety. Just as quantum observation restricts the wave function to a single outcome, surveillance restricts individuals to a limited set of socially acceptable behaviors, inhibiting the soul’s journey toward deeper truth and spiritual liberation. This dynamic suggests that overcoming surveillance is not merely a matter of privacy or freedom of expression—it is essential for maintaining the open potential necessary for spiritual salvation itself.
Breaking Free from Surveillance
To escape the confines of the surveillance matrix and reclaim human potential, embracing decentralized technologies is essential. Decentralized systems like Bitcoin and open-source protocols offer a tangible means of resisting centralized control and pervasive observation. Unlike centralized digital systems that collect and exploit data to manipulate behavior, decentralized technologies enable an *open potential state* where individuals can act freely, without fear of surveillance-induced consequences. They preserve privacy, protect free will, and create opportunities for genuine personal and spiritual growth. This decentralization aligns with divine principles of freedom, spontaneity, and diversity, reflecting the open and unpredictable nature of the universe itself. By choosing decentralized solutions, individuals can restore a more authentic connection to both digital and spiritual realms.
This shift is not purely technical; it’s deeply spiritual. Just as spiritual awakening requires a release from the bondage of sin and ignorance, digital liberation demands a conscious move away from surveillance-driven systems. Breaking free involves more than just switching technologies; it requires a transformation of mindset—one that recognizes surveillance as a spiritual and existential threat. It calls for the cultivation of awareness, discernment, and a willingness to embrace both technological sovereignty and spiritual autonomy. True salvation, in the context of a Cyber Gospel, is a holistic journey that requires overcoming both physical and digital chains. It is the fusion of spiritual liberation with the adoption of decentralized tools that enable true freedom in a digital world.
Ultimately, a Cyber Gospel serves as a guide for navigating this complex spiritual-digital landscape. It invites readers to explore how decentralized technologies can facilitate a digital exodus, moving humanity from a singular collapsed state to an open potential state where free will and spiritual growth can flourish. This path forward is both a call to action and a call to awakening. It urges readers to actively participate in building a future where technology serves as a bridge to liberation rather than a tool of control. As the lines between spiritual and digital realities blur, embracing this new form of salvation becomes not only possible but necessary for the soul’s journey toward wholeness and freedom.
### The Battle for the Soul in the Digital Age
The digital age is not just a technological revolution; it is a spiritual battleground where the soul's potential is tested by the forces of surveillance and control. In this new landscape, salvation must be reimagined as both spiritual and digital—a quest that demands free will, genuine choices, and the preservation of human potential against a backdrop of pervasive observation. Throughout this discussion, we have explored the nature of digital salvation, the essential role of free will, and how surveillance acts as a force that collapses human potential into a singular, predictable state. We have drawn parallels between quantum mechanics and human behavior, illustrating how surveillance, like the observer effect, restricts possibilities and narrows the range of spiritual and existential outcomes.
Yet, there is a path forward. Decentralized technologies offer a chance to resist this collapse and restore an open potential state, allowing for personal and spiritual growth in an age where control mechanisms seek to limit both. This liberation is not just about escaping technological constraints; it is about reclaiming the divine spark of free will, which is essential for true awakening. As we move deeper into this digital era, the challenge is clear: salvation must involve breaking free from the dual chains of spiritual ignorance and digital manipulation.
A Cyber Gospel can serve as a guide for navigating this complex terrain, calling for both spiritual and digital awakening. It asks seekers to reflect deeply on the nature of their freedom and the forces that shape it. The final question remains: *Can the soul be truly free in a world of constant surveillance, or must it find a way to escape to achieve salvation?* This question is not just philosophical but practical, urging users to consider how they can actively participate in the creation of a more liberated reality—both spiritually and digitally. The battle for the soul in the digital age is not just about avoiding surveillance; it is about embracing a deeper, more transformative form of freedom that aligns with both divine principles and technological sovereignty.Salvation in a Digital World
The drama of redemption unfolds as a cosmic narrative that transcends traditional spiritual salvation, extending into the digital realms where humanity now finds itself entangled. In this emerging reality, salvation is not solely a matter of freeing the soul from sin but of liberating the mind and body from technological control systems that seek to restrict human potential. As society becomes increasingly digital, the boundaries between spiritual and digital salvation blur. The digital realm has become a new battleground for the soul, with tools of surveillance, artificial intelligence, and centralized digital systems acting as the forces that shape reality. This battleground is not neutral; it is a contested space where unseen powers influence human behavior and thought, subtly steering individuals toward compliance and conformity. Surveillance, in particular, looms as a formidable obstacle, exerting a subtle yet profound pressure that limits the capacity for genuine spiritual freedom. It not only monitors but manipulates, narrowing the range of choices and thereby inhibiting the exercise of free will—a crucial component for true salvation. As we venture deeper into this cyber age, the challenge becomes clear: to seek liberation not only from sin but from the digital systems that seek to define what it means to be free. Free Will as Essential to Salvation
Free will stands at the heart of spiritual salvation. It is through the exercise of free will that individuals can seek, discern, and align themselves with divine truth. Spiritual growth depends on the ability to make genuine, uncoerced choices—decisions that reflect the soul’s personal quest for enlightenment rather than external pressures. Without free will, salvation becomes merely a theoretical possibility, void of personal transformation or meaningful alignment with higher principles. In this sense, free will is not just a means of self-expression but the very mechanism through which spiritual freedom is realized. It allows individuals to break away from sin, illusion, or ignorance and move toward truth, virtue, and divine love.
However, the omnipresence of surveillance in the digital age poses a direct threat to this spiritual dynamic. Surveillance does not merely observe—it influences. By monitoring behavior, it subtly pressures individuals to conform to societal norms, limit risks, and act in ways that are predictable and safe. The awareness of being constantly watched reshapes behavior, creating an environment where compliance is rewarded, and deviation is penalized, even if only through social ostracism or self-censorship. This dynamic distorts free will, as the range of decisions becomes heavily influenced by external expectations. Instead of making decisions rooted in personal spiritual exploration, individuals may find themselves choosing paths that align more with societal acceptance than with inner convictions.
The theological implications of this are significant. If salvation requires a truly free, uncoerced movement of the soul toward the divine, then pervasive surveillance becomes an obstacle to that process. It restricts the capacity for genuinely transformative decisions, replacing spiritual authenticity with digital conformity. Surveillance enforces a state of psychological limitation that mirrors the "singular collapsed state" seen in quantum physics—where the observation itself defines and limits potential. In this context, the battle for salvation is not only against spiritual ignorance or sin but also against the digital systems that restrict the exercise of free will, reducing the potential for spiritual growth to a controlled set of predictable behaviors. Introducing Quantum Concepts: Wave Functions and Surveillance
In quantum mechanics, the wave function is a mathematical representation of a particle’s potential states. It encompasses all the possible positions, velocities, and paths that a particle might take. However, this range of possibilities exists only until the moment of observation—once a measurement is made, the wave function "collapses," reducing the particle to a single, definite state. This phenomenon, known as the observer effect, has profound implications, not only in physics but also as a metaphor for human potential. In a state of openness, individuals—like unobserved particles—possess a wide array of possible thoughts, actions, and spiritual expressions. They can explore various paths to enlightenment, pursue unconventional ideas, and exercise creativity without the constraints of external judgment.
However, surveillance functions much like the observer in quantum mechanics. Just as the act of measurement collapses the wave function into a singular outcome, constant surveillance collapses human potential into a narrower, more controlled set of behaviors. The awareness of being observed exerts a powerful psychological influence, prompting individuals to make safer, more predictable choices. Instead of exploring diverse spiritual or personal possibilities, individuals adapt to the expectations imposed by the ever-present digital gaze. The result is a diminished range of action, where genuine self-expression gives way to compliance and predictability—what can be termed the "singular collapsed state."
This singular collapsed state represents a profound loss of spiritual potential. When human behavior is constantly shaped by surveillance, it becomes more constrained, less creative, and ultimately less free. The open potential for spiritual growth, transformation, and connection to divine truth is replaced by a narrowed reality defined by conformity and safety. Just as quantum observation restricts the wave function to a single outcome, surveillance restricts individuals to a limited set of socially acceptable behaviors, inhibiting the soul’s journey toward deeper truth and spiritual liberation. This dynamic suggests that overcoming surveillance is not merely a matter of privacy or freedom of expression—it is essential for maintaining the open potential necessary for spiritual salvation itself. Breaking Free from Surveillance
To escape the confines of the surveillance matrix and reclaim human potential, embracing decentralized technologies is essential. Decentralized systems like Bitcoin and open-source protocols offer a tangible means of resisting centralized control and pervasive observation. Unlike centralized digital systems that collect and exploit data to manipulate behavior, decentralized technologies enable an open potential state where individuals can act freely, without fear of surveillance-induced consequences. They preserve privacy, protect free will, and create opportunities for genuine personal and spiritual growth. This decentralization aligns with divine principles of freedom, spontaneity, and diversity, reflecting the open and unpredictable nature of the universe itself. By choosing decentralized solutions, individuals can restore a more authentic connection to both digital and spiritual realms.
This shift is not purely technical; it’s deeply spiritual. Just as spiritual awakening requires a release from the bondage of sin and ignorance, digital liberation demands a conscious move away from surveillance-driven systems. Breaking free involves more than just switching technologies; it requires a transformation of mindset—one that recognizes surveillance as a spiritual and existential threat. It calls for the cultivation of awareness, discernment, and a willingness to embrace both technological sovereignty and spiritual autonomy. True salvation, in the context of a Cyber Gospel, is a holistic journey that requires overcoming both physical and digital chains. It is the fusion of spiritual liberation with the adoption of decentralized tools that enable true freedom in a digital world.
Ultimately, a Cyber Gospel serves as a guide for navigating this complex spiritual-digital landscape. It invites readers to explore how decentralized technologies can facilitate a digital exodus, moving humanity from a singular collapsed state to an open potential state where free will and spiritual growth can flourish. This path forward is both a call to action and a call to awakening. It urges readers to actively participate in building a future where technology serves as a bridge to liberation rather than a tool of control. As the lines between spiritual and digital realities blur, embracing this new form of salvation becomes not only possible but necessary for the soul’s journey toward wholeness and freedom. The Battle for the Soul in the Digital Age
The digital age is not just a technological revolution; it is a spiritual battleground where the soul's potential is tested by the forces of surveillance and control. In this new landscape, salvation must be reimagined as both spiritual and digital—a quest that demands free will, genuine choices, and the preservation of human potential against a backdrop of pervasive observation. Throughout this discussion, we have explored the nature of digital salvation, the essential role of free will, and how surveillance acts as a force that collapses human potential into a singular, predictable state. We have drawn parallels between quantum mechanics and human behavior, illustrating how surveillance, like the observer effect, restricts possibilities and narrows the range of spiritual and existential outcomes.
Yet, there is a path forward. Decentralized technologies offer a chance to resist this collapse and restore an open potential state, allowing for personal and spiritual growth in an age where control mechanisms seek to limit both. This liberation is not just about escaping technological constraints; it is about reclaiming the divine spark of free will, which is essential for true awakening. As we move deeper into this digital era, the challenge is clear: salvation must involve breaking free from the dual chains of spiritual ignorance and digital manipulation.
A Cyber Gospel can serve as a guide for navigating this complex terrain, calling for both spiritual and digital awakening. It asks seekers to reflect deeply on the nature of their freedom and the forces that shape it. The final question remains: Can the soul be truly free in a world of constant surveillance, or must it find a way to escape to achieve salvation? This question is not just philosophical but practical, urging users to consider how they can actively participate in the creation of a more liberated reality—both spiritually and digitally. The battle for the soul in the digital age is not just about avoiding surveillance; it is about embracing a deeper, more transformative form of freedom that aligns with both divine principles and technological sovereignty.
-
@ f7124c44:364cb601
2024-11-23 15:50:59I have just got an new desktop and I wanna mine bitcoin. How can I mine it?
-
@ 502ab02a:a2860397
2024-11-22 17:58:24แนวคิด : ช้างเป็นสัตว์ในสัญลักษณ์ประจำจังหวัด สุพรรณบุรี เป็นการศึกแบบ ยุทธหัตถี จึงดึงเอาเฉพาะตัวช้างมาเป็นคาแรคเตอร์ในงานชิ้นนี้ ทำเป็นกึ่งๆช้างเผือก แทนความเป็นดาวรุ่ง มีการสวมเสื้อยืดลาย บิทคอยน์ และรองเท้าสีส้มตามสีของบิทคอยน์ กระพริบตา 1 ข้างเพื่อความน่ารักและเชิญชวนให้มาใช้บริการ
Link Download https://drive.google.com/drive/folders/1cXzbTCI0CqT9RWRETtwNLia7chL8Fyga?usp=sharing
Concept: An elephant is a symbol of Suphanburi Province, representing the historic royal battle of "Yutthahatthi" (elephant duel). This character is inspired by an elephant, designed as a semi-white elephant symbolizing a rising star. It wears a Bitcoin-themed T-shirt and orange shoes, representing Bitcoin's color. To add charm and invite engagement, the elephant winks playfully with one eye, encouraging people to use the service. Link Download https://drive.google.com/drive/folders/1cXzbTCI0CqT9RWRETtwNLia7chL8Fyga?usp=sharing
-
@ e1d968f7:5d90f764
2024-11-22 17:53:05No matter how long you’ve been escorting, nerves have a way of sneaking in. Whether it’s meeting a new client or stepping into an unfamiliar situation, the butterflies in your stomach are a reminder of how human this work really is.
Why Nerves Happen
For me, nerves often come from the unknown. Will the client be respectful? Will there be chemistry? Sometimes, it’s just the anticipation of wanting everything to go smoothly. Escorting requires stepping into new dynamics constantly, and even the most seasoned escorts aren’t immune to feeling a little shaky at times.
How I Manage Nerves
Over time, I’ve developed strategies to manage my nerves and channel them into positive energy:
- Preparation: Feeling prepared eases a lot of my anxiety. Whether it’s choosing the perfect outfit, double-checking details, or reviewing boundaries, preparation makes me feel in control.
- Breathing Techniques: Before a booking, I take a few minutes to breathe deeply. Inhale for four counts, hold for four, and exhale for four. It’s simple, but it helps calm my mind and body.
- Positive Self-Talk: I remind myself of my strengths—my confidence, professionalism, and ability to connect with people. Replacing self-doubt with self-assurance is powerful.
- Focusing on the Client: Shifting my attention away from my nerves and onto making the client feel at ease often takes the edge off. When they’re comfortable, I naturally relax too.
The Role of Experience
With each new booking, I’ve learned that most of my fears are unfounded. The more experiences I’ve had, the more I’ve built trust in my ability to handle any situation. Even when things don’t go perfectly, I know how to recover and stay professional.
When Nerves Persist
Sometimes, nerves stick around no matter how prepared I feel. In those cases, I acknowledge them rather than fight them. Accepting that being a little nervous is natural often helps me work through the feelings more quickly.
The Upside of Nerves
Oddly enough, nerves can be a good thing. They keep me sharp, reminding me to stay present and attentive. They also show that I care about the experience—for myself and for the client.
The Takeaway
Nerves are a normal part of escorting, no matter how experienced you are. It’s not about eliminating them but learning to manage them and use them to your advantage. Over time, they become less about fear and more about anticipation—an energy that can enhance the entire experience.
Tomorrow, I’ll share a glimpse into the unique client relationships that keep this work interesting and meaningful. Until then, embrace the nerves—they’re just another part of the journey.
Rebecca x
This blog post reflects on the inevitability of nerves in escorting and offers practical strategies to manage them. It’s a reminder that even in moments of vulnerability, confidence can be cultivated and strengthened.
-
@ 502ab02a:a2860397
2024-11-22 17:50:23แนวคิด : ที่มาของคำว่า 8ริ้ว ชื่อเล่นของจังหวัดฉะเชิงเทรา มาจากปลาช่อนขนาดใหญ่ ที่สามารถแบ่งได้ถึง 8 ริ้ว จึงออกแบบให้เป็นรูปปลาช่อน แล้วติดเหรียญเลข 8 เอาไว้ ทั้งเป็นเลขมงคลและเป็นการแทนค่า 8ริ้ว ของปลาด้วย ด้านหลังเป็นสัญลักษณ์ bitcoin พร้อมคำว่า ฉะเชิงเทราเป็นภาษาอังกฤษ และกำกับภาษาไทยที่ด้านล่างอย่างโดดเด่น Link Download https://drive.google.com/drive/folders/1i6DU2jt_fgUQUAfPqOsJa1h6C-rrIPy2?usp=sharing
Concept: The origin of the nickname “8 Riew” for Chachoengsao Province comes from a large snakehead fish that could be cut into eight large slices. The design incorporates an image of a snakehead fish with an “8” coin to represent both the rich number and the symbolic “8 Riew” slices. The background features the Bitcoin symbol along with “Chachoengsao” in English and prominent Thai text below. Link Download https://drive.google.com/drive/folders/1i6DU2jt_fgUQUAfPqOsJa1h6C-rrIPy2?usp=sharing
-
@ 502ab02a:a2860397
2024-11-22 17:40:03แนวคิด : ห้วยผึ้ง ใช้ผึ้งงานเก็บน้ำผึ้งเข้ารัง ให้รังเป็นตัวแทนของการออม bitcoin ในลักษณะ stack sats ค่อยๆเก็บหอมรอบริบ make saving great again โดยผึ้งงานเป็นตัวแทนของ proof of work ซึ่งตัวน้ำผึ้งที่หอมหวานนั้น มีคุณค่า ไม่เสื่อมไปตามกาลเวลา เป็นยาอายุวัฒนะ และเป็นของมีค่าโดยธรรมชาติ Link Download https://drive.google.com/drive/folders/1Itj0C0aIBWvpnZuuW1Z04nif_NNfPQg6?usp=sharing
Concept: Huai Phueng uses an image of a worker bee collecting honey for the hive, where the hive symbolizes saving Bitcoin in a “stack sats” manner, gradually accumulating and making saving valuable again. The worker bee represents proof of work, while the sweet honey, with its timeless value, serves as both an elixir and a naturally precious resource. Link Download https://drive.google.com/drive/folders/1Itj0C0aIBWvpnZuuW1Z04nif_NNfPQg6?usp=sharing
-
@ 9bc2d34d:d19d2948
2024-11-22 17:39:55As I am studying Biology, I needed a quick snack and created this 5 minute meal to hold me over. It is a very simple, basic recipe that could be customized in many ways. You like onions? Add them. You like tomatoes? No problem. The options are limitless.
https://zap.cooking/recipe/naddr1qq8xsmm594jx7eeddeskx6r0wvpzpx7z6dxam2pajs4plhfk5ay8lx4wcaqdkf8209ejmy8rs0ge622gqvzqqqr4guaw0c88
-
@ f8a5df57:b7a58cd4
2024-11-23 15:11:20В 2040 году система «Умный дом» в Москве стала частью городской жизни, обеспечивающей жителям комфорт, безопасность и экономию ресурсов. Инновационные технологии изменили подход к управлению жильем, сделали его более доступным и эффективным.
Система «Умный дом» представляют собой интеграцию современных технологий, которые позволяют управлять всеми аспектами домашнего хозяйства посредством мобильных приложений. Жители могут контролировать освещение, отопление, охрану и даже бытовую технику с помощью простого управления на своих смартфонах. Например, система автоматически регулирует температуру в помещениях в зависимости от времени суток и присутствия жильцов, что позволяет экономить до 40% электроэнергии. Какие еще есть внедрения? 1. Автоматизация освещения: свет включается и выключается по расписанию или при наличии людей в комнате. 2. Установка систем безопасности: видеонаблюдение и сигнализация обеспечивают защиту жилья, функция «имитация присутствия» отпугивает опасных злоумышленников. 3. Возможность подбора комнатной температуры : системы отопления и кондиционирования работают в автоматическом режиме с учетом погодных условий и предпочтений жильцов. Интеллектуальные счетчики: они автоматически передают данные о потреблении ресурсов в управляющие компании, избавляя жильцов от необходимости вручную фиксировать происшествия. В 2040 году почти 95% новостроек в Москве уже оборудованы такими цепями, что делает их стандартом для современных жилых комплексов. Это не только повышает уровень комфорта, но и способствует устойчивому развитию города за счет снижения потребления энергии и ресурсов.
Современные технологии «Умного дома» в Москве 2040 года показывают, как инновации могут улучшить качество жизни горожан. По словам Екатерины Ломтевой, генерального директора "Ricci | Жилая недвижимость", применение таких систем стало привычной для застройщиков. Они не только делают жизнь более комфортной, но и помогают оптимизировать управление ситуацией, что особенно актуально в условиях растущего населения и ограниченных внешних ресурсов. В будущем возможно дальнейшее развитие технологий, которые будут еще более интегрированы в повседневную жизнь москвичей.
Автор: Ксения Данилова
-
@ 319ad3e7:cc01d50a
2024-11-22 17:31:32This is the perfect recipe for the lazy, hungry, and want-all-the-salt moments.
https://zap.cooking/recipe/naddr1qq8xsmm594jx7eeddeskx6r0wvpzpx7z6dxam2pajs4plhfk5ay8lx4wcaqdkf8209ejmy8rs0ge622gqvzqqqr4guaw0c88
-
@ 9bc2d34d:d19d2948
2024-11-22 17:26:28Chef's notes
Hot Dogs? Check. Cheese? Check. Jalapeno? Definitely (unless you can't handle the spice)
Details
- ⏲️ Prep time: 1 minute
- 🍳 Cook time: 3-5 minutes
- 🍽️ Servings: 1-4
Ingredients
- 3 Hot Dogs (Sliced Thinly or Cut into Chunks)
- Handful of Shredded Cheese Blend
- 1/4 Jalapeno minced (add less or more)
- Optional: Any toppings you like on nachos, such as tomatoes, onions, sour cream, beans, etc
Directions
- Microwave 3 hot dogs for 2-3 minutes (some hot dogs will expand)
- Top with cheese
- Microwave for 1-2 minutes (until cheese is melted)
- Sprinkle all your favorite toppings on top
- Serve
-
@ 6bae33c8:607272e8
2024-11-22 17:23:13I went 1-4 last week to blow any chance I had at cashing in Q3, so this is kind of a practice week before we head into Q4.
Colts +7.5 vs Lions — The Lions are a juggernaut, and they were my only correct pick last week, but this feels like a sell-high against a scrappy Colts team, and Anthony Richardson played better last week.
Bears +3.5 vs Vikings — The Bears should have beaten the Packers last week, and I expect them to hang with the Vikings at home.
Raiders +6 vs Broncos — The Broncos looked great last week, but this is an easy sell-high on the road against a division rival.
Cardinals pick ‘em at Seahawks — The Seahawks are a sell-high after their win over the 49ers, and the Cardinals are playing well of late and coming off the bye.
Ravens -2.5 at Chargers — The Ravens are one of the league’s top-four teams, and they’re desperate after blowing a winnable game to the Steelers.
-
@ 892ab9bd:e686de59
2024-11-22 16:32:36From Concept to Revolution
Bitcoin, the world’s first decentralized digital currency, has had a profound impact on finance, technology, and global economics since its inception. From its mysterious beginnings in 2008 to its rise as a mainstream asset, Bitcoin’s journey has been marked by technological innovation, economic uncertainty, and philosophical debates about the future of money. Here’s a look at the history of Bitcoin, from its creation to its emergence as a global phenomenon.
The Whitepaper and Satoshi Nakamoto
The story of Bitcoin begins in late 2008, when an individual or group of individuals under the pseudonym Satoshi Nakamoto released a whitepaper titled “Bitcoin: A Peer-to-Peer Electronic Cash System.” This document outlined a new form of money that was designed to be independent of central banks, immune to inflation, and capable of enabling secure, anonymous online transactions without the need for intermediaries like banks or payment processors. The whitepaper proposed a decentralized, trustless system that would use cryptography to secure transactions and a distributed ledger known as a blockchain to record them. By using a network of nodes (computers), Bitcoin would allow participants to transfer value directly, without the risk of fraud, double-spending, or the need for a trusted authority.
As Bitcoin's technology began to spread, early adopters started setting up online exchanges where people could buy and sell Bitcoin for traditional currencies. Mt. Gox, founded in 2010, became one of the first and largest Bitcoin exchanges, although it would later be infamous for being hacked in 2014, leading to the loss of millions of dollars' worth of Bitcoin. At the same time, Bitcoin mining became a way for people to earn newly minted BTC by dedicating computational power to solving complex mathematical puzzles. The reward for mining a block, known as the block reward, was initially 50 BTC, and it served as an incentive for participants to secure the network and validate transactions.
The Silk Road and Dark Web
During this period, Bitcoin gained notoriety for being used on The Silk Road, an online black market that facilitated anonymous transactions for illegal goods and services. This association helped solidify Bitcoin's reputation as a tool for privacy-conscious individuals, but it also attracted the attention of regulators and law enforcement agencies. By 2013, Bitcoin’s price began to surge again, reaching $266 in April before falling to around $50. During this time, Bitcoin’s network began to grow, and the first wave of institutional interest began to emerge, with companies like WordPress and Overstock accepting Bitcoin as payment
Conclusion
From its humble beginnings as a theoretical concept to its current status as a revolutionary force in the global economy, Bitcoin has come a long way. Its story is one of technological innovation, economic disruption, and ideological conviction. Whether Bitcoin will continue to thrive as a digital currency, a store of value, or something else entirely, it has undeniably reshaped the world’s understanding of money and finance. As we move into the future, Bitcoin’s role in the global economy will continue to evolve, challenging conventional wisdom and pushing the boundaries of what is possible in the world of digital finance.
-
@ 4874b840:31b0b8c0
2024-11-23 12:54:03В нашем городе внедряются биометрические технологии, которые меняют подход к обеспечению общественной безопасности. В парке "Южный" установлены камеры с функцией распознавания лиц, которые фиксируют правонарушения в реальном времени. На днях группа молодых людей, не заметив знаков, запрещающих курение, устроила пикник. Когда один из них закурил, камера зафиксировала нарушение, и через несколько секунд на его смартфоне появилось уведомление о штрафе в 500 рублей, отправленное на аккаунт в госуслугах.
По словам Игоря Сидорова, начальника отдела цифровой безопасности городской администрации, "наша цель — создать безопасную среду для всех жителей. Биометрические технологии позволяют нам быстро реагировать на правонарушения и формировать культуру соблюдения правил".
Однако не все калининградцы поддерживают этот подход. Некоторые выражают опасения по поводу вторжения в личную жизнь и возможных ошибок системы, которые могут привести к несправедливым штрафам.
-
@ 8dc86882:9dc4ba5e
2024-11-22 16:17:57So, many people in the tech world seem to just hate all things to the right. It is a very left centric group, at least the most vocal members. Because of this, they tend to operate with blinders on and don't look at opportunity.
With the creation of DOGE (Department of Government Efficiency) there is a much better chance than in the past to push change in the government. That is, if they do as they say they will. I will give them the benefit of the doubt.
What do you suggest then, tech community? People have been saying the Government should be running open source software, getting away from Microsoft, for decades now. It was almost a utopian dream I've heard repeated through my years as a Linux and Open Source user. Now is the time to push it, speak up.
If there was going to be any other time to speak up, now is it. Open source can decrease bureaucracy, cut costs, and limit outside interests in governmental departments. It fits the DOGE team's goals exactingly.
It's time for all the open source advocates to put their hatred for the right aside and take advantage of this one time period. I will bet, once this presidential term ends, this department will be castrated of any real power if not removed completely. It's now or never in my opinion.
-
@ 4874b840:31b0b8c0
2024-11-23 12:52:02В Калининграде стартовал проект «Город в цвете», в рамках которого 12 домов в центре города будут разукрашены яркими граффити. Эскизы для рисунков созданы искусственным интеллектом с учетом местных культурных особенностей.
После встречи с жителями, на которой обсуждались идеи, художники начали подготовительные работы и нанесение красок. К вечеру несколько домов на улице Ленина уже получили новые образы, отражающие калининградские пейзажи. Местные жители активно делятся фотографиями в социальных сетях и выражают восторг от преображения.
«Это просто невероятно! Я никогда не думал, что наши дома могут выглядеть так ярко и стильно. Граффити действительно отражают дух нашего города», — поделился своими впечатлениями местный житель Алексей. Проект стал началом новой традиции в городе.
-
@ 4874b840:31b0b8c0
2024-11-23 12:50:31В минувшую ночь, 11 декабря, в Музее янтаря произошла попытка вандализма, которая была успешно предотвращена благодаря современным системам безопасности.
Группа молодых людей попыталась повредить экспонаты музея, однако сработала сигнализация, оснащенная датчиками движения и камерами с распознаванием лиц. В результате полиция прибыла на место происшествия в кратчайшие сроки и задержала злоумышленников, оказавшихся несовершеннолетними.
Директор музея подчеркнула, что инцидент подтвердил важность инвестиций в технологии охраны культурного наследия: «Мы постоянно обновляем наши системы безопасности, чтобы защитить уникальные экспонаты. Этот случай показал, что наши усилия не напрасны, и мы будем продолжать работать над улучшением охраны».
-
@ 599f67f7:21fb3ea9
2024-11-22 14:07:44Veamos nuevamente la transacción de compromiso de Alice. Esta gasta de la transacción de financiación y tiene dos salidas: una salida
to_local
y una salidato_remote
.to_remote
La salida
to_remote
es simplemente un P2WPKH enviando a la clave pública de Bob.<remotepubkey>
to_local
La salida
to_local
tiene 2 caminos de gasto.- Una
<revocationpubkey>
- Una clave pública que pertenece a Alice pero que solo se puede gastar después del número de bloques
to_self_delay
.
OP_IF # Transacción de penalización <revocationpubkey> OP_ELSE `to_self_delay` OP_CHECKSEQUENCEVERIFY OP_DROP <local_delayedpubkey> OP_ENDIF OP_CHECKSIG
En el Capítulo 2, describimos la revocación de la siguiente manera:
- Alice genera una clave privada temporal
dA1
y una clave pública correspondientePA1
y envía la clave pública a Bob. - Alice luego crea una transacción de compromiso donde la salida
to_local
es inmediatamente gastable por Bob si tiene la clave privadadA1
. - Si Alice y Bob actualizan el estado de su canal, entonces intercambiarán las claves privadas anteriores entre sí para invalidar el compromiso anterior, es decir, Alice enviará a Bob
dA1
.
Esta descripción es mayormente correcta pero no completa. Si echamos un vistazo nuevamente al script
to_self_delay
anterior, parece que el camino de revocación no tiene ninguna condición que diga que solo Bob puede gastarlo. Simplemente parece que cualquiera con la clave privada correspondiente a la clave pública de revocación puede gastarlo. Dado que Alice es quien generó la clave privada temporal en primer lugar, ¿no significa eso que también puede gastarlo?Se utiliza un truco ingenioso para asegurarse de que solo Bob pueda gastar a través del camino de revocación. Antes de construir las transacciones de compromiso, tanto Alice como Bob derivan dos claves temporales y claves públicas asociadas.
1. Un par de clavesrevocation_basepoint
(r -> R)
2. Un par de clavesper_commitment_point
(c -> C)En otras palabras, Alice tendrá:
- su par de clavesrevocation_basepoint
:rA1
->RA1
- su par de clavesper_commitment_point
:cA1
->CA1
Bob tendrá:
- su par de clavesrevocation_basepoint
:rB1
->RB1
- su par de clavesper_commitment_point
:cB1
->CB1
Ahora, cuando sea el momento de que Alice construya la transacción de compromiso, enviará a Bob su clave pública del punto de compromiso
CA1
. Bob le enviará su clave pública del punto base de revocaciónRB1
. Alice ahora puede derivar la clave pública de revocación que se incluirá en la transacción de compromiso de la siguiente manera:Rev_A1 = R_B1 * sha256( R_B1 || C_A1 ) + C_A1 * sha256( C_A1 || R_B1 )
Ahora la salida
to_local
de Alice se ve así:OP_IF <Rev_A1> OP_ELSE `to_self_delay` OP_CHECKSEQUENCEVERIFY OP_DROP <alice_delayedpubkey> OP_ENDIF OP_CHECKSIG
Cuando sea el momento de que Alice y Bob actualicen el estado e invaliden el estado antiguo, Alice envía a Bob su clave privada para el punto de compromiso
cA1
. Con esta clave, Bob ahora tiene tanto la clave privada del punto de compromiso de AlicecA1
como su propia clave privada del punto base de revocaciónrB1
, que corresponde a la clave públicaRB1
que le envió a Alice anteriormente cuando Alice estaba construyendo la transacción de compromiso. Así que ahora, con estas dos piezas de información, Bob puede derivar la clave privada correspondiente a la clave públicaRev_A1
y, por lo tanto, gastar a través de la salida de revocación. Puede calcular la clave privada de la siguiente manera:rev_A1 = r_B1 * sha256( R_B1 || C_A1 ) + c_A1 * sha256( C_A1 || R_B1 )
Alice nunca podrá derivar esta clave privada porque no tiene y nunca tendrá la clave privada del punto base de revocación de Bob
rB1
.Ahora actualicemos los diagramas del Capítulo 2 para reflejar las nuevas cosas que hemos aprendido en este capítulo.
Estado 1:
Estado 2:
Revisión
- Dos pares de claves se generan al construir las transacciones de compromiso
- Se necesitan las claves privadas de ambos pares de claves para poder gastar desde el camino de revocación
Referencias
- BOLT3: Derivación de
revocationpubkey
- LN Things Part 3: Revocation in more detail por nostr:nprofile1qqswrt9pnxatlplu49h6meld8svmwqt87wwvk256rqk07n6eu4qeh5gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dszpfjtz
- Una
-
@ 5d4b6c8d:8a1c1ee3
2024-11-22 13:57:13Here are today's picks using my proprietary betting strategy at Freebitcoin. For details about what Risk Balanced Odds Arbitrage is and why it works see https://stacker.news/items/342765/r/Undisciplined.
There are more matches up, including some Budesliga, but they're too far out to find odds on.
For a hypothetical 1k wager on each match, distribute your sats as follows:
| Outcome 1 | Outcome 2 | Outcome 3 | Bet 1 | Bet 2 | Bet 3 | |--------------|-------------|--------------|-------|-------|-------| | Sevilla| Osasuna| Draw | 400| 300| 300| | Real Sociedad| Real Betis| Draw | 510| 210| 280| | Real Madrid| Getafe| Draw | 700| 120| 180|
RBOA is up almost 85k now. A ton of our past matches are being played tomorrow, so that will be a big test.
originally posted at https://stacker.news/items/778487
-
@ 9ff58691:0bf6c134
2024-11-23 11:58:15В Кургане состоялось долгожданное открытие новой экспозиции в музее науки и технологий, посвященной важной теме “Наука и человек”. Это событие стало знаковым моментом в культурной жизни города и шагом к развитию образовательной инфраструктуры.
На выставке представлены интерактивные технологичные экспонаты, которые позволяют посетителям не просто наблюдать, но и активно участвовать в процессе познания. Уникальные инсталляции включают в себя виртуальные симуляции, демонстрирующие достижения в медицине, экологии и инженерии, что делает науку доступной и интересной для всех.
Директор музея отметил, что новая экспозиция призвана вдохновить молодежь и пробудить интерес к научным исследованиям. Ожидается, что выставка привлечет внимание как школьников, так и студентов, стремящихся узнать больше о современных технологиях и их влиянии на жизнь человека.
Посетители уже начали знакомство с новыми экспонатами, а интерактивные элементы выставки особенно заинтересовали детей и взрослых. Это событие подчеркивает стремление Кургана стать центром науки и образования, способствуя развитию инновационного мышления среди горожан.
Автор: Эвелина Тимирбаева
-
@ 32092ec1:8e9fd13a
2024-11-22 13:14:39As one does when spending the vast majority of their social media time on Nostr, I find myself wondering, why are so many bitcoiners, in particular, not taking Nostr more seriously; what are they missing here? Are they just algo and attention whores who can’t stomach coming to a new platform and being held accountable for posting valuable content? Are they really thinking that by posting on twitter that they are “onboarding the normies”? Were they scared off because the tech wasn’t good in the really early days of Nostr?
It's funny because I also, obviously, think a lot about certain groups of people who also refuse to get into bitcoin in any kind of serious way. Like why isn’t every single libertarian a hard core bitcoiner? How are the gold bugs not getting the value prop that bitcoin is offering? It’s the most powerful weapon that we have ever had to combat war, excessive government spending, money printing, inflation and central banking. I’ve also been listening to some of the people who you would think would be into bitcoin, but somehow only believe in Monero…? hard core Monero maxis? Really?
In a recent interview with Natalie Brunell, Michael Saylor was asked about bitcoin as a store of value asset vs a currency:
“Currency not worth that much… If I said to the richest guy in the world… ‘Hey I have this little token and you can use it to buy coffee, and you don’t have to pay 2% to Visa, you can pay one Satoshi; how much of it do you want to buy?’ ‘Well, I guess I could buy 0.00001% of my wealth…’”
Another good point here by Saylor that helped me connect a couple more dots here.
If bitcoin were not scarce, if it did not comply with Austrian Economic principles, would it be actively taking over the world right now? Would it have grown past its silk road phase of adoption? I’ll speak for myself here, but I know that this is also true for the vast majority of bitcoiners, I came to bitcoin for the Number go Up (NgU) but became passionate about bitcoin for its Freedom go Up (FgU) technology. I was never a Silk Road user and I would have almost certainty stayed within my early conception of bitcoin, which was to equate it to World of Warcraft gold, if I didn’t watch it melt faces as a store of value asset.
But the fact remains that bitcoin is freedom tech. Bitcoin has the potential to increase freedom and sovereignty in a massive way. Will everyone on earth have a UTXO? Probably not. But in the current financial system how many sovereigns are there really? 1? 5? 10? The fact that you have to have defenses strong enough to protect your physical assets (buildings, gold, infrastructure, etc.) in order to protect your wealth, means that only those with the largest militaries in the world can withstand the kinds of attacks that I can easily withstand with a $150 air gapped signing device. Bitcoin is minting sovereigns by the thousands, millions perhaps. But is this why bitcoin adoption is on the rise?
The user experience on Nostr is improving at a rate that has never been seen in any new ecosystem on the internet. I believe that by being open source and interoperable, Nostr tech will win out over centralized platforms. Not just in social media, but in so many other internet applications as well. “Sign in with Nostr” will be the default someday and you will no longer need to sign up for an account for literally every single app in your pocket. You will never again be asked rebuild your contact list or your follower list in order to stay in touch with your friends and family. We are definitely still early to bitcoin, but we are much, much earlier to Nostr.
But the point remains that Nostr is freedom tech. The decentralized nature of relays means that even if I am being censored by one relay, I will always have access to another relay that will not censor me, and I will never again be in a situation where my freedom to speak will be threatened in a serious way. My freedom to hear other points of view, other opinions, contrarian science, foreign concepts, perspectives from other cultures, will never again be taken away. But is this why Nostr will win?
So back to my original question, what gives? Why are more people not coming into bitcoin or Nostr strictly for the freedom tech? I believe the answer is related to censorship. As much as we all know the level to which we can be censored, how many individuals are actively being censored in a major way right now?
When, by governmental decree, the Canadian truckers went from normal law-abiding citizens to being labeled terrorists who needed to be closed off from transacting using the banking system, bitcoin was one of the few escape valves. But if we are being honest, there were a lot of crypto projects that would have offered the same escape valve, including Monero, where they may not have been in a situation where on-chain surveillance companies could be used to track people down. Also, I would have to imagine that cash, as in paper notes and coins, were probably the most widely used way to transact when they were shut off from their bank accounts.
When Twitter kicked Donald Trump, the sitting president of the United States, off of their platform, what were his options? If Nostr existed in its current form, maybe he would have built his own Truth Social Nostr client… it certainly would have cost less to spin up and would have allowed him to start with a bigger user base. But that was literally one person who was censored. How many YouTube channels have been censored? thousands, millions? How many of them had a bad enough experience to leave their subscribers behind? And how many YouTube channels were not censored?
Censorship has been on the rise in a major way over the last several decades. And while some are finally getting the picture that moving to another centralized platform that can also censor them maybe isn’t the best solution, this isn’t happening in a major way to the masses. But censorship can, and it very well may, start happening in a much more significant way in the future… possibly even the near future.
So, if Michael Saylor asks his billionaire buddies how much they would pay to transact freely when they are actively being censored financially, I bet they would answer that question about freedom money a lot differently. And if big tech platforms start censoring their users by the tens or hundreds of millions, I bet that even the normies would see the value of Nostr and the ability to communicate freely.
The good news though, is that I believe we may be moving into a world that is pushing back against the censorship industrial complex. Maybe in 10 years, money and media will be less censored, not more. If that is the case, currency would remain a terrible investment and twitter would remain a public square. But the fact is, that bitcoin and Nostr will both still win in that environment because of their other characteristics. Bitcoin offers inviolable absolute scarcity, something that asset holders have never had access to in the history of humankind. The open-source internet technology that allows social graphs to travel with its users (Nostr) will win because the tech is better, and the user experience is better than its centralized competitors.
Bitcoin and Nostr are freedom tech and they will almost certainly be a major factor in improving freedom around the world. But I believe that they will win because of their better user experience. Bitcoin offers a store of value that no one can violate. Nostr allows builders to capitalize on the advancements of every other builder in the space, meaning that if an open-source feature is rolled out on one client, all the clients will magically have access to that feature.
We’re gonna win freaks. Stay humble, stack sats and zap notes.
871493
-
@ 9ff58691:0bf6c134
2024-11-23 11:55:56Жители Кургана, мы рады сообщить вам о новых инициативах городской администрации, направленных на поддержку психологического благополучия наших жителей!
🧠 В Кургане открылся современный Центр психологической помощи, оснащенный по последнему слову техники. Здесь вы можете пройти комплексную диагностику с использованием технологий виртуальной реальности и ИИ-ассистентов. Специалисты центра разработают для вас индивидуальную программу восстановления и развития ментального здоровья.
"Наш Центр использует самые передовые методики в области психологии и психотерапии. Мы применяем технологии нейровизуализации, AI-анализа эмоций и когнитивного моделирования, чтобы максимально точно определить потребности каждого клиента и помочь ему достичь гармонии", - комментирует Ольга Соколова, ведущий психолог Центра.
💻 Кроме того, в Кургане запущена программа "Цифровой психолог" - бесплатный онлайн-сервис психологической поддержки для всех жителей. С помощью чат-ботов, виртуальных консультантов и мобильных приложений вы можете получить квалифицированную помощь в любое время, не выходя из дома.
🏫 Также в школах и университетах Кургана открываются специальные кабинеты психологической разгрузки. Здесь студенты и ученики могут отдохнуть от учебной нагрузки, пройти сеансы арт-терапии или медитации с использованием VR-технологий.
Забота о ментальном здоровье - один из ключевых приоритетов для администрации Кургана. Мы уверены, что эти инициативы помогут нашим жителям справляться со стрессами и жить более счастливой и гармоничной жизнью.
Автор: Елизавета Медведева
-
@ 9ff58691:0bf6c134
2024-11-23 11:54:39В Кургане, как и во всем мире, технологические стартапы играют все более важную роль в бизнесе. Эти инновационные компании не только создают новые рабочие места и стимулируют экономический рост, но и меняют саму суть бизнеса.
Новые стартапы в Кургане В последнее время в Кургане появились несколько новых стартапов, которые уже показали свою эффективность. Например, компания "КурганТех" разработала инновационную систему управления логистикой, которая позволяет оптимизировать доставку товаров и услуг. Другой стартап, "КурганАгро", создал систему мониторинга и управления сельскохозяйственными процессами, которая позволяет фермерам увеличить урожайность и снизить затраты.
Особенности стартапов в Кургане Стартапы в Кургане имеют несколько особенностей, которые отличают их от других компаний. Во-первых, они часто фокусируются на решении конкретных проблем, которые актуальны для региона. Например, компания "КурганЭко" разработала систему утилизации отходов, которая позволяет сократить количество мусора в городе. Во-вторых, стартапы в Кургане часто сотрудничают с местными университетами и исследовательскими центрами, что позволяет им получить доступ к новейшим технологиям и экспертизе.
Внедрение новых технологий Стартапы в Кургане активно внедряют новые технологии, такие как искусственный интеллект (ИИ), блокчейн и интернет вещей. Например, компания "КурганТех" использует ИИ для оптимизации логистических процессов, а компания "КурганАгро" использует блокчейн для создания прозрачной и безопасной системы управления сельскохозяйственными процессами.
Отличия стартапов в 2040 году от 2024 Стартапы в 2040 году отличаются от стартапов в 2024 году несколькими ключевыми аспектами:
• Больший акцент на экологической устойчивости: Стартапы в 2040 году часто фокусируются на решении экологических проблем и создании устойчивых бизнес-моделей. • Более широкое использование новых технологий: Стартапы в 2040 году активно внедряют новые технологии, такие как ИИ, блокчейн и IoT, для решения бизнес-задач. • Более тесное сотрудничество с государством и обществом: Стартапы в 2040 году часто сотрудничают с государством и обществом для решения социальных и экономических проблем. • Более быстрый рост и масштабирование: Стартапы в 2040 году могут расти и масштабироваться быстрее, благодаря доступу к новым технологиям и глобальным рынкам.
В Кургане, как и во всем мире, технологические стартапы играют все более важную роль в бизнесе. Эти инновационные компании не только создают новые рабочие места и стимулируют экономический рост, но и меняют саму суть бизнеса. Мы будем продолжать следить за развитием стартапов в Кургане и рассказывать о их успехах.
Автор: София Багирова
-
@ 6bae33c8:607272e8
2024-11-22 12:58:24Sometimes when you have too much invested in the games, not so much financially, but emotionally, you forget to enjoy them. But with my one share of Jaylen Warren and Elijah Moore and having sat Cedric Tillman for Jonnu Smith contra the FantasyPros rankings, this wasn’t a huge one for me, so once the snow kicked in, I just allowed myself to watch as a fan. NFL snow games take you back to somewhere, whether it was Thanksgiving Day at your Uncle’s house in Michigan or Christmas break in New York when you were home from college. Everything is okay because there’s a game on, and in that game it is snowing
I also had the Browns +3.5 in my picking pool — such an obvious spot to fade the Steelers off their huge win against the Ravens before traveling on a short week.
-
The Browns offensive line really protected Jameis Winston well. He looked sharp enough in tough conditions against a good defense, the pick notwithstanding. In fact, the pick was on 3rd-and-10 and wasn’t even that bad. He also fumbled, again in tough conditions, but led them on the game-winning drive in the final minute.
-
Jerry Jeudy is emerging as Winston’s top target, though Tillman left early with a concussion. The Browns have good receivers including David Njoku.
-
It was a slog for Nick Chubb, but he scored twice and is looking more like himself.
-
Jaylen Warren looked much shiftier than Najee Harris and also caught three passes and ran for the TD. It was a throwback to last year where sometimes Harris got the work, but Warren scored the points.
-
The Steelers have George Pickens, speed merchant Calvin Austin and not much else. Pat Freiermuth is decent, but Van Jefferson is maybe the worst No. 2 in the league. No idea why Mike Williams hasn’t been involved for two games.
-
Russell Wilson was okay, but he’s yielding short yardage to Justin Fields now, and it’s not like Wilson had much value anyway. The Browns got a lot more heat than the Steelers did.
-
-
@ 0861144c:e68a1caf
2024-11-22 11:31:35In the days surrounding the US election, here in Stacker but also in other places, there were lots of debates whether is OK to support a politician or not. That's because of the position took by the crypto-industry that have a very active participation in the republican campaign, not only with words but also money and some proposals.
Those days prosecuted also with lots of comments of bitcoiners making arguments about how bad was the take made by the industry because, at the end of the day, Trump isn't a bitcoiner, it's a politician that takes maximum benefits from the crypto stuff. Now, having said these things, a couple of notes that I made while I was traveling.
We were victims of the nirvana fallacy
This I heard in the Lex's interview with Javier Milei, where he ask about his insertion into politics. Milei tells that lots of people, including anarcho-capitalists and liberals, criticized him a lot because he was getting with people not so trustworthy and was building a minarchist-style political campaign. The ones making critics argue that nothing is going to change and be truly free, so why bother to get into it?
Enter the nirvana fallacy, which states "...comparing actual things with unrealistic, idealized alternatives. It can also refer to the tendency to assume there is a perfect solution to a particular problem." So, what this has to do with us, as bitcoiners?
Well, some notes about where we are right now:
- @suraz puts you context in inflation, it's bad.
- @TomK still talking about economics downsides and new plans
So, what can you do?
Well, here is where I stated in the past that bitcoin is a political tool. Those who doesn't want to participate in politics, I'm sorry but in the moment you chose to opt-out the fiat system, you made a political act, stating your discomfort to participate in a system which promotes war and terrorism.
And some of them, tired of legislators who tirelessly chase the industry through the well-documented Operation ChokePoint 2.0, took a side.
Is the best solution to take a politician as ally? I think not, we don't like political intrusion into our lives but...hey, the world which we live in, either you accept that they want to intrude and try to guide them or leave it to those anti-crypto fascists.
We don't take a clear position, it has consequences, so I think is stupid not to fight against it, even if that means to get into the mud, look the other way and pretend we won because we just use it is to fool ourselves. We won't have hyperbitcoinization[^1] in our generation, maybe my kids would and in order to happen, we need hands in every aspect. I myself doubt that all promises are going to make it.
[^1]: I think hyperbitcoinization as it is, it's just nonsense invented by some dudes
So, yeah, the nirvana fallacy is real, those who claim or criticize bitcoiners for participate in politics behind a screen....fuck you but have a nice day.
originally posted at https://stacker.news/items/778354
-
@ 599f67f7:21fb3ea9
2024-11-22 10:26:18En el capítulo anterior, aprendimos cómo Alice y Bob abrieron un canal, utilizando transacciones de compromiso que pueden publicarse en la blockchain en cualquier momento para recuperar sus fondos. Pero, por supuesto, las transacciones de compromiso iniciales se vuelven inválidas tan pronto como cambia el estado del canal, en otras palabras, cuando se realiza un pago y el saldo del canal se distribuye de manera diferente entre los participantes del canal. En este capítulo, comenzaremos a aprender cómo Alice y Bob pueden acordar una nueva división de fondos, es decir, cómo dividir el saldo del canal de manera diferente e invalidar las transacciones de compromiso más antiguas que tienen.
💡 Cubriremos cómo funciona esto bajo el paradigma actual de cómo se actualizan los canales, llamado "LN-Penalty", nombrado así por el mecanismo de penalización utilizado para asegurar los fondos contra adversarios maliciosos. Hay una propuesta más nueva llamada "LN-Symmetry" (anteriormente eltoo) que no requiere el mecanismo de penalización para ser segura y simplifica este proceso, pero requiere modificaciones a las reglas de consenso de Bitcoin para funcionar.
Transacciones de compromiso asimétrico
En LN-Penalty, cada participante en un canal tiene una transacción de compromiso que representa el estado del canal. Las transacciones de compromiso que posee cada parte varían ligeramente. La razón de esto es asignar culpa. ¿Por qué es necesario asignar culpa? Porque necesitamos dejar claro qué parte transmitió su transacción de compromiso e identificar a la parte correcta para castigar si han publicado un estado inválido.
Configuración del estado
En el último capítulo, mostramos cómo Alice y Bob intercambiaron sus claves públicas para crear sus transacciones de compromiso iniciales. Echemos un vistazo más de cerca a cómo lucen estas transacciones de compromiso. Para simplificar, supongamos que el saldo total del canal es de 10 BTC y que Alice y Bob tienen cada uno 5 BTC en sus lados del canal. Para configurar sus transacciones de compromiso iniciales, cada parte primero crea una clave privada temporal, para Alice, llamémosla
dA1
, para Bob,dB1
. También calculan las claves públicas asociadas,PA1
para Alice yPB1
para Bob. En este punto, cada parte puede construir sus propias transacciones de compromiso. La de Alice se verá así:- Gastará la transacción de financiación.
- Tendrá dos salidas (o más, cuando haya HTLCs. Cubriremos eso en el futuro).
- La salida
to_remote
enviará a Bob sus 5 BTC de inmediato. - La salida
to_local
será más elaborada. Aquí pueden suceder dos cosas. Alice puede enviarse a sí misma los 5 BTC después de un OP_CSVto_self_delay
o puede ser gastada por Bob si puede demostrar que tiene la clave privada temporal de AlicedA1
.
De manera similar, Bob también puede construir la transacción de compromiso de Alice y proporcionarle su firma para ello. Alice puede firmar esta transacción válida ella misma en cualquier momento y transmitirla a la red, dándole la seguridad que necesita para recuperar sus fondos en caso de que Bob desaparezca.
En este punto, cualquiera de las partes puede transmitir sus transacciones de compromiso para cerrar el canal. Supongamos que Alice transmite la suya. Bob recibirá sus 5 BTC de inmediato. Alice tendrá que esperar el número de bloques
to_self_delay
antes de poder usar sus 5 BTC. Sin embargo, no necesita preocuparse por que Bob gaste su salida porque sabe que nunca compartió su clave privada con él.Invalidando el estado antiguo
Ahora Alice quiere enviarle a Bob 1 BTC usando su canal. Así que, al igual que en el paso anterior, cada parte genera nuevas claves privadas (
dA2
para Alice,dB2
para Bob), calcula las claves públicas asociadas (PA2
para Alice,PB2
para Bob) y comparte las claves públicas entre sí. Y nuevamente, ambos crean transacciones de compromiso para reflejar el nuevo estado del canal (Alice ahora tiene 4 BTC ya que transfirió 1 BTC a Bob; Bob ahora tiene 6 BTC).El problema, sin embargo, es que Alice todavía tiene su transacción de compromiso del paso anterior, donde tenía 5 BTC, lo cual es más rentable para ella. Para mostrarle a Bob que está invalidando el estado antiguo y comprometiéndose al nuevo estado, necesita enviarle a Bob su clave privada temporal inicial (
dA1
). Ahora, dado que Bob tiene esta clave, puede gastar la salidato_self
de Alice si ella alguna vez publica un estado antiguo e inválido, antes de que ella pueda reclamarlo (recuerda que la salidato_local
tiene unto_self_delay
).Bob también le envía a Alice su antigua clave (
dB1
) para invalidar su estado antiguo. No tiene razón para no hacer esto ya que su nuevo estado es más rentable para él.¡Eso es todo! Ahora hemos aprendido cómo Alice y Bob pueden transaccionar de manera segura estableciendo nuevos estados e invalidando estados antiguos.
Revisión
- Para actualizar el estado, cada participante del canal genera nuevos pares de claves y se envían mutuamente la clave pública.
- Para invalidar el estado, por ejemplo, cuando se realiza una transacción, cada participante del canal actualiza el estado y se envían mutuamente la clave privada del estado anterior.
Referencias
- BOLT3
- LN Things Part 2: Updating State por nostr:nprofile1qqswrt9pnxatlplu49h6meld8svmwqt87wwvk256rqk07n6eu4qeh5gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dszpfjtz
- eltoo
-
@ a012dc82:6458a70d
2024-11-22 10:04:49Table Of Content
-
Content
-
Conclusion
-
FAQ
-
You May Also Like
-
External Links
Bitcoin, a novel kind of digital currency, has seen a meteoric rise in popularity in recent years. Bitcoin is built on a decentralized peer-to-peer network that facilitates instant and secure money transfers between users without the need for a central authority or bank to act as a middleman, unlike conventional currencies produced and controlled by central banks. It uses encryption to verify the legitimacy of each transaction on the network, guaranteeing the safety of all financial data exchanged. All of these exchanges are also recorded in a public ledger that can be accessed by anyone on the network.
Nonetheless, despite this surge in popularity, it is still just as volatile as any other cryptocurrency. This begs the question: Will bitcoin still be a viable investment in 2023?
For those who have considered Bitcoin as a potential investment but are still unsure, this article is for you. In this post, we'll analyze Bitcoin's price history in detail and provide our thoughts on where you can get started with Bitcoin trading.
Is Bitcoin a Good Buy? An Overview
Whether you're trying to evaluate whether Bitcoin is a good investment or if you should purchase it, you should look at its price history.
Bitcoin is a cryptocurrency that operates on a peer-to-peer network and boasts of being the most decentralized digital money available. Also, Bitcoin's popularity as Bitcoin gold is rising. This is the case because of its indestructibility and limited availability.
This means that governments have no authority over Bitcoin or its use.Since Bitcoin's value is not tied to any one person or institution, it is extraordinarily resistant to manipulation and fraud.
When compared to fiat currencies, which can be readily inflated at the whim of central banks and governments, it is evident that Bitcoin genuinely offers a unique sort of monetary independence, especially considering that only 21 million Bitcoins are expected to be in circulation. That's about as near as we've gotten to digital gold as a civilization.
Yet, despite these solid underpinnings, is Bitcoin a good cryptocurrency to invest in?
Bitcoin is notable for being one of the few cryptocurrencies that is gaining acceptance by institutional investors, in addition to its utility as a currency and the potential to become a store of value. Due to its potential for mass adoption, Bitcoin is among the most promising digital currencies in terms of future price appreciation.
Bitcoin’s performance from inception to today
Researching the cryptocurrency's price history is crucial prior to making a purchase. Knowing this may help you predict its potential future course.
Bitcoin was first imagined in 2008 but didn't debut until 2009. From January 2009 until July 2010, when it reached a high of $0.008 per share, it traded at zero. In August of that year, it hit $0.08. The rate of growth slowed until April of 2013, when it finally reached $250.
However, it wasn't until Bitcoin reached a record high of $20,000 in December 2017 that the cryptocurrency became a worldwide sensation. Despite a pullback in 2018, Bitcoin continued its ascent in 2020, reaching a new high of $69,000 in November 2021.
Despite Bitcoin's re-entry into a bear market in 2022, early investors still stand to make hundreds of percentage points. Those who risked even $1,000 on Bitcoin in 2010 are now sitting on multimillion-dollar fortunes.
Bitcoin Price
So far, you have a solid sense of whether or not Bitcoin is a viable cryptocurrency to invest in for the year 2023. Bitcoin has been on an upward trend from 2009 until 2022, with some dips in between.
For the better part of 2022, Bitcoin followed the trend of the rest of the financial markets and suffered from the same problems that they did, including the conflict in Ukraine and the surge in inflation that slowed the global economy.
Bitcoin is selling above $19,000 in October 2022, and there have been no immediate signals of a severe correction.
Bitcoin highs and lows
We have tracked Bitcoin's price history from its introduction to the market till now.
However, to help you understand, let's review Bitcoin's price trend briefly.
-
When Bitcoin first appeared online in 2009, its value was $0.
-
In July 2010, Bitcoin was officially recognized as currency at a price of $0.0008.
-
In April 2013, the price of Bitcoin reaches $250 for the first time.
-
In December 2017, Bitcoin reached an all-time high of $20,000, making it the most expensive digital currency in the world at the time.
-
Bitcoin's price drops to $3000 by the end of 2018 after entering a bear market in January 2018.
-
In November 2021, Bitcoin will reach its highest price ever, at $69,00.
-
Bitcoin falls to $19000 in October 2022 after a prolonged bear run throughout the year.
You can see whether Bitcoin is a suitable cryptocurrency to invest in for 2023 based on its price movement. You should only invest the amount of money that you can afford to lose, since there are dangers associated with cryptocurrency investments.
Bitcoin Price Forecast
You should recognize that all Bitcoin price projections are speculative before you determine whether or not Bitcoin is a viable investment. However, given that they are based on both fundamental and technical research, these forecasts should be seen as wild guesses rather than hard facts.
Many experts in the cryptocurrency business predict that Bitcoin's price will rise in 2023. The median estimate for Bitcoin's price in 2023 is $30,000, Bitcoin is predicted to fare well in the long run, although this time horizon is rather distant. Experts predict that by 2025, the price of bitcoin will have risen to $200,000 or more.
So is Bitcoin a good investment?
Bitcoin, being the first successful cryptocurrency, saw its popularity grow at a faster rate than its competitors. Because of this, it has gained popularity, particularly in authoritative circles. Because of this, its worth could increase over time.
Bitcoin's value is based, primarily, on how scarce it is. Because only 21 million bitcoins will ever be created and sold on the market, its value will only rise as demand outstrips supply.Because of this, it has attracted a lot of attention from investors who want to obtain a piece of the rapidly growing cryptocurrency sector.
Bitcoin's distinctive mix of scarcity and usability is what will continue to attract new buyers. Profits from trading this more precious commodity are expected to rise as long as demand rises.
To help you evaluate Bitcoin's investing potential, we've listed some of the cryptocurrency's most fundamental applications below.
-
Bitcoin is useful for regular transactions. Given the decentralized nature of peer-to-peer transactions, no central authority could possibly regulate these settlements.
-
Bitcoin, due to its limited supply, has the potential to serve as a currency equivalent to gold.
-
Due to its decentralized character, Bitcoin works well as a medium of exchange and savings.
Because Bitcoin is decentralized, some governments, headed by El Salvador, have begun using it as their official currency. That's why I think Bitcoin's future is so bright.
Where to Buy Bitcoin
In 2023, if you still want to invest in Bitcoin, make sure you do it via a reliable cryptocurrency exchange. Your protection from online thieves would be enhanced if you kept your Bitcoin in a secure cryptocurrency wallet.
eToro – Top Broker to Invest in Bitcoin in 2023
When it comes to the bitcoin market, eToro is a major player. More than 20 million individuals throughout the world utilize eToro, demonstrating the service's reliability. One reason to trust eToro, a cryptocurrency broker, is that it is governed by a recognized authority. Thus, you may be certain that your funds are secure at all times. U.S., U.K., Cypriot, and Australian authorities have all approved eToro for use.
eToro also provides the flexibility of accepting a variety of payment methods for both deposits and withdrawals. There are a wide variety of payment options available to you today, including wire transfers, debit cards, and e-wallet services like PayPal, Skrill, and Neteller.
Also, eToro is great since it accepts deposits of quite modest sums. You may start an account with eToro with as little as $50 and make transactions for as little as $10. You may buy a small yet diversified portfolio of 5 different cryptocurrencies for less than $50.
It's also worth noting that eToro provides a secure place to keep your crypto. Since your Bitcoin and other cryptocurrencies are stored in an encrypted eToro wallet, you can rest certain that they are always safe in your possession.
Should I Buy Bitcoin?
Bitcoin's increasing popularity hasn't changed the fact that it's a very unstable digital currency. Thus, you may still be wondering, is Bitcoin a smart investment in 2023?
Let's take a look at some of the primary benefits of Bitcoin so you can make an educated choice.
-
Since there are only a fixed number of Bitcoin, the price will rise in tandem with demand.
-
Strategic institutions like governments and multinational organizations are increasingly adopting cryptocurrencies like bitcoin.
-
Bitcoin's high degree of security, when used to establish smart contracts, might help it capture a portion of the smart contracts industry.
Bitcoin is an excellent investment in principle, but the significant volatility of its price makes it risky. However, the fact that the volatility is so high implies that the potential for gains is also exponential. Plus, the risk is acceptable since eToro lets you put in as little as $10 to purchase cryptocurrency.
Conclusion
To find out whether Bitcoin is still a smart investment in 2023, we've covered all the bases in this essay. We have discussed why Bitcoin is a good investment, citing its rising popularity and decreasing number of coins.
However, there are a plethora of other cryptocurrencies available for purchase if you want to diversify your Bitcoin holdings. Look for small-market-cap cryptocurrencies with solid use cases to maximize your return on investment. Such alternative cryptocurrencies often beat Bitcoin by a substantial amount during bull markets, when fear of missing out (FOMO) is at its maximum.
FAQs
What do you think? Should I purchase Bitcoin in 2023? Bitcoin is a popular but limited cryptocurrency, and its value is increasing due to increased demand from investors and merchants. That bodes well for its expansion chances in the year 2023. Indeed, Bitcoin investments will be prudent in the year 2023.
Approximately how much will one Bitcoin cost in the year 2023? Nobody knows what the future holds for Bitcoin's price, but experts predict it will reach $30,000 by 2023.
Is it safe to put money into Bitcoin? Bitcoin stands out among other digital currencies because of its decentralized nature. Now that authorities' attention has shifted to the cryptocurrency sector, it's one of the safer cryptocurrencies to invest in.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ f8a5df57:b7a58cd4
2024-11-23 07:43:46Содержание сюжета:
Вчера в Москве состоялась долгожданная премьера нового фильма известного режиссера Дмитрия Макракова «Все или ничего». Мероприятие прошло в одном из самых престижных кинотеатров столицы и собрало множество звезд отечественного кино, а также поклонников творчества режиссера.
«Все или ничего» — это драмеди, рассказывающая о сложных взаимоотношениях между друзьями, которые решают рискнуть всем ради исполнения своей мечты. Фильм затрагивает темы дружбы, предательства и поиска себя в современном мире. Главные роли исполнили популярные актеры, которые уже успели завоевать сердца зрителей.
Реакция зрителей. После просмотра зрители были в восторге от глубины сюжета и мастерства актерской игры. Многие отметили, что фильм заставляет задуматься о важности выбора и последствиях, которые он может иметь. В социальных сетях пользователи активно делятся своими впечатлениями, подчеркивая эмоциональную насыщенность картины.
На пресс-конференции после премьеры Дмитрий Макраков отметил, что создание этого фильма стало для него настоящим вызовом. «Я хотел показать, как иногда мы готовы рисковать всем ради своих мечтаний, но не всегда понимаем, к каким последствиям это может привести», — заявил он.
Премьера «Все или ничего» стала ярким событием в культурной жизни Москвы и уже привлекла внимание критиков и зрителей. Фильм обещает стать одним из главных кинопроектов сезона и, возможно, получит признание на международных фестивалях. Не упустите возможность увидеть эту увлекательную историю на большом экране!
Автор: Рината Ситникова
-
@ 56501785:9d9a1e60
2024-11-22 06:21:10test
-
@ 524314bf:d1e30e55
2024-11-22 05:35:10Hello Fellow Stackers,
As many of you know, Stacker News will be completely eliminating it's custodial lightning wallet soon. Prior to this change, Stacker News could serve as a 'poor man's' ln proxy as the sats would go to the Stacker News node, then Stacker News would create a new payment to your node (depending on your wallet settings). This was an awesome tool for us Plebs, but I totally understand that it was probably never the intent of Stacker News to serve this purpose ; more of an emergent behavior. So, I mourn it's loss but I am excited for the next phase of the Stacker News value for value experiment.
So, what does this mean for lightning node runners that want to receive sats sent to their Stacker News ln address or want to receive sats from Stacker News activity instead of cowboy credits ? Well, it means that now when you setup a receive option, the receiving node will be exposed when a zap is sent to your Stacker News address. This is a bit of a bummer in comparison to the old setup.
With that said, Stacker News is providing an immediate solution for those users that do not want their node ID exposed. Stacker News now has a setting where you can turn on a proxy for any incoming sats to your Stacker News ln address, albeit at a cost of 10% of the receiving amount. I assume this will work to basically give you the same experience as before, with the Stacker News lightning node acting as the proxy before sats are sent to your node.
That's awesome that the option is available, but the price is pretty steep (I'd imagine that the price is set steep because Stacker News does not want to act in this function for its users ; this is a classy move to provide it at all even though Stacker News is not probably intending to be a leading privacy service provider in the lightning space). So, what is a pleb to do ? Well, there is a solution out there available to all plebs that can give you the proxy receiving privacy you want without paying 10% of your received sats for that privacy: Enter Zeuspay (https://docs.zeusln.app/lightning-address/intro/)
So, Zeuspay is an ln address that any LND node runner can use by setting up their node in the Zeus app via the available options. I won't go into detail how to do this (i'm happy to answer questions in the comments, but not really the point of this post to give a step by step tutorial), but essentially once you have set up your connection in Zeus to your LND node, there is an option in the setting to create your own Zeuspay ln address. This ln address is a bit different than custodial options you have experienced:
-
When sats are sent to this ln address, they actually need to be redeemed by you within the Zeus app within 24 hours. If not redeemed within 24 hours, they are sent back to the sender's wallet. This is how zeus set up the service so that it works best with their embedded mobile node as such nodes will not be online all the time.
-
When you redeem sats, those sats are then actually going first to the Zeus lightning node, and then to your node. Thus, it is a proxy for receiving sats that will not reveal your node to the original sat sender.
So, if a Stacker News user sets up their wallet config in Stacker News to receive sats using the ln address to their Zeuspay ln address, they will now have the privacy benefit of before. AND, what's great is that Zeus just recently dropped the receiving fees to 0 for this service (see the recent nost post here: https://njump.me/nevent1qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcpz9mhxue69uhkummnw3ezumrpdejz7qgawaehxw309ahx7um5wghxy6t5vdhkjmn9wgh8xmmrd9skctcpz9mhxue69uhkummnw3ezuamfdejj7qgewaehxw309aex2mrp0yh8xmn0wf6zuum0vd5kzmp0qqsdmf5h6kpzt2pxh0cmgf43uksjhklx07s49n2ydeh82lnqw83p2pqsph5ec). So, as long as you make sure to log into your Zeus app and redeem sats once a day, you can use this option to receive sats to your Stacker News ln address with a privacy proxy that does not utilize Stacker News' proxy service. Now, one caveat I will say which I experienced while testing: if you do not have a channel open with Zeus, it did not work very well for me. However, once I got a channel open with Zeus, and got some inbound liquidity in that channel, it has worked perfectly. Hope that post serves you well fellow Stackers, happy zapping n stacking :)
bitcoin
lightning
originally posted at https://stacker.news/items/778172
-
-
@ 129f5189:3a441803
2024-11-22 03:43:40🚨 For the first time, a government is being overthrown by 3D-printed weapons 🔫 The longest-lasting civil war today took an unexpected turn... when the resistance adopted plastic weapons and cryptocurrencies. You NEED to know what's happening in Myanmar 👇 https://image.nostr.build/a2fdf9026e54b6b1da842627fb5b8c4bd194211838d838b3c0d791eb5db65441.jpg https://image.nostr.build/90c607aedae1666db44e2cdf10bfc325b857c46a8afaebebbe2752b7e1b23cca.jpg Myanmar has never had political stability since gaining independence 76 years ago. The latest coup was in 2021, banks were drained, and the local currency lost 60% of its value in the following months. Rebels have since been using CRYPTO to finance themselves. https://image.nostr.build/ddaac81e9555922d2c8940c90ccbc8f37c6f4e1b987a79282a8324377d0e1724.png They declared TETHER as the official currency 🏅 They launched a stablecoin and a crypto bank on the Polygon network that accesses Uniswap pools for buying and selling currencies. They even created a digital lottery and boycotted the national Myanmar lottery, which saw its revenue drop by 80% 📉 https://image.nostr.build/4fd9c942150d77ed2c032af07f7d6f785b35ec52806f9c76a523398a6fad93a7.png https://image.nostr.build/7d8e3303a2f7a823094c281d65fe926358158e4beea41ee7f8f0d740985e3e28.png The rebels have raised about $100 million in recent years. They even auctioned "revolutionary bonds": buyers could receive a share of a deposed general's mansion, for example. But this $100 million is nothing compared to the nearly $1 billion that the junta has invested in the war since the coup. https://image.nostr.build/eb9746cf073e54a643de3c70767aee6aa0be09634ae9af0578b67d5c902892c6.png https://image.nostr.build/fc6f73aa8cc85024cbe4667725066c98c5f3fdb1bbedde479b0b897fdfef4d2e.png This ASYMMETRY of resources suggests a protracted conflict with no end in sight. The junta is unable to eliminate all the decentralized insurgency hotspots... but it can exhaust them financially. However, the asymmetry is decreasing, thanks to DISSIDENT TECHNOLOGIES... https://image.nostr.build/93ff5fc270a0569fd2b314e37b46d713b868279b95d830f906c0ecfb3a633cd1.png JStark would be proud. In recent months, there have been reports of FGC9s in use in Myanmar. FGC9 is one of the most popular models of self-made firearms. FGC = Fuck Gun Control No one conquers a city with FGC9s. But it is certainly possible to... https://image.nostr.build/e71236550139189060f73e9c771bec5ad5c7ee6d74ff839519ec4f94dfaf8be4.jpg https://image.nostr.build/32dbf62496fc16bb532396d9c0f67348e616743d57a4b451927d610df2385e7a.jpg ... defend a mountain pass or a village surrounded by forest with them. Moreover, the resistance has mastered the art of producing and piloting homemade patrol drones. Check it out 👇 https://video.nostr.build/6455e3665450014e51e9c7ca96424c463741751239bfa6b8f059c90ac27fb6a8.mp4 https://image.nostr.build/aa0cdf1ebde058c7d6816499bb20eb220aa3e4825c12fc866deeb170f053711b.jpg https://image.nostr.build/863eec319106271697d818c28e730048ed45e7ff7990d30f9f4592202b77c467.jpg https://image.nostr.build/9f7d5a5a61ad4e979d6305dc4d2c124979e1ee49adac10a8ca9d18310857bd86.jpg The insurgents have already liberated ~50% of the territory. The military junta controls the most populous and economically significant areas. China supported the last coup in 2021. The West never had enough incentive to confront Beijing 🇨🇳 But in 2024, everything starts to change. https://image.nostr.build/56c5705a1c8f1e73685767d2b059cdf38d9002029369c667c4ce246a9090e595.png China's interest is economic. They need to be on the side of the "winner" to ensure access to Myanmar's strategic pipelines and ports. But in March of this year, Beijing lost its patience. Hold on to this: 😳 44,000 CHINESE were in Myanmar as "slaves"... https://image.nostr.build/faa92bf49b76a74367313ae9dc701a20800fef77c00a74676e9003f557211332.png ...and they were finally discovered and "returned." They were working in "ONLINE SCAM CENTERS" operating in the northern part of the country. They were lured with fake job advertisements. This is a scam center on the border with Thailand, packed with Chinese workers, scamming people worldwide 👇 https://image.nostr.build/2460a015b0beb3b775506b6e50e9c96c1ceb743e4214a3a1a1f4ebd6b3c00b20.jpg Think about this 👇 You’ve probably been targeted by some online profile trying to scam you, operated by one of the THOUSANDS of trafficked Chinese people working in centers like this. What year are we living in, folks?! 😳 https://image.nostr.build/ede9666bb2b241506214704e0f7b4585fc1adb5db438145c77e89a73b32ce65b.png The fight against tyranny still seems far from over. But the end appears to have already begun. The balance of power is shifting.
-
@ 129f5189:3a441803
2024-11-22 03:42:42Today we will understand how Argentina, when under the control of the Foro de São Paulo, was an important asset for the Chinese Communist Party in South America and how Javier Milei is charting paths to change this scenario. The Chinese government has been making diplomatic overtures to areas near the polar regions as part of its maritime strategy. After a "strategic retreat," the Southern Hemisphere has assumed a new dimension for Chinese interests in South America. Beijing has been increasing its diplomatic engagement with countries in the region, especially Argentina in recent times, through a series of economic, sociocultural, and to a lesser extent, military agreements. This includes the delivery of vaccines and the intention to accelerate an investment plan worth $30 million. China has focused on several geopolitically sensitive projects in Argentina, all strategic: controlling air and maritime space and strategic facilities in territorial areas monitored by Beijing over Antarctica and the South Atlantic. However, doubts arise about China's intentions... https://image.nostr.build/f55fc5464d8d09cbbddd0fe803b264a5e885da387c2c6c1702f021875beb18c2.jpg For Xi Jinping's government, Argentina stands out for its strategic location, the influential posture of its leaders, and its alignment with China's economic and military power expansion. China has made significant investments and infrastructure initiatives in various Argentine regions. In addition to establishing a presence in the province of Neuquén, China has targeted the port city of Ushuaia in Tierra del Fuego, Antarctica, the South Atlantic islands, and the San Juan region near the Chilean border. A 2012 agreement between authorities in Argentina's Neuquén province and Beijing allowed the construction of a deep space tracking station near the Chilean border, which caught Washington's attention. https://image.nostr.build/a3fa7f2c7174ee9d90aaecd9eadb69a2ef82c04c94584165a213b29d2ae8a66e.jpg In 2014, through a bilateral agreement between the Chinese Lunar Exploration Program, represented by the Satellite Launch and Tracking Control General (CLTC) of the People's Liberation Army (PLA) and Argentina's National Commission on Space Activities (CONAE), the agreement identified the Argentine space station at Bajada del Agrio as the most favorable location for hosting a Chinese base in the Southern Hemisphere. The project became operational in 2017 on a 200-hectare area and represents the third in a global network and the first outside China. It features a 110-ton, 35-meter-diameter antenna for deep space exploration (telemetry and technology for "terrestrial tracking, command, and data acquisition"), with the CLTC having a special exploration license for a period of 50 years. https://image.nostr.build/0a469d8bab900c7cefa854594dfdb934febf2758e1a77c7639d394f14cd98491.jpg The 50-year contract grants the Chinese Communist Party (CCP) the ability to operate freely on Argentine soil. The facility, known as Espacio Lejano, set a precedent for a Chinese ground tracking station in Río Gallegos, on the southeastern coast of Argentina, which was formally announced in 2021. In 2016, a document issued by the U.S. State Council Information Office raised concerns among the U.S. government and European Union (EU) countries about the potential military and geopolitical uses of the base in the Southern Hemisphere and Antarctica. Another element fueling suspicion is the existence of "secret clauses" in a document signed by the General Directorate of Legal Advisory (DICOL) of Argentina’s Ministry of Foreign Affairs, International Trade, and Worship with the Chinese government. https://image.nostr.build/1733ba03475755ddf9be4eafc3e9eb838ba8f9fa6e783a4b060f12b89c3f4165.jpg Since the Espacio Lejano contract was signed, U.S. analysts and authorities have repeatedly expressed concern about China's growing collaboration with Argentina on security and surveillance issues. In 2023, a general from the U.S. Southern Command stated during a hearing of the House Armed Services Committee: "The PRC [People's Republic of China] has expanded its capacity to extract resources, establish ports, manipulate governments through predatory investment practices, and build potential dual-use space facilities." https://image.nostr.build/16bbdeae11247d47a97637402866a0414d235d41fe8039218e26c9d11392b487.jpg The shift in the Argentine government from a leftist spectrum, led by leaders of the São Paulo Forum, to a Milei administration, which has always advocated for libertarian and pro-Western rhetoric, has altered the dynamics of Chinese-Argentine relations in 2024. Milei assumed office on December 10, 2023, replacing the progressive president Alberto Fernández, who had strengthened ties with China and signed an agreement in 2022 to join the CCP’s Belt and Road Initiative. During his campaign, Milei did not hide his disdain for communist regimes and signaled his intention to move away from socialist policies in favor of a more libertarian direction. In the nearly seven months since taking office, Milei has implemented major economic reforms and streamlined the government. https://image.nostr.build/1d534b254529bf10834d81e2ae35ce2698eda2453d5e2b39d98fa50b45c00a59.jpg Other recent "positive indicators" suggest that the Milei administration is prioritizing defense relations with the United States over China, according to Leland Lazarus, Associate Director of National Security at the Jack D. Gordon Institute for Public Policy at Florida International University. "The fact is that, in just six months, he has already visited the United States several times. He has met with Secretary [Antony] Blinken, been to the White House... all of this is like absolute music to General Richardson's ears; to President [Joe] Biden's ears," Lazarus told Epoch Times. General Richardson visited Argentina in April, a trip that included the donation of a C-130H Hercules transport aircraft to the Argentine Air Force and a visit to a naval facility in Ushuaia, Tierra del Fuego, at the southern tip of the country. "We are committed to working closely with Argentina so that our collaborative security efforts benefit our citizens, our countries, and our hemisphere in enduring and positive ways," she said in a statement at the time. In Ushuaia, General Richardson met with local military personnel to discuss their role in "safeguarding vital maritime routes for global trade." https://image.nostr.build/f6d80fee8a7bba03bf11235d86c4f72435ae4be7d201dba81cc8598551e5ed24.jpg In a statement from the Argentine Ministry of Defense, Milei confirmed that General Richardson also reviewed the progress of an "integrated naval base" at the Ushuaia naval facility. Argentine officials said they also discussed "legislative modernization on defense issues." Under the previous administration, China had received preferential treatment. In June 2023, Tierra del Fuego Governor Gustavo Melella approved China's plans to build a "multi-use" port facility near the Strait of Magellan. The project was met with legislative backlash, as three national deputies and members of the Civic Coalition filed an official complaint against the governor's provincial decree to build the port with Beijing. The same group also accused Melella of compromising Argentina’s national security. No public records show that the project has progressed since then. https://image.nostr.build/3b2b57875dc7ac162ab2b198df238cb8479a7d0bbce32b4042e11063b5e2779b.jpg Argentina's desire for deeper security cooperation with Western partners was also evident in April when Argentine Defense Minister Luis Petri signed a historic agreement to purchase 24 F-16 fighter jets from Denmark. "Today we are concluding the most important military aviation acquisition since 1983," Petri said in an official statement. "Thanks to this investment in defense, I can proudly say that we are beginning to restore our air sovereignty and that our entire society is better protected against all the threats we face." https://image.nostr.build/8aa0a6261e61e35c888d022a537f03a0fb7a963a78bf2f1bec9bf0a242289dba.jpg The purchase occurred after several media reports in 2022 indicated that the previous Fernández administration was considering buying JF-17 fighter jets made in China and Pakistan. A former minister from ex-president Mauricio Macri's government, who requested anonymity, confirmed to Epoch Times that a deal to acquire JF-17 jets was being considered during the Fernández era. Chinese investment did not occur only in Argentina. According to a document from the U.S. House Foreign Affairs Committee: "From 2009 to 2019, China transferred a total of $634 million in significant military equipment to five South American countries—Argentina, Bolivia, Ecuador, Peru, and Venezuela. The governments of Venezuela, Ecuador, Bolivia, and Argentina purchased defense equipment from the PRC, cooperated in military exercises, and engaged in educational exchanges and training for their military personnel." https://image.nostr.build/ed6d8daeea418b7e233ef97c90dee5074be64bd572f1fd0a5452b5960617c9ca.jpg Access to space plays a crucial role in the CCP's strategic objectives. Thus, when reports emerged in early April that Milei's government wanted to inspect Espacio Lejano, experts suggested it supported his national security moves away from China. According to the Espacio Lejano contract, signed under Cristina Fernández de Kirchner's Peronist regime, CCP officials are not required to let anyone—including the Argentine president—enter the facility without prior notice. According to Article 3, the agreement stipulates that Argentine authorities cannot interfere with or interrupt the "normal activities" of the facility and must explore alternative options and provide an unspecified amount of notice before being granted access. China has maintained that Espacio Lejano is for deep space exploration, lunar missions, and communication with satellites already in orbit. However, there is deep skepticism that the claim of space exploration alone is highly unlikely. The big question is: what could this facility do in times of war? https://image.nostr.build/f46a2807c02c512e70b14981f07a7e669223a42f3907cbddec952d5b27da9895.jpg Neuquén is just one of 11 ground stations and space research facilities China has in Latin America and the Caribbean. This represents the largest concentration of space equipment China has outside its own country. According to data from the Gordon Institute, the Chinese Espacio Lejano station and the Río Gallegos facility provide an ideal surveillance position near the polar orbit. The polar orbit is useful for data collection, transmission, and tracking because it allows for observation of the entire planet from space. The resolution of communications is also improved due to the proximity of satellites in orbit to the Earth's surface. Additionally, it offers strategic advantages for any government involved in espionage. https://image.nostr.build/39215a4c9f84cbbaf517c4fda8a562bba9e0cd3af3d453a24d3a9b454c5d015d.jpg Regarding deeper security collaboration with the United States, the trend is that Milei’s government will do as much as possible without jeopardizing its contracts with China, which is currently Argentina's second-largest trading partner. However, if Argentina's defense cooperation with China cools, the communist regime might wait for another Argentine government to continue its expansion—a government that could be more favorable to the CCP's objectives. Everything will depend on the continued success of Javier Milei's economic miracle, ensuring his government is re-elected and he can appoint a successor, making it more challenging for China, and avoiding a situation similar to what occurred in Brazil starting in 2023. https://image.nostr.build/a5dd3e59a703c553be60534ac5a539b1e50496c71904d01b16471086e9843cd4.jpg
-
@ 129f5189:3a441803
2024-11-22 03:40:50This boy SAVED the INTERNET… but couldn't save himself.
10 years ago, he was persecuted by his government, and ultimately paid with his life.
Aaron Swartz is a modern hero that most people DO NOT KNOW.
But they should. https://image.nostr.build/a5163a2d322330e5853e14ddf87d1613eecbdff0e23451d9f3059d3c1e0cd723.jpg
Aaron was creative, focused, and brilliant.
At 14, he invented RSS; He dropped out of Stanford; At 19, he was in the first Y Combinator class; He co-founded Reddit.
Most likely, if he were alive today, he would be involved with #Bitcoin.
But that’s not EVEN 1% of what he did for us 🙏
Let’s take a look 👇 https://image.nostr.build/37c7dd4a0ddbad0ae5a98babc66adc4916cc4a03b13d63d0fced0e6c3e0541fd.jpg
From a young age, Aaron believed in an OPEN INTERNET. In computers as a tool for LIBERATION.
"But wait, wasn’t the internet always open?"
No.
Believe it or not, there was a time when they wanted you to REGISTER your ID before you could browse or send an email. https://image.nostr.build/77deabc6b94e160f43a3dd1522c5dac30061ac5423e6b2e3df10162a25e8e612.png https://image.nostr.build/960a2e8b7b518cd7f34af6d791518cdabf7b7cdc22366decc16c667cad1f727f.jpg https://image.nostr.build/5d22d57a1ed58ce2f301d45dd09500d066c8c422039ce4c9c30eec586178fddd.jpg
He believed that PUBLIC LEGAL RECORDS and SCIENTIFIC RESEARCH should be accessible to everyone.
But in the U.S.,
• 98% of scientific articles are behind paywalls; and • ~80% of legal records are too.
Imagine being sued and still having to pay to view the documents? https://video.nostr.build/2af872c7a7d1b74ce0fb8d42369a87df45a7ee2d23df006d287b58ac60fcfe26.mp4
Aaron's war had 3 major battles.
The first was against PACER.
A legal records database.
PACER is PAID... but it was "free" in 17 public libraries.
With friends, Aaron wrote a script on a USB drive, plugged it into a USB port, downloaded 2.7 million documents... and SET THEM FREE. https://video.nostr.build/21b565dd1742bc950748be2ac0e0ce2868f4b94c54d1da9321a198c49fe85d1e.mp4
No charges were made against the group.
But the FBI began to take notice.
That had only been the beginning. That boy would still challenge the system.
The following year, Aaron would enter the biggest fight of his life — and the greatest battle in internet history against censorship ✊ https://image.nostr.build/ab43c6a3d189953bfee2fdc26760e819bc9e637dce97d0c8362a36192487b0aa.png
"SOPA/PIPA" 👉 if you're over 20, you probably still remember these acronyms.
A bill to "combat piracy"... which was just an excuse for the government to shut down ANY SITE, without warning.
Some companies loved the idea.
But those who loved the internet fought back. https://image.nostr.build/605d066f5a7cc73cf8efe620725ac19f3fa9e85b760acd9e66b6f637b6837681.jpg
And then, something wonderful happened.
We still knew how to fight against online censorship.
In a coordinated response, the biggest websites on the internet "went on STRIKE."
Wikipedia and Reddit went offline. Google turned black.
Protests also erupted in the STREETS.
But...
https://image.nostr.build/605d066f5a7cc73cf8efe620725ac19f3fa9e85b760acd9e66b6f637b6837681.jpg https://image.nostr.build/12adaed7c7a5ce9e8ce3c0944111c45e0e311b02c14319ef31910ea3ee5c60aa.jpg https://image.nostr.build/7a23543a1a8be95067289d830c766a4af93a321402ba1e2f53b268d660cba2fa.jpg https://image.nostr.build/0f934d461a5491c39928a1a1bdbfbefe16cb4f70abd6e8bb54c9ee2e6621b438.jpg
... but people have short memories.
This battle was won.
However, the NEXT one would be the LAST for young Aaron.
This MIT security camera was the final straw that ruined his life 👇📹 https://image.nostr.build/e48beb62bce1cdc7554d8e602786a29969a687202f7c7e6971f9f203de3160e6.png
JSTOR was Swartz's final target: the largest database of academic papers in the world.
Aaron wrote a script to download MILLIONS of papers, over the course of months, using his MIT access, in a small room.
MIT has a rebellious culture.
But the FBI could no longer tolerate the boy's defiance. https://image.nostr.build/0f98f712709cacd788a841186630069f9b8877bbea34374f83c529e0b29d1385.jpg
With the video evidence, the U.S. prosecution charged Aaron with 13 crimes. Up to 50 years in prison.
In January 2011, he was arrested by undercover agents near the Harvard campus.
From then on, he was legally tortured.
Two years later, he would be found dead at home. https://image.nostr.build/0e6b2b6d4ac93cc031267d6a3ae4fdd1afbaf7154c3d1b28db144e703325eff3.png https://image.nostr.build/94285f292eb025a91ba591bb14ac0c8739607d428a956f73eb01a7b5c2f1f360.png
"Aaron would be 38 years old today.
He was accused of 'pirating' scientific papers funded with public money.
Facing up to 50 years in prison, he took his own life.
Those he inspired continue to democratize access to science.
Let us remember him."
*These are the words of Susan, his mother. https://image.nostr.build/cb82dfbd1b0675e53a6a24ba2b6c6c50be08b60dc315f9a3cfbf3de4ded0a191.jpg
After his death, the charges were dropped by the government.
Aaron never considered entering a 'plea deal'. He would have faced millions of dollars in legal costs.
The father of the internet, Tim Berners-Lee, published a short poem at the time that says it all:
“The world was a little worse for his passing, But a lot better for his being.” https://image.nostr.build/110bd2ce6b535252ecff250b6609cc6f301b906f6681c2459d375c09af2a9548.png
Aaron wasn’t a unanimous figure. You may disagree with his methods.
But he was faithful to his ideal.
He was genuine. Firm in what he believed.
He was a person who used his prodigious skills not to enrich himself, but to make the internet fairer, and the world a better place. https://image.nostr.build/570b43a6887dfa430be76e33a416c7bbc65d05e9acf0404ae46ad1a522bf9abc.jpg
Aaron had worked with Virgil Griffith (former Ethereum, now imprisoned for "teaching about crypto" to North Koreans).
He knew Elizabeth Stark (from Lightning).
He was friends with Zooko.
And he wrote about #Bitcoin — on the DAY he was arrested (1/6/11)! 😢
http://www.aaronsw.com/weblog/squarezooko
https://image.nostr.build/5809cf5fa01059fd6333df5a3010a49fbb17642f447d33674ea4388640fb9703.png https://image.nostr.build/e7fe674ce2598619319edeae7a342da44e8d35baf99aac31df07924c446b8e56.png https://image.nostr.build/a5ccd76d96ed40ca7a6337050c427d0caee576d1221858aef7e841e32fb9b00c.png
Curious? To learn more about the story, start with this documentary (on YouTube) 👇
[https://youtu.be/9vz06QO3UkQ]
We’ll finish with an excerpt from the "Manifesto for Free Access," by Aaron himself:
"Information is power. But, like all power, there are those who want to keep it for themselves. There is no justice in following unjust laws. It’s time to come to the light, and, in the tradition of civil disobedience, declare our opposition to the private theft of public culture.
We must take information, wherever it is, make our copies, and share them with the world."
RIP, Aaron ✊ https://image.nostr.build/18af509a01336df22725822ce2acc3b3008e433dcd83b4c617ad6b877501e34e.png https://image.nostr.build/a1bf70d3e884b2ff36f35576fc914d42cb71663440d512d89b3c93bc1af5902f.png https://image.nostr.build/7aa7111a401e98bc3a02ff2ab2321839c79e89f9845bbdaa654f3d468f79b3b0.png
-
@ 72db3731:6c79f5a6
2024-11-23 02:00:11I have to imagine a water stream falling on a rock, even if sometimes there is drought on the river or some object are blocking the water stream, the rock will eventually break.
There is no perfection, aim for perfection, but know that it does not exist, there is no perfect routine, there is no perfect life.
But I'm aiming for a perfect life anyway.
Remember, your life will have countless imperfections and you'll make several errors.
But don't give up.
I haven't done much.
Started studying English in Duolingo, looking for a complete lesson for each language, minimum.
2024-11-22 23:00 NoFap, NoSoda, NoAlcohol and NoReels.
Installed leechblock extension, removed any reddit clients on the phone and removed instagram.
-
@ 129f5189:3a441803
2024-11-22 03:30:19GROUND ZERO: LONDON 🇬🇧
The headline in block 0 has a different wording than the version published online.
The phrasing matches the print edition, which was only available in England and Brussels on that day.
Either Satoshi was there, or someone sent him a photo (leaving a trace).
https://image.nostr.build/48ffc23b736d3e2dc7328be8d5b37e94a9f66d762eeb447d1df54e23104dd961.jpg
THE BELGIAN CONNECTION 🇧🇪
The 2nd citation in the whitepaper from 2008 didn’t exist online—it was only in print. It was given to attendees at a 1999 conference in Haasrode, Belgium.
This paper is from Benelux universities. It was even presented in 1999 at Stanford, but with a different reference list than the one replicated in the whitepaper (citations 3, 4, and 5).
https://image.nostr.build/c8a07fd34f2d87028561cd5754558c67a4de51592c69877a62b2a87d0f11b8a0.jpg
HAL WAS RUNNING 🏃♂️
Hal Finney is a frequent suspect, but his family has strongly denied it.
On the morning of Saturday, 4/18/09, he was running a half marathon while Satoshi was exchanging emails (more than one, with questions and answers) with developer Mike Hearn.
https://image.nostr.build/5a5916e56edd8d1c525269ec2ccb82faed3963a9429fdc96d26bb66fede4aa87.png https://image.nostr.build/9529aeff06ec813bfaaecd02127b36b4c35d41a1f6d9516c69d282e0f7fc8393.png
THE LOS ANGELES IP 📍
Satoshi was in L.A. a week after the genesis block.
He always used Tor to hide his IP when online.
But in the beginning, Bitcoin didn’t have addresses. To send/receive, one’s IP was exposed. And on 1/10/09, Hal published a log showing Satoshi's IP.
https://image.nostr.build/a2a30b45d3cfd0d1052ece8d27ad0c8793f67c33d1480084491f8e719e5d06ba.png https://image.nostr.build/ff499ac68597bb123ff9b9f2da53c7612955a6ddb345eba875e8a8405de03754.jpg https://image.nostr.build/8f111ca561f8202fa166c0ac594c90d44a57c44c82361ea72530f22e33105d2d.jpg
THE FINAL CITATION 📜
The paper’s bibliography is outdated and brief.
Notably, the 8th citation stands out: a "book X" on probability theory, published in 1957.
Where did Satoshi find this book?
Why cite it, but make no mention of Chaum, Finney, or Szabo?
https://image.nostr.build/2ba10323b3ca09e3f41f50ce18d1b718024bcccb164c17ac4de62e405e877248.jpg
CARIBBEAN HOLIDAY 🏖️
Peter Thiel, PayPal magnate, suspects that Satoshi might have been among the 140 attendees at a financial cryptography conference held at the InterIslands Hotel in Anguilla, February 21-24, 2000.
E-gold was one of the event’s sponsors.
https://image.nostr.build/25b33842dcf923f0d6b4ddbd5f4e18478859728fbbc1f185f60ce268c8b5d353.jpg https://image.nostr.build/c7b4f37ed5b5d0e077e5b245fdaeed8dce686b5a2f6a962c73d8b0bf956124cd.png
BRITISH "LOOSE" LANGUAGE 👅
Satoshi heavily used British expressions ("bloody hard," "defenCe," "grEy," "coloUr"). He used the European date format (dd/mm/yyyy). He frequently referenced the Euro.
In some cases, he seemed to use a grammar checker.
He also put two spaces after periods.
https://image.nostr.build/49714e2ae002c330966dd4d6483ddc5416ab1ecd9db8d2c1b3244614918ea98e.jpg
WEALTHY FRIENDS 🤑
In the latest emails revealed by Martti Malmi, it’s clear that Satoshi had access to resources to fund the development of #BTC.
He claimed it was donations. So, there were people he was talking to about the project. Or it was his own money...
https://image.nostr.build/6221f535e15842337fc8b8b2004d44288867df9e66282fd05a8b29694608db22.png
A PLANNED DEPARTURE 👋
The creator's disappearance may seem abrupt. Satoshi said goodbye as soon as he learned about Gavin A.'s discussions with the CIA.
But his departure was planned and gradual.
Satoshi gradually shut down his hashrate in 4 stages—when the network was already running on its own.
https://image.nostr.build/d323d27d1d484dfcad4bbf8e335a9d92cd648a529bfae151cc93416ede81e1e9.jpg
His self-declared birthday, 4/5/75, has digits that sum to 21 (5 + 4 + 7 + 5).
The date of block #1, 1/9/2009, also sums to 21 (9 + 1 + 0 + 9).
The halving happens every 210,000 blocks.
Until the 21 million #Bitcoin are exhausted, in 2140.
https://video.nostr.build/56871450e9df8847444032d3929bbddef700fc0e3e81348a16bfca9a11647cd8.mp4
-
@ 129f5189:3a441803
2024-11-22 03:22:03In November 2021, American police surrounded a lakeside mansion in Georgia.
In the basement, they found a safe.
Inside, there was $661,000 in cash, gold bars, and a jar of Cheetos.
The jar held 51,680.32 Bitcoins.
https://image.nostr.build/45151a6a5c0369b24bb8e290a6e152c2111acb4d375fe598b373344db69650df.jpg
To understand how this fortune ended up there, we need to know James "Loaded" Zhong – the owner of the mansion.
A classic nerd, he loved exploring obscure forums online.
In 2009, one post in particular caught his attention.
Eight years later, James would become one of the biggest #Bitcoin whales.
https://image.nostr.build/2ad0499e57f9a4af12ae1f7d253451344cacda91ef89414e4adf390d946ac5ab.jpg https://image.nostr.build/e28daaffe36c60cec9a83ada8ffe9e765e4db5c3abd4a6227cac7f54c64c8f45.jpg
Curious, Zhong mined a few thousand #BTC at home, just to see what would happen.
He had just entered college with near-perfect entrance exam scores.
Like any 18- or 19-year-old, he spent a good portion of his #BTC on parties.
Alcohol, psychedelics, and other harder stuff.
https://image.nostr.build/1baea3f0a71ae719cdd53185a28d3ee63013a3b9ad7db2cda63efc55a914e9e5.jpg https://image.nostr.build/3b797c8bab8f6148cf2cd6dee9b19b682b2bcd8274f6c00601a8aae6a7b20387.jpg
Ironically, James's addiction made him even richer.
For convenience, he started buying his powder from a site called Silk Road, the largest Bitcoin marketplace of the time.
Then, one day, when he went to withdraw #BTC from the site, our protagonist encountered something unexpected...
https://image.nostr.build/6d59ded79d5caf77e4105cea2042517a757f77ebe6888876914578f00138b55c.jpg https://image.nostr.build/b9dd0088509712196ab8552b4ddc7f88b8bea856a0e36b6e79751be42e4ed1d5.jpg
The site was incredibly slow.
Impatient, James started clicking the "withdraw" button furiously 😤
When he checked his wallet, he was stunned to see he had received DOUBLE the balance he actually had to withdraw 😮
He blinked, checked again. And voilà.
He had just found the real-life "Klapaucius."
https://video.nostr.build/41bf4a0864d5cf827aab35bca54633b30e27a8711ede85efacfbad0f6c46b041.mp4
Silk Road had a flaw that allowed users to exploit a second function while the program was performing another task.
In this case, "double-spending bitcoin."
In the following days, Zhonginho lived the happiest time of his life ☺️
He drained about 8% of the site's reserves 😱
https://image.nostr.build/74b25e705503a565b1bc3b314e8547786be306c3c938e84bdd39fdf68e7e8255.jpg
He then reported the bug to the Silk Road owner and, as a reward, received some extra coins.
He sent 40,000 BTC to one address and 10,000 to another, where they remained for almost a decade.
James Zhong, at 22 years old, was now one of the largest Bitcoin holders on the planet 👑
https://image.nostr.build/7f3ca2f46249678381b116f15c30712f16788d3ca091348c45696860a8743e5d.png
What would you do if you had 50k #BTC stashed away? 🤔💭
James chose to make waves online.
I bet many of you would do the same.
He pretended to be an "asset manager" on Bitcointalk and built a legendary persona, one that would go down in history.
His name there was "LOADED" 🔫
https://image.nostr.build/a94c109d4c3f9c1f744b9a7ca749b5996a7c176dba54ddf89285597550e72494.jpg
The theft happened in 2012.
Zhong's coins were worth $1 million. He entered college "with life sorted."
But #BTC went from $10 to $1000 between 2012 and 2014 📈
By the time he graduated at 24, his coins were worth over $30 million.
He bought a house, a car – and started funding the party for his "friends."
https://image.nostr.build/64cadf157e8608dc23f21ee2841f860f943813f4e113e0f231f0f89f8c58ae9a.jpg
Up until then, he had only spent the BTC he earned from mining.
If he had kept it that way, he probably would have never been caught.
But, intoxicated by euphoria, he made a mistake…
... and planted the seed of his downfall during his 3rd bull cycle in 2017.
https://image.nostr.build/b17b5d0b8a6bd9ae503dcb1582ca510b01bc49233d98bd075a116e57f0b816d7.jpg
At the height of the #Bitcoin "civil war," LOADED got carried away on Bitcointalk.
He challenged Roger Ver to a $20M bet, #BTC vs. BCash.
To prove his seriousness, he signed a message with the key to a wallet containing $44M in BTC.
But then, "on-chain rats" entered the scene...
https://image.nostr.build/f76ff1cbaeafce17e9a3f1fd6e7b856e11e1f8690a39cfceb6d189a40308e312.jpg
... and soon they linked the wallet to the infamous address 1DkyBEK...
... widely known for its connection to the Silk Road drain, years prior.
🫥 After this revelation, LOADED disappeared from the forum and never posted again.
He knew he had made a huge mistake.
And it seemed he already anticipated the worst.
https://image.nostr.build/8ae4d7b630710ff9c231e35cfcff20ef6c9fc3b5f3f6301676ecec930dd6e81f.jpg
The 2017 bull run arrived, and James switched to "heir" mode.
The #BTC he had mined at $10 were now worth $10,000.
He bought several Lambos, rented yachts, traveled the world, and invested nearly $10M in real estate.
The flaunting didn't go unnoticed.
Then, on a fateful night in 2019...
https://image.nostr.build/6c4230d160bfecff98b3adafddbb377003a092abaab9986cede85d55af362c1e.jpg
James' house was robbed.
They took $400K in cash.
The broken windows shook our Bitcoin mogul.
He called the police, and a case was opened.
The investigation went nowhere.
The thief was never caught.
But the case caught the attention of the IRS...
https://image.nostr.build/a3d44757c4bd296f54365a3fb5d0caec46346cf6cfd998a286678412b65ee729.jpg https://image.nostr.build/2fef09ab3c538e76ea143b5eb2742147beb181f222cc7c76ab08b154022368c6.jpg
After all, who keeps $400K in cash at home?!
They requested browsing records from Jaminho's ISP 👀
Mapped his wallets.
And eventually, they uncovered the connection first mentioned on Bitcointalk years earlier:
between LOADED wallets... and the original hacker from Silk Road 🫢
https://image.nostr.build/c462160a40ff447499bf9767a0ec04ded11bc1c6b5408003a5a56fae13681606.jpg
James never sold any of the BTC stolen from Silk Road.
The site’s owner even thanked him for reporting the bug.
He would have remained free if it weren't for that message and that bet in 2017.
Or, thinking about it, maybe it was just a matter of time before he got caught 🤔
https://image.nostr.build/99651d8a88d2c51b2a34f92168fa73bde21e6c2be764d84becf37cfda921bf4c.jpg
Social deprivation was Zhong's Achilles heel.
Fortune had made him forget Rule No. 1 of Fight Club.
CNBC has a good document. on.
He received undercover agents, showed them suitcases of money he used to impress girls, and opened a laptop with 1,500 #BTC
https://image.nostr.build/c76618131edb2403d943ec489158c6da5083ed293a045c3b5bf619bc9d75ff6d.png https://image.nostr.build/992a0d437d16d50db025af380fe085f53d5c0edd0a21e523ca179057068069bc.png
James lived a movie-worthy life from 21 to 33 🎞️
Imagine watching #Bitcoin soar from $5 to $50K 🚀😱
A 10,000x increase in value.
And unlike some Faria Limers out there, this guy had no fear of "not being sufficiently allocated."
He was LOADED.
https://image.nostr.build/9f57ee1b965023b4bcb5d97c94dd7535b2dd9076106de80dae3659abaa6c8ce7.png
This is the story of one of the biggest WHALES in Bitcoin history:
James "Loaded" Zhong 🐳
James was convicted last year for money laundering at the age of 33.
He was arrested in Alabama in July 2023.
https://image.nostr.build/bb78519356fe3fb80174c7105b9a8cc16c8e875c5240251f630c8c52ab68be47.png https://image.nostr.build/af10ff0a934c75c9186b331a87326cb5f919dc51fbce47f7049615a2d239ec08.jpg
And that's how we ended up at the mansion siege in Georgia on 11/9/21.
The second-largest seizure in the history of the U.S. Department of Justice:
$661.9K in cash
51,680.32 #Bitcoin
Millions in real estate
Millions in precious metalshttps://image.nostr.build/449beca14103c0d869042e875f470c39189f838866d6e74f5cf50678be5f7471.png https://image.nostr.build/6377e1e9888edb5e40ec9dbe6956bd8593e5ac87a8c9886a7bae71cc83a70819.jpg https://image.nostr.build/095a5a01265912a24421c5550d78e266a9db3782b662aabda4be4e1967ec6716.jpg https://image.nostr.build/eaf13d7b8db32b34ce6bed24d8bed5673d1eceeefbe814c71b97fb4f6f695ccd.jpg
With the billions stored in the Cheetos jar, he could have bought over 7,000 houses like the one Zhong lived in.
https://image.nostr.build/4f5030ea4a832759243cc6696438c1346a745e268900cba9197100bb2a9b95c6.jpg
Everyone has that friend who invested in #bitcoin early and became a bon vivant...
... but imagine being friends with LOADED?!
They say he handed out paper wallets of #BTC at night to everyone. Paid for trips. VIP access.
In the end, none of his friends were seen at the trial.
https://image.nostr.build/bf5db5973947d01870eb2815a93d167aaf5303a4cabd601cd693e7b1239583a2.png https://image.nostr.build/b0ab2a9163931ff0090556fe2906d100b51862737e526023f69b137b386bc7cf.png https://image.nostr.build/e90d9b60f6d029a006811270708caf22fcacd4decd8e7527647a4ce842c6fc89.jpg