-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ a95c6243:d345522c
2024-12-06 18:21:15Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\ dass wir Vorteile aus ihr ziehen;\ in jedem andern hegt man den Wunsch,\ dass der Unschuldige in Schutz genommen werde.\ Jean-Jacques Rousseau
Politiker beteuern jederzeit, nur das Beste für die Bevölkerung zu wollen – nicht von ihr. Auch die zahlreichen unsäglichen «Corona-Maßnahmen» waren angeblich zu unserem Schutz notwendig, vor allem wegen der «besonders vulnerablen Personen». Daher mussten alle möglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener «Schutzmaßnahmen» den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen – wie erwartet – massive Nebenwirkungen, sondern Maskentragen schadet der Psyche und der Entwicklung (nicht nur unserer Kinder) und «Lockdowns und Zensur haben Menschen getötet».
Eine der wichtigsten Waffen unserer «Beschützer» ist die Spaltung der Gesellschaft. Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persönlichen Erfahrungen als Kritikerin der Maßnahmen berichtete kürzlich eine Schweizerin im Interview mit Transition News. Sie sei schwer enttäuscht und verspüre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit «Geimpften».
Menschen, die aufrichtig andere schützen wollten, werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ärzte, darunter Heinrich Habig, Bianca Witzschel und Walter Weber. Über den aktuell laufenden Prozess gegen Dr. Weber hat Transition News mehrfach berichtet (z.B. hier und hier). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-«Impfung» bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie Alexander Bittner erfahren mussten.
Die eigentlich Kriminellen schützen sich derweil erfolgreich selber, nämlich vor der Verantwortung. Die «Impf»-Kampagne war «das größte Verbrechen gegen die Menschheit». Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn Hunter möglicherweise auch Anthony Fauci begnadigen wird – in diesem Fall sogar präventiv. Gibt es überhaupt noch einen Rest Glaubwürdigkeit, den Biden verspielen könnte?
Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dürfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rücken.
Das Buch «The Real Anthony Fauci» des nominierten US-Gesundheitsministers Robert F. Kennedy Jr. erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der öffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb übrigens Călin Georgescu, der Überraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der Panik im Wertewesten.
In Rumänien selber gab es gerade einen Paukenschlag: Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die für Sonntag angesetzte Stichwahl kurzfristig abgesagt – wegen angeblicher «aggressiver russischer Einmischung». Thomas Oysmüller merkt dazu an, damit sei jetzt in der EU das Tabu gebrochen, Wahlen zu verbieten, bevor sie etwas ändern können.
Unsere Empörung angesichts der Historie von Maßnahmen, die die Falschen beschützen und für die meisten von Nachteil sind, müsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem «Schutz vor Desinformation und Hassrede» (sprich: Zensur) wird es unsere wichtigste Aufgabe sein, Gräben zu überwinden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-11-29 19:45:43Konsum ist Therapie.
Wolfgang JoopUmweltbewusstes Verhalten und verantwortungsvoller Konsum zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
Heute ist also wieder mal «Black Friday», falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
Warum fallen wir auf derartige Werbetricks herein und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
Gedankenlosigkeit und Maßlosigkeit können besonders bei der Ernährung zu ernsten Problemen führen. Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
Kritik am schwarzen Freitag und dem unnötigen Konsum kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
Die EU-Kommission lancierte 2015 den Begriff «Green Friday» im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das Pariser Abkommen unterzeichnet werden sollte.
Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt. Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des «Green New Deal» verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um Valencia dazu sagen?
Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020 eine «grüne Erholung von Covid-19, um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie «verantwortungsvolle Risikobereitschaft» unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 3bf0c63f:aefa459d
2024-12-06 20:37:26início
"Vocês vêem? Vêem a história? Vêem alguma coisa? Me parece que estou tentando lhes contar um sonho -- fazendo uma tentativa inútil, porque nenhum relato de sonho pode transmitir a sensação de sonho, aquela mistura de absurdo, surpresa e espanto numa excitação de revolta tentando se impôr, aquela noção de ser tomado pelo incompreensível que é da própria essência dos sonhos..."
Ele ficou em silêncio por alguns instantes.
"... Não, é impossível; é impossível transmitir a sensação viva de qualquer época determinada de nossa existência -- aquela que constitui a sua verdade, o seu significado, a sua essência sutil e contundente. É impossível. Vivemos, como sonhamos -- sozinhos..."
- Livros mencionados por Olavo de Carvalho
- Antiga homepage Olavo de Carvalho
- Bitcoin explicado de um jeito correto e inteligível
- Reclamações
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ cdee943c:5e637400
2024-12-06 19:26:20Why would you set up a custom relay for Recipes?
Recipes are inherently rich in data, encompassing multiple ingredients, categories, cuisines, nutritional information, and detailed instructions. A custom relay tailored to handle a specific recipe event kind (nominally
kind=35000
) can:- Optimize Data Retrieval: Efficient indexing and storage mechanisms ensure swift access to complex recipe data.
- Enhance Flexibility: Tailored configurations accommodate the unique structure of recipe events, making query filters more efficient and flexible.
- Improve Performance: Specialized handling reduces latency, which becomes a very important factor for high volume services.
- Support Advanced Features: Features like real-time syncing, bulk import/export, and efficient compression cater to the dynamic nature of recipe sharing.
By aligning the relay's architecture with the structure of recipe events, Nostr developers can build responsive and scalable applications.
Setting Up a Custom Recipe Relay
Option 1: Using khatru and Eventstore
- Bootstrap a basic khatru relay:
-
Follow the steps outlined in the khatru docs:
go relay := khatru.NewRelay()
-
Set up Eventstore:
- Configure khataru to use Eventstore and Postgresql: ```go // Initialize Eventstore db := postgresql.PostgresBackend{DatabaseURL: "postgres://eventuser:securepassword@localhost:5432/eventstore_db?sslmode=disable"} if err := db.Init(); err != nil { log.Fatalf("Failed to initialize eventstore: %v", err) } // Integrate Eventstore with Khatru relay.StoreEvent = append(relay.StoreEvent, db.SaveEvent) relay.QueryEvents = append(relay.QueryEvents, db.QueryEvents) relay.CountEvents = append(relay.CountEvents, db.CountEvents) relay.DeleteEvent = append(relay.DeleteEvent, db.DeleteEvent)
3. Modify tag handling - Update the `tags_to_tagvalues` function to handle multi-character keys, multiple tag entries, and nested structures:
go _, err = db.DB.Exec( CREATE OR REPLACE FUNCTION tags_to_tagvalues(jsonb) RETURNS text[] AS $$ SELECT array_agg(t.value) FROM jsonb_array_elements($1) AS elem(tag) JOIN LATERAL ( SELECT CASE WHEN tag->>0 IN ('cuisine', 'category', 'ingredients', 'tags') THEN tag->>1 WHEN tag->>0 = 'nutrition' AND jsonb_array_length(tag) >= 3 THEN tag->>2 ELSE NULL END AS value ) AS t ON t.value IS NOT NULL; $$ LANGUAGE SQL IMMUTABLE RETURNS NULL ON NULL INPUT; )4. Add custom polices: - khatru supports setting custom event policies:
go // Apply custom policies to accept only kind 35000 events relay.RejectEvent = append(relay.RejectEvent, // Built-in policies policies.ValidateKind,// Custom policy to accept only kind 35000 func(ctx context.Context, event *nostr.Event) (bool, string) { if event.Kind != 35000 { return true, "Only recipe events (kind 35000) are accepted" } return false, "" },
) ``` 5. Pray that fiatjaf doesn't fire me
Option 2: Modifying Strfry's Configuration
Strfry is another robust Nostr relay implementation that leverages LMDB for local data storage. Stirfry uses the golpe C++ framework and by adjusting its configuration in
golpe.yaml
, you can tailor Strfry to handle recipe events optimally.- Optimize Indices:
- Enhance indexing for specific recipe-related tags to speed up queries:
yaml indices: cuisine: comparator: StringUint64 multi: true category: comparator: StringUint64 multi: true ingredients: comparator: StringUint64 multi: true nutrition: comparator: StringUint64Uint64 multi: true
- Update indexPrelude:
```yaml indexPrelude: | PackedEventView packed(v.buf); created_at = packed.created_at(); uint64_t indexTime = *created_at; id = makeKey_StringUint64(packed.id(), indexTime); pubkey = makeKey_StringUint64(packed.pubkey(), indexTime); kind = makeKey_Uint64Uint64(packed.kind(), indexTime); pubkeyKind = makeKey_StringUint64Uint64(packed.pubkey(), packed.kind(), indexTime); packed.foreachTag([&](char tagName, std::string_view tagVal, std::string_view tagVal2 = ""){ // General tag indexing tag.push_back(makeKey_StringUint64(std::string(1, tagName) + std::string(tagVal), indexTime)); // Specific tag handling for recipes std::string tagNameStr(1, tagName); if (tagNameStr == "cuisine") { cuisine.push_back(makeKey_StringUint64(std::string(tagVal), indexTime)); } else if (tagNameStr == "category") { category.push_back(makeKey_StringUint64(std::string(tagVal), indexTime)); } else if (tagNameStr == "ingredients") { ingredients.push_back(makeKey_StringUint64(std::string(tagVal), indexTime)); } else if (tagNameStr == "nutrition" && !tagVal2.empty()) { nutrition.push_back(makeKey_StringUint64Uint64(std::string(tagVal), std::string(tagVal2), indexTime)); } else if (tagNameStr == "tags") { tags_specific.push_back(makeKey_StringUint64(std::string(tagVal), indexTime)); } // Existing conditions for 'd' and 'e' tags if (tagName == 'd' && replace.size() == 0) { replace.push_back(makeKey_StringUint64(std::string(packed.pubkey()) + std::string(tagVal), packed.kind())); } else if (tagName == 'e' && packed.kind() == 5) { deletion.push_back(std::string(tagVal) + std::string(packed.pubkey())); } return true; }); if (packed.expiration() != 0) { expiration.push_back(packed.expiration()); } ```
Conclusion
Setting up a custom Nostr relay tailored for recipe events would enable developers to build highly performant and flexible applications. Whether it is using Khatru with Eventstore or modify Strfry's configuration, the key lies in aligning the relay's architecture with the features of recipe data. This approach not only improves performance but also lays a robust foundation for building feature-rich clients and applications within the Nostr ecosystem.
-
@ ec42c765:328c0600
2024-10-16 08:08:40カスタム絵文字とは
任意のオリジナル画像を絵文字のように文中に挿入できる機能です。
また、リアクション(Twitterの いいね のような機能)にもカスタム絵文字を使えます。
カスタム絵文字の対応状況(2024/02/05)
カスタム絵文字を使うためにはカスタム絵文字に対応したクライアントを使う必要があります。
※表は一例です。クライアントは他にもたくさんあります。
使っているクライアントが対応していない場合は、クライアントを変更する、対応するまで待つ、開発者に要望を送る(または自分で実装する)などしましょう。
対応クライアント
ここではnostterを使って説明していきます。
準備
カスタム絵文字を使うための準備です。
- Nostrエクステンション(NIP-07)を導入する
- 使いたいカスタム絵文字をリストに登録する
Nostrエクステンション(NIP-07)を導入する
Nostrエクステンションは使いたいカスタム絵文字を登録する時に必要になります。
また、環境(パソコン、iPhone、androidなど)によって導入方法が違います。
Nostrエクステンションを導入する端末は、実際にNostrを閲覧する端末と違っても構いません(リスト登録はPC、Nostr閲覧はiPhoneなど)。
Nostrエクステンション(NIP-07)の導入方法は以下のページを参照してください。
ログイン拡張機能 (NIP-07)を使ってみよう | Welcome to Nostr! ~ Nostrをはじめよう! ~
少し面倒ですが、これを導入しておくとNostr上の様々な場面で役立つのでより快適になります。
使いたいカスタム絵文字をリストに登録する
以下のサイトで行います。
右上のGet startedからNostrエクステンションでログインしてください。
例として以下のカスタム絵文字を導入してみます。
実際より絵文字が少なく表示されることがありますが、古い状態のデータを取得してしまっているためです。その場合はブラウザの更新ボタンを押してください。
- 右側のOptionsからBookmarkを選択
これでカスタム絵文字を使用するためのリストに登録できます。
カスタム絵文字を使用する
例としてブラウザから使えるクライアント nostter から使用してみます。
nostterにNostrエクステンションでログイン、もしくは秘密鍵を入れてログインしてください。
文章中に使用
- 投稿ボタンを押して投稿ウィンドウを表示
- 顔😀のボタンを押し、絵文字ウィンドウを表示
- *タブを押し、カスタム絵文字一覧を表示
- カスタム絵文字を選択
- : 記号に挟まれたアルファベットのショートコードとして挿入される
この状態で投稿するとカスタム絵文字として表示されます。
カスタム絵文字対応クライアントを使っている他ユーザーにもカスタム絵文字として表示されます。
対応していないクライアントの場合、ショートコードのまま表示されます。
ショートコードを直接入力することでカスタム絵文字の候補が表示されるのでそこから選択することもできます。
リアクションに使用
- 任意の投稿の顔😀のボタンを押し、絵文字ウィンドウを表示
- *タブを押し、カスタム絵文字一覧を表示
- カスタム絵文字を選択
カスタム絵文字リアクションを送ることができます。
カスタム絵文字を探す
先述したemojitoからカスタム絵文字を探せます。
例えば任意のユーザーのページ emojito ロクヨウ から探したり、 emojito Browse all からnostr全体で最近作成、更新された絵文字を見たりできます。
また、以下のリンクは日本語圏ユーザーが作ったカスタム絵文字を集めたリストです(2024/06/30)
※漏れがあるかもしれません
各絵文字セットにあるOpen in emojitoのリンクからemojitoに飛び、使用リストに追加できます。
以上です。
次:Nostrのカスタム絵文字の作り方
Yakihonneリンク Nostrのカスタム絵文字の作り方
Nostrリンク nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
仕様
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ a95c6243:d345522c
2024-10-19 08:58:08Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
Das Gewissen regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 6bae33c8:607272e8
2024-12-06 18:06:23So like another writer of my caliber who thought the end was nigh, I got a last-second reprieve. I mistakenly thought last week was the start of Q4, but it turns out it’s this week. That means the 2-3 is wiped off my record, and I’m still alive!
Now it’s important one does not squander such a rare second chance. The worst thing one could do in such a situation would be to pick recklessly, for example, like taking the Jets. That would be a serious mistake, like picking pockets of the people watching the public hangings of pickpockets. Only a fool, or a real man, would do that.
Jets +5.5 at Dolphins — This is almost certainly a mistake. There’s something wrong with the Jets, and the Dolphins are a solid team playing at home. I just had a buy-low feeling on the Jets, and the Massey-Peabody numbers had the two teams as near equals. Not that you should ever consult numbers like that unless it’s to confirm your priors. I’m already regretting this pick. You should probably take the Dolphins. Seriously.
Vikings -5.5 vs Falcons — The Vikings seems overrated, but the Falcons are just flat. Maybe it’s Kirk Cousins’ lack of arm strength, I don’t know. But I’m laying the wood and feel okay about it.
Titans -3.5 vs Jaguars — The Titans play a little defense, and Will Levis can sling it down the field. That’s enough for me against the Mac Jones Jaguars.
Buccaneers -7 vs Raiders — This line seems a bit light given what a doormat the Raiders are. It’s also an early body-clock game on the east coast for them.
Cardinals -3 vs Seahawks — The Seahawks have played better of late, but the Cardinals are the buy-low, and I think they’ll win this game to pull even in the division.
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ e83b66a8:b0526c2b
2024-12-06 16:37:15If you want a secure, private DM client which uses your own private NOSTR keys. Don’t use the client you use for public posting. It does encrypt the message contents, but nothing else, which means anybody can see you DM, who your DM’ing and the length of message.
At one stage, there was an annoying NOSTR bot that would publicly post all non gift wrapped DMs and tag the participants as a reminder to gift wrap your messages.
To obfuscate this, NIP-59 gift wrapping should be built in. This gives the same security level as a platform like Signal, but the advantage is you control the keys.
The best fully secure NOSTR decentralised NOSTR client is: 0xChat https://www.0xchat.com/#/
Once 0xChat is installed and you have entered your nsec (copying and pasting your private key is a security issue and one we are working on currently).
If you’re not sure where to find your nsec, look inside whatever app you are using for the “keys” section and most apps should allow you to reveal and copy your private key to paste into other apps. This is not good OPSEC practise, but is all we have for the moment.
Here, you’ll need a relay for your DM, Inbox and Outbox relays
You can use the defaults, your own, or my relay below:
My relay is: https://nortis.nostr1.com/ wss://nortis.nostr1.com/
Mine is a paid relay and costs 2,100 Sats per month per npub.
Everybody is then talking on the same server and can exchange messages using the Gift Wrap protocol NIP-59 https://nips.nostr.com/59
This creates 3 layers of encryption to encrypt the whole NOSTR event.
You now have your own private DM client that you control and whose keys you own.
Oh, it also has the ability to setup public or private groups and has a Cashu Chaumium ecash wallet built in which can be used for Lightning or ecash payments on NOSTR or in the real world to pay for goods and services.
-
@ 30ceb64e:7f08bdf5
2024-12-06 16:18:02Hey Freaks,
I like using SN and Nostr as something of an open diary, this time I'm back detailing my hustle in the fiat mines.
The Full Time Job Hustle
I was looking at obtaining a paralegal certificate and taking a few courses on Udemy and Coursera. I'll probably start on the 14th, was thinking I should probably bolster my main resume with more skills and certs. I'll start requesting additional tasks at work and look towards either a promotion or finding an interesting paralegal job elsewhere.
Here were a few resources I was looking to take advantage of
They're all inexpensive and I can work on them at my own pace, could bolster my resume and provide me with more knowledge and skills to bring to the table. I guess I'm more of an autodidact, was thinking if I paired those certificates with a few decent books and podcasts I'd be more of a force to be reckoned with.
I started with the firm strictly filing documents as an admin assistant. I guess my end goal, when it comes to my journey in the legal field, is to eventually work on more interesting things, for more money. Right now my job is mostly administrative, preparing patent documents, filing documents with the USPTO, and calling examiners to discuss errors in patent applications. Just like in most things.....I'm a noob when it comes to legal matters, but have a renewed interest in IP law and how it moves forward with the whole sovereign individual thesis hanging in the background and how it plays with Free open source software and my anarchist leanings.
The Part Time Job Hustle
Looks like I'll be working weekends as a Direct Support Professional. The job is from 9AM to 11pm...... and I'll be working with teens with disabilities and mental health conditions.
As a bit of a background, I was looking for additional weekend work because the wild wife is pregnant and I don't want her working. My main job as a formalities specialist at an IP law firm allows me to work from home, and the work isn't too hard, just a lot of typing and I grew up playing computer games, so typing and moving my mouse to click buttons is a specialty, that and my charming demeanor.....
I wanted a job that fit around my schedule and offered a decent amount of sats. A job that was doing something of value in the real world, and something with good employment prospects into the future. So I obtained a Home Health Care Aide certificate on Udemy, watched a few Youtube videos, and applied to 15 HHA jobs in my area (That's a lot of opportunity in the area, especially for weekend and evening jobs).
The interview went really well, I leaned on my military background, teaching kids how to perform Maintenance on F-16 fighter jets, and on my experience helping the elderly with small financial tasks at Bank of America. I received an offer letter, and they ended up offering me a salary which was more than I expected. I've finished the onboarding process and start orientation on Monday (taking a week vacation from the firm to take the paid orientation.)
I'm excited about the job. I'm pumped to get into a new field with pretty nice opportunity and prospects around me for long term sat stacking. I'm really interested to see how I'd be of service to the special needs kid........and know I have a lot to learn.
Wish me luck, And never stop the hustle! Wild
PS. written really fast, apologies for it being all over the place.....
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 6dc1c1c9:e40b389b
2024-12-06 15:19:16Odds & Ends: December 6, 2024
The Virginian by Owen Wister. (https://amzn.to/4fVvqCy) I just finished this 1902 novel that essentially created the Western genre as we know it. Wister’s tale of a laconic, principled cowboy in Wyoming Territory established tropes we now take for granted: the showdown at high noon, the strong silent hero, and the eastern tenderfoot narrator learning the ways of the West. A core theme in The Virginian is honor (https://www.artofmanliness.com/character/behavior/manly-honor-part-i-what-is-honor/). I did a lot of underlining in my copy about that topic. Despite being over 120 years old, the book is surprisingly fresh and modern. If you want a better appreciation of the Western genre, from the best Western novels (https://www.artofmanliness.com/living/reading/21-western-novels-every-man-should-read/) to the top Western films (https://www.artofmanliness.com/living/reading/21-western-novels-every-man-should-read/) to the greatest video game of all time — Red Dead Redemption 2 — pick up a copy of The Virginian.
The Hot New Job for Men: Nursing. (https://www.wsj.com/economy/jobs/male-nursing-boom-high-demand-field-7733dfaf) Ten years ago, if you asked me how many dudes I knew who were nurses, the answer would have been zero. Today, I personally know several men who are nurses and even middle-aged men who are shifting careers to nursing. And it looks like this anecdotal uptick is backed up by data. Nursing is drawing more men than ever, with male RNs nearly tripling since 2000. The appeal? Job security and solid pay — registered nurses pull in $95,000 on average, with specialized roles like nurse anesthetists hitting $214,000. While males currently only make up 14% of nurses, that number’s climbing steadily as more men discover this potentially rewarding career path. It’s a big shift from the days when male nurses were the butt of jokes in movies like Meet the Parents.
Micro Gainz Microplates. (https://microgainz.com/collections/olympic-micro-plates) Have you stalled out on making progress on a lift like the overhead press and want to increase the weight, but adding the lowest plates available — typically 5-pounders — still feels like too big a jump? These fractional weight plates let you make tiny 1/2 to 2-pound increases, perfect for breaking through stubborn plateaus. At first glance, spending $60 on what amounts to metal chips might seem excessive, but the ability to make micro-jumps in weight is a game-changer for achieving progressive overload on upper-body lifts.
Jingle Bell Jazz. (https://amzn.to/3Bnfj1n) Not sure how this 1962 compilation made its way into my vinyl collection, but every December, I find myself giving it regular spins on my record player. It’s a good mixture of Christmas standards in various genres of jazz (https://www.artofmanliness.com/living/entertainment/jazz-appreciation-for-beginners/), including bebop, swing, and cool. It’s a perfect album for trimming the tree or sitting by a roaring fire reading a book on a cold December night. You can listen to the full album on YouTube (https://www.youtube.com/watch?v=jOtJJi3lX8A).
Also, this (https://www.facebook.com/photo/?fbid=965551785445345&set=a.663354332331760) really made me laugh.
Quote of the Week
Be not afraid of life. Believe that life is worth living, and your belief will help create the fact.
—William James
Help support independent publishing. Make a donation to The Art of Manliness! (https://donorbox.org/support-the-art-of-manliness) Thanks for the support!
https://www.artofmanliness.com/odds-ends/odds-ends-december-6-2024/
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 63d59db8:be170f6f
2024-12-06 14:02:50This long-term visual investigation portrays the relationship that exists between extractive mining processes and the social and cultural displacements that occur.
For almost two centuries, the Atacama Desert has been a constant source of mineral resource extraction. The “Nitrate Offices” have left the mark of an era of riches and bad practices. Today, the situation is repeated as an exact cycle: what was nitrate passed to copper and today it turns to lithium, among other minor activities. All this is part of a legislative context lacking extractive regulations by Chile. It is in this context, where the “water rights” are sold to large mining companies, which ultimately determine how much water is left for the communities and towns adjacent to the mining company.
Marco's website: https://marcoszegers.cl/
Submit your work to our NOICE Visual Expression Awards for a chance to win 128,000 sats (currently). Deadline is December 31, 2024.
Visit our website to learn more: https://noicemagazine.com/SUBMISSIONS
-
@ 6bae33c8:607272e8
2024-12-06 12:01:33So my home picking pool has been tied three weeks in a row, setting up an unprecedented quadruple week. Accordingly, it was important to get the W in the Thursday night game, and I had Packers +3.5, so I checked that box. I also had Jahmyr Gibbs in the Primetime — I need a monster week to make the playoffs, and he did okay. Finally, I had Xavier McKinney as my DB in the Steak League, and he got his seven tackles. Otherwise, I was mostly rooting against everyone, and no one did much except Josh Jacobs who scored three TDs, and even then, 66 yards and no catches.
-
Jordan Love made some insane throws under pressure. He put up modest numbers, but played a great game against an aggressive defense. The TD pass to Tucker Kraft was absolutely perfect.
-
The Packers stuffed the Lions running game, especially Gibbs. I’ve rarely seen the Lions bottled up like that.
-
Christian Watson had a nice game except for the fumble. You never know with the Packers, even with Romeo Doubs out. Jayden Reed didn’t even have a catch. The Lions got a lot of pressure even with a banged up defensive line.
-
The Lions defense gave up 31 points, but it played better than I would have expected given all the injuries. The scoring was partly due to a pick by Jared Goff, a turnover on downs in their own end and Love threading the needle on a couple plays. But the Packers had only 298 total yards.
-
Goff had time to throw and was his typical efficient self. The one thing missing was an effective running game, but when you use all four downs, you’ll usually move the chains barring penalties and sacks, and he was sacked only once.
-
I love that Tim Patrick who no one started caught, two of the TDs. Goff spread the ball around fairly evenly to his three receivers and TE.
-
I hope the Lions get some of their defenders back. This is probably the best team in the NFL when fully healthy, and the playoffs are more fun when teams are close to full strength.
-
-
@ 349d6b82:12b2a5b1
2024-12-06 11:19:473 декабря состоялся марафон по биатлону, который стал настоящим испытанием для участников. Экстремальные погодные условия — сильный ветер и низкая температура добавили дополнительные сложности к уже установленному соревнованию. В спортсмены внедрена невероятная стойкость и выносливость, преодоление не только трассы, но и суровых зимних условий. В видеосюжет мы расскажем о том, как прошел марафон и какие эмоции наблюдались у участников:
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 349d6b82:12b2a5b1
2024-12-06 11:18:37Центр Детского Творчества (ЦДТ) организовал уникальное мероприятие под названием "Фестиваль юных талантов", который собрал детей и подростков со всего города. Этот фестиваль стал важной вехой в жизни молодежного объединения, направленного на поддержку и развитие творческих способностей детей.
Фестиваль символизировал заботу о подрастающем поколении и их творческом развитии. Организаторы стремились создать платформу для самовыражения и обмена опытом между юными талантами. В фестивале приняли участие более 200 детей, представляющих различные школы и творческие объединения Серова. Среди них выделялись:
Анастасия Петрова, 12 лет, победительница конкурса художественной самодеятельности.
Иван Смирнов, 14 лет, участник театральной студии, который представил театральную постановку о дружбе.
Екатерина Лебедева, 11 лет, юная певица, исполнившая несколько популярных песен.
На протяжении всего дня проходили различные мероприятия: Дети могли попробовать себя в живописи, танцах, театре и музыке. Ещё участники представили свои художественные произведения, поделки и проекты. А на сцене выступали юные артисты с музыкальными номерами и танцевальными постановками.
Фестиваль стал площадкой для демонстрации талантов, местом для общения, обмена идеями и вдохновения. В завершение мероприятия все участники получили сертификаты и памятные подарки, а лучшие номера были отмечены специальными призами.
"Фестиваль юных талантов" - важный день для детей, который укрепит связи в сообществе, вдохновив новое поколение на творческие достижения. С нетерпением будем ждать этого фестиваля через год!
-
@ 42342239:1d80db24
2024-12-06 09:40:00The Dutch primatologist Frans de Waal coined the term "veneer theory" in his book "Our Inner Ape" in 2005. The veneer theory posits that human moral behavior is merely a thin veneer over an inherently unpleasant nature. This viewpoint can be traced back to Thomas Henry Huxley, an anthropologist and biologist who was a contemporary of Darwin. However, de Waal criticized the idea because humanity is far more cooperative than predicted by simple anthropological or economic models. However, it is possible to question how thick this "civilizing veneer" really is.
During the COVID-19 pandemic, some people discriminated against the unvaccinated , while others wished them a quick and painful death . In the United States, about 30 percent of those who voted for the Democratic Party wanted to take their children away . Professors wanted to imprison them . This was despite the fact that the vaccines did not prevent infection or reduce transmission very much (if at all).
There is an idea that evil actions often stem from ordinary people blindly following orders or societal norms.
The war between Israel and Hamas revealed a desire to collectively punish all residents of the Gaza Strip. For example, as many as 70 percent of Jewish Israelis say they want to ban social media posts expressing sympathy for civilians (""There are no civilians ."") On the other side of the conflict, there is a desire to punish Israeli citizens and Jews around the world for Israel's actions in the conflict, as shown by the storming of an airport in Russian Dagestan.
As a result of Russia's invasion of Ukraine, the alienation of ethnic Russians has become fashionable. Even Swedish defense policy pundits now found it appropriate to dehumanize Russians by calling them "orcs" (evil and warlike creatures with sharp teeth taken from J.R.R. Tolkien's stories). Others wanted to deny all Russian citizens entry . Recently, the software project Linux has removed Russian programmers simply because they are Russian. Similar rhetoric can be found on the other side.
All three of the above examples constitute a form of collective punishment, which is contrary to both the UN Declaration of Human Rights and the Geneva Convention . Yet few react.
The author Hannah Arendt coined the term "the banality of evil" when she studied Nazi war criminals. The term refers to the idea that evil actions often stem from ordinary people blindly following orders or societal norms without critical scrutiny. She argued that individual responsibility and critical thinking were of paramount importance.
In an iconic photo from the 1930s, a large crowd is shown with everyone doing the Hitler salute. Everyone except one. The man, believed to be August Landmesser , openly showed his refusal with crossed arms and a stern expression.
Imagine yourself in his shoes, standing among thousands of people who are raising their arms. Would you have the courage to stand still and quietly while everyone around you shouts their support? Or would you, like so many others, let yourself be swept along with the current and follow the crowd? Somewhere in there, you might have the answer to how thick this "civilizing veneer" really is.
Cover image: Picture of people giving a Nazi salute, with an unidentified person (possibly August Landmesser or Gustav Wegert) refusing to do so, Wikimedia Commons
-
@ dc0049d2:0d188043
2024-12-06 07:28:52Ein elektronischer Signalstörsender ist ein Gerät, das dazu dient, elektronische Signale in einem bestimmten Frequenzband zu stören oder zu blockieren. Es hat ein breites Anwendungsspektrum, einschließlich Militär, Handel, Bildung und anderen Bereichen. In diesem Artikel analysieren wir die Anwendungsfälle Elektronische Störsender in verschiedenen Bereichen und demonstrieren ihre Rolle bei der Aufrechterhaltung der Sicherheit, der Verhinderung von Betrug und der Verbesserung der Effizienz.
Anwendungen im militärischen Bereich Der Einsatz elektronischer Signalstörsender ist besonders im militärischen Bereich wichtig und wird hauptsächlich zur Störung feindlicher Kommunikationssysteme, Raketensysteme usw. eingesetzt. Durch die Störung der elektronischen Signale des Feindes kann das Militär das Kommando- und Kommunikationssystem des Feindes effektiv zerstören und sich dadurch strategische Vorteile verschaffen.
Fallbeispiel: Das US-Militär setzte Tragbare Handy Jammer ein, um während des Irak-Krieges das Kommunikations system der irakischen Armee zu stören, wodurch das Kommandosystem des Feindes effektiv gestört wurde und das US-Militär einen strategischen Vorteil erlangte.
Anwendungen im kommerziellen Bereich Der Einsatz elektronischer Signalstörsender im kommerziellen Bereich dient hauptsächlich dazu, die Weitergabe von Geschäftsgeheimnissen und den Diebstahl von Geschäftsinformationen durch Wettbewerber zu verhindern. Durch die Störung elektronischer Signale von Wettbewerbern können Unternehmen ihre Geschäftsgeheimnisse effektiv schützen.
Fallbeispiel: Ein Unternehmen nutzte einen GPS Blocker, um in das E-Mail-System eines Konkurrenten einzugreifen, wodurch Wettbewerber daran gehindert wurden, seine Geschäftsinformationen zu stehlen und seine Geschäftsgeheimnisse zu schützen.
Bewerbung im Bildungsbereich Der Einsatz elektronischer Signalstörsender im Bildungsbereich dient vor allem dazu, zu verhindern, dass Schüler während Prüfungen elektronische Geräte nutzen, um Informationen zu erhalten, und um zu verhindern, dass Schüler elektronische Geräte nutzen, um andere Schüler im Unterricht zu stören. Durch die Störung der elektronischen Signale der Schüler können Bildungseinrichtungen effektiv die Ordnung im Klassenzimmer aufrechterhalten.
Fall: Eine Schule nutzte einen elektronischen WLAN Scrambler, um die von den Schülern während der Prüfung verwendeten elektronischen Geräte zu stören, wodurch verhindert wurde, dass die Schüler während der Prüfung externe Informationen erhalten, und die Fairness der Prüfung gewahrt blieb.
Anwendungen im medizinischen Bereich Der Einsatz elektronischer Signalstörsender im medizinischen Bereich dient hauptsächlich der Verhinderung elektronischer Signalstörungen medizinischer Geräte und der Vermeidung von Sicherheitslücken in medizinischen Geräten. Durch Eingriffe in die elektronischen Signale medizinischer Geräte können medizinische Einrichtungen die Sicherheit medizinischer Geräte effektiv gewährleisten.
Fall: Ein Krankenhaus nutzte einen elektronischen Signalstörsender, um die elektronischen Signale medizinischer Geräte zu stören, Sicherheitslücken in den medizinischen Geräten zu verhindern und die Sicherheit der medizinischen Geräte zu gewährleisten.
8-Band Superstarker desktop störgeräte
Anwendungen im Bereich Sicherheit Der Einsatz elektronischer Signalstörsender im Sicherheitsbereich dient hauptsächlich der Vermeidung von Sicherheitslücken in elektronischen Geräten und der Verhinderung von Hackerangriffen auf elektronische Geräte. Durch Eingriffe in die elektronischen Signale elektronischer Geräte können Sicherheitsbehörden die Sicherheit elektronischer Geräte wirksam aufrechterhalten.
Fall: Ein Sicherheitsunternehmen nutzte einen Drohnen Störgeräte, um die elektronischen Signale elektronischer Geräte zu stören, Hackerangriffe auf elektronische Geräte zu verhindern und die Sicherheit elektronischer Geräte aufrechtzuerhalten.
Fazit Elektronische Signalstörsender werden in einer Vielzahl von Anwendungen eingesetzt, darunter in den Bereichen Militär, Handel, Bildung, Medizin, Sicherheit und anderen Bereichen. In diesem Artikel analysieren wir die Anwendungsfälle elektronischer Signalstörsender in verschiedenen Bereichen und demonstrieren ihre Rolle bei der Aufrechterhaltung der Sicherheit, der Verhinderung von Betrug und der Verbesserung der Effizienz. Durch den Einsatz elektronischer Signalstörsender können Unternehmen und Institutionen ihre Geschäftsgeheimnisse wirksam schützen, die Ordnung im Klassenzimmer aufrechterhalten, die Sicherheit medizinischer Geräte gewährleisten usw.
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 65beb8bb:55cf5527
2024-12-06 06:25:01Test1
-
@ b70ccdb5:d475d2d3
2024-12-06 00:32:24Time flies, we're already today!
-
@ 961e8955:d7fa53e4
2024-12-05 23:11:33Several factors drive demand for Bitcoin:
- Investment and Speculation: Many investors view Bitcoin as a store of value or a hedge against inflation, driving up demand.
- Adoption and Use Cases: Growing acceptance of Bitcoin as a form of payment, increased use in e-commerce, and emerging use cases like DeFi drive demand.
- Global Economic Uncertainty: During times of economic uncertainty, such as recessions or political instability, investors may seek safe-haven assets like Bitcoin.
- Technological Advancements: Improvements in scalability, security, and usability, such as the Lightning Network, can increase demand.
- Regulatory Environment: Clear and favorable regulations can increase adoption and drive demand.
- Media and Market Sentiment: Positive media coverage and market sentiment can increase demand.
- Limited Supply: The capped supply of 21 million Bitcoins can contribute to increased demand.
- Network Effects: As more people join the Bitcoin network, it becomes more valuable, driving up demand.
- Institutional Investment: Increased investment from institutional investors, such as hedge funds and pension funds, can drive up demand.
-
@ 961e8955:d7fa53e4
2024-12-05 23:04:54Bitcoin's limited supply is a key factor that contributes to its value. Here are some ways in which the limited supply impacts Bitcoin's value:
- Scarcity: The limited supply of Bitcoin creates scarcity, which can drive up demand and, in turn, increase its value.
- Inflation Protection: Unlike fiat currencies, which can be printed indefinitely, Bitcoin's limited supply protects it from inflation. This means that the value of Bitcoin is less likely to be eroded by inflation.
- Store of Value: The limited supply of Bitcoin makes it an attractive store of value, similar to gold. Investors and holders may be more likely to hold onto their Bitcoin, rather than selling it, which can help to drive up its value.
- Increased Demand: As more people become aware of Bitcoin and its limited supply, demand for it may increase. This increased demand can drive up the value of Bitcoin.
- Reduced Selling Pressure: The limited supply of Bitcoin reduces the selling pressure on the market. With fewer Bitcoins available, there is less supply to meet demand, which can help to drive up the value.
Overall, Bitcoin's limited supply is a key factor that contributes to its value. The scarcity created by the limited supply can drive up demand and, in turn, increase its value.
-
@ 961e8955:d7fa53e4
2024-12-05 22:50:26Financial Benefits
- Lower Transaction Fees: Bitcoin transaction fees are significantly lower compared to traditional payment systems.
- Fast and Global Transactions: Bitcoin transactions are processed and settled within minutes, regardless of the sender's and recipient's locations.
- No Inflation: The total supply of Bitcoin is capped at 21 million, which means that there's no risk of inflation.
Security and Transparency Benefits
- Secure Transactions: Bitcoin transactions are encrypted and recorded on a public ledger called the blockchain, making them secure and tamper-proof.
- Transparent Transactions: All Bitcoin transactions are recorded on the blockchain, providing a transparent and publicly accessible record of all transactions.
- Immutable Transactions: Bitcoin transactions are immutable, meaning that once a transaction is recorded on the blockchain, it cannot be altered or reversed.
Autonomy and Accessibility Benefits
- Decentralized and Autonomous: Bitcoin operates independently of central banks and governments, giving users full control over their financial transactions.
- Accessibility: Bitcoin can be accessed and used by anyone with an internet connection, regardless of their geographical location or financial status.
- Financial Inclusion: Bitcoin provides an opportunity for people in underserved or unbanked communities to participate in the global financial system.
Other Benefits
- Diversification: Bitcoin provides a diversification opportunity for investors, as its performance is not directly correlated with traditional assets.
- Limited Supply: The limited supply of Bitcoin makes it a scarce asset, which can help to drive up demand and value.
- Growing Adoption: Bitcoin's growing adoption and recognition as a legitimate form of payment and investment can help to increase its value and stability.
-
@ 961e8955:d7fa53e4
2024-12-05 22:45:31Financial Benefits
- Lower Transaction Fees: Bitcoin transaction fees are significantly lower compared to traditional payment systems.
- Fast and Global Transactions: Bitcoin transactions are processed and settled within minutes, regardless of the sender's and recipient's locations.
- No Inflation: The total supply of Bitcoin is capped at 21 million, which means that there's no risk of inflation.
Security and Transparency Benefits
- Secure Transactions: Bitcoin transactions are encrypted and recorded on a public ledger called the blockchain, making them secure and tamper-proof.
- Transparent Transactions: All Bitcoin transactions are recorded on the blockchain, providing a transparent and publicly accessible record of all transactions.
- Immutable Transactions: Bitcoin transactions are immutable, meaning that once a transaction is recorded on the blockchain, it cannot be altered or reversed.
Autonomy and Accessibility Benefits
- Decentralized and Autonomous: Bitcoin operates independently of central banks and governments, giving users full control over their financial transactions.
- Accessibility: Bitcoin can be accessed and used by anyone with an internet connection, regardless of their geographical location or financial status.
- Financial Inclusion: Bitcoin provides an opportunity for people in underserved or unbanked communities to participate in the global financial system.
Other Benefits
- Diversification: Bitcoin provides a diversification opportunity for investors, as its performance is not directly correlated with traditional assets.
- Limited Supply: The limited supply of Bitcoin makes it a scarce asset, which can help to drive up demand and value.
- Growing Adoption: Bitcoin's growing adoption and recognition as a legitimate form of payment and investment can help to increase its value and stability.
-
@ c43d6de3:a6583169
2024-12-05 22:15:33The Hamster's Wheel
We fancy ourselves sophisticated animals - clever toolmakers and relentless innovators. Ingenuity, we believe, sets us apart from the rest of the animal kingdom. We clothe ourselves, build machines to save time and energy, and yet, somehow, we remain deaf to the relentless squeaking of a far more profound wheel.
Not the wheels of our cars or the gears driving the machines that sustain modern life, but a wheel few of us see or acknowledge. The wheel that, for all our intelligence, makes us no different from a hamster running endlessly in its cage.
The hamster's wheel is innocent - it spins for exercise, for a fleeting distraction. Ours, however, is far more sinister, propelling us in a ceaseless race toward ambitions we barely understand.
The hamster wouldn't even have a wheel to run on, were it not for us - the inventors of its cage. What does that say about the wheels we've built for our selves?
Collective Unconscious
Think I'm full of it? Ask yourself: what does it really mean to live a good life?
At any stage of life, the answer might sound familiar to those around you. A student might say it's about getting good grades, attending a prestigious school, and eventually building a family. A young professional might define it as landing a coveted promotion or hitting a certain salary milestone. For a parent, a good life might be one where their children grow into successful, functional members of society.
No matter where you are in life, the concept of progress seems inescapable. Whatever you believe constitutes a good life, it likely aligns with the idea that progress is essential. Achieving goals, moving forward, and hitting milestones - this is what we equate with a good life.
It's an idea so pervasive that it might feel inevitable, even natural.
Carl Jung might have called this an archetype of the collective unconscious: a deeply ingrained idea that subconsciously shapes how we think and act as a society.
We see patterns in nature and mirror them, claiming that moving forward is the only just path. The idea that "Backward" connotes failure or misdirection, is embedded in our collective mythos. This belief silently influences our individual and collective goals, often without our explicit awareness.
The idea of progress influences individual choices, directs institutions, and codifies laws into our governments.
Lifting the Veil
Once you recognize how deeply this idea permeates everything we do in life, it becomes almost impossible to ignore. It's like the uncanny feeling when someone points out that you have something stuck in your teeth - you immediately wonder how long it's been there before anyone mentioned it.
Consider how the idea of progress has shaped not only your personal aspirations but also our collective societal goals.
A "good" career is often defined as one that propels society forward. Jobs in tech, for example, are celebrated with yips and hoorays, while jobs in waste management are met with quiet prayers for better opportunities. Tech jobs shape the future, while waste management deals with the shadows of today - shaded by the scraps and remnants of yesterday's meals. One is seen as advancing society, while the other is viewed as stagnant, burdened with managing the detritus of the present.
Governments, too, prioritize growth and innovation, aiming to boost Gross Domestic Product (GDP) by investing in scientific breakthroughs and space exploration. In contrast, social welfare programs are often dismissed as wasteful, mired in outdated "backward", communist, political ideologies.
Even religions, which serve as bastions of conservatism and tradition, now seek fresh approaches to attract young followers.
This relentless pursuit of progress has broken down cultural barriers, fostering a universal appeal for modernity. Yet, in doing so, it has eroded cultural diversity, imposing a singular vision of what it means to be "modern." Consider the way a modern person dresses, what image does that conjure in your mind? How might that conflict with the multitude of cultures in the world whose dress might seem a bit "backward".
While most of us, whether consciously or unconsciously, continue along this path of progress, there's often a nagging sense that something is off. We witness the environmental consequences of prioritizing short-term gains over ecological sustainability, as though progress demands we sacrifice one to achieve the other.
And still, we forge ahead - into the uncharted territories of genetic engineering and artificial intelligence - despite the glaring risks that anyone with even the slightest imagination can foresee. Progress, it seems, is a force we cannot stop, even when the outcomes may lead us to question if it was worth the cost.
The Duality of Progress
I admit I may have come off a bit strong up to this point. It might seem as though I'm condemning progress outright. However, my intent is not to dismiss progress but to highlight its pervasive grip on society worldwide.
Humanity didn't always carry this relentless obsession with progress - it's not some inherent "brain virus" we were born with. We can trace its roots to the Enlightenment, roughly 340 years ago. During that period, the modern framework of progress began to take hold, coinciding with the founding of what would become the United States. It's no coincidence, perhaps, that this nation has since led the charge in declaring progress as the only just way forward - a belief rooted in Enlightenment ideals of reason and innovation.
No doubt, much good has come from the pursuit of progress. Where would we be if we had never dared to defy "God's will" and create cures for once-deadly diseases? Who would have been driven to invent flying machines or automobiles, tools that maximize the brief time each individual has on this planet?
Progress has also shattered oppressive systems, freeing entire groups, cultures, and classes from the bonds of slavery and servitude as human rights have advanced.
Should we take progress for granted? Is it simply an inevitable outcome, a path we only need to follow until we arrive at utopia?
Countless works of literature explore the folly of anchoring one's aspirations to the idea of perpetual progress. The Great Gatsby offers a poignant example through the life of Jay Gatsby. For him, the goal was to become "The Great Gatsby" - the richest, most admired version of himself - believing that this transformation might fill the void in his heart and finally earn him true love.
This void isn't unique to Jay Gatsby. Despite living in what is statistically considered the best time to be alive in the history of mankind, we also face an era marked by the highest recorded rates of mental health issues, particularly in the most "advanced" nations.
It seems the mythos of progress is not something to be taken lightly. It is neither inherently good nor bad, but it must be approached with awareness and understanding, not blind faith.
Why Few Understand the Progression Paradigm's Influence
You don't know what you don't know. And when you know something too well, it can start to feel like an undeniable, objective truth rather than a cultural construct. This makes it all the more difficult to recognize when we're blindly following a path laid out for us.
We're taught to believe in a "natural" progression of humanity - from hunter-gatherers to industrialized societies - yet we often overlook the sideways steps and detours humanity has taken along the way. As far as I know, every person educated in institutionalized schools has been introduced to this narrative of human civilization, meaning many of us have been drinking the Kool-Aid from an early age.
This mythos embeds itself even further in our media and politics, shaping our worldview. But, like noticing something stuck in your teeth, once you become aware of it, it's hard to ignore - and you feel compelled to act.
Another gift of the Enlightenment, the scientific method, teaches us that truths about nature can be uncovered through experimentation. Yet these "truths" hold only as long as they aren't disproven.
So, what is there to disprove here?
Progression is always good for mankind.
Taken to its logical conclusion, it wont always be. I desperately hope we don't get to the point to when we can definitively prove that.
Man Evolves but the World and His Mind Vanish
Single-minded pursuit of progress at all costs is inherently all-consuming. Left unchecked, it threatens to erode both our physical and mental well-being, transforming humanity into something entirely unrecognizable. We are on the brink of such a transformation with the rise of genetic engineering, bio-technologies, and artificial intelligence.
Joe Rogan aptly describes this phenomenon as the "human cocoon." Much like a caterpillar mindlessly consuming leaves on a branch, humanity has ceaselessly innovated and progressed, weaving itself into a cocoon of technology. One day, just as the caterpillar emerges as a butterfly - an organism almost entirely different from its former self - we too may evolve into something radically altered: a technological being fully divorced from the organic nature that binds us to this planet.
Perhaps he's right. But if we awaken to the grip this narrative of relentless progress holds over our civilization, we may still have a chance to shape a different future. By adopting an interdisciplinary approach, we can ensure we do not succumb to the pitfalls of becoming the techno-larvae Rogan warns of.
Incorporating regional ethics rooted in cultural beliefs and ecological principles into our discussions about progress could provide a more sustainable and equitable path forward. This active, conscious approach would enable humanity to navigate its evolution while remaining connected to the organic world that sustains us.
-
@ 000002de:c05780a7
2024-12-05 22:02:41I've been using Minibits.cash app on GrapheneOS for my external wallet for a couple weeks. Thought I would provide an update.
Minibits is an eCash and Lightning wallet. It supports LNURL which is nice. Overall its the easiest and best eCash app I've tried. As others have mentioned I do have issues spending with NWC. But the LNURL support seems to work really well. I am guessing the NWC issues are related to their Lightning node liquidity because I often have failures with paying lightning invoices at the same time NWC payments fail.
I have a few mints set up and the CoinOS one seems to be more reliable.
Curious if others are using other NWC apps. For what its worth I have tried to set up NWC on my own node a few times now and it has been really inconsistent with Nostr apps. If I can even get it to make connections. I haven't had the time to figure it out yet.
originally posted at https://stacker.news/items/797148
-
@ 31312140:2471509b
2024-12-05 21:07:35The Hidden Dangers in Your Home
The Toxic Ingredients
Most household and personal care products are a cocktail of toxic chemicals. Despite the pretty labels "all-natural" or "eco-friendly" solutions, these items often contain substances you wouldn’t want anywhere near your skin, mouth, or home in general.
Parabens and Phthalates
Parabens and phthalates are commonly used as preservatives and plasticizers in a wide range of products. They can disrupt your endocrine system, leading to hormonal imbalances. This can result in anything from reproductive issues to an increased risk of cancer. Parabens are often found in cosmetics like lotions, shampoos, and makeup, phthalates are commonly found in fragrances and PVC plastics.
The Danger of Fragrances
Ah, yes. The alluring scent of fresh laundry or a floral shampoo. But here’s the kicker—these fragrances are often made from synthetic chemicals that can provoke allergies, disrupt your hormones, and even cause respiratory issues. Companies are not legally required to disclose the specific chemicals used in their fragrances, making it tricky to know what you’re actually exposing yourself to.
Sodium Lauryl Sulfate (SLS)
SLS is a detergent and surfactant found in many personal care products like toothpaste, shampoos, and even soaps. It’s known for skin irritation and has been linked to a host of other health issues. Studies suggest that prolonged exposure can be harmful to the tissues in your mouth and could contribute to the formation of ulcers and canker sores.
Triclosan
Widely used as an antibacterial agent in products like soaps and deodorants, triclosan has been shown to disrupt thyroid function and contribute to antibiotic resistance. Long-term exposure can mess with your microbiome and weaken your body’s natural defenses.
The Environmental Impact
Pollutants in Water Supply
Personal care products contribute to water pollution, especially when these toxins wash down the drain into the water supply. Many of these chemicals are not effectively removed by wastewater treatment plants. They can end up in our rivers, lakes, and even our drinking water, causing harm to aquatic life and potentially returning to us through the water we consume.
The Synthetic Scourge
Microplastics and synthetic compounds from household products accumulate in the environment. These pollutants don’t break down easily, causing long-term damage to ecosystems around the world. Think about it—every time you wash your clothes, you might be releasing microplastics into the water system, harming marine animals.
Solutions and Alternatives
Go Natural
The best way to avoid these harmful chemicals is to go back to basics. Opt for products that list all-natural, organic ingredients. There’s an increasing number of companies dedicated to creating genuinely non-toxic products.
DIY
Making your own household cleaners and personal care products is easier than you think. Simple ingredients like vinegar, baking soda, coconut oil, and essential oils can replace a multitude of toxic products. For instance, mixing baking soda and vinegar in equal parts can create an effective all-purpose cleaner that’s surprisingly effective without the side effects.
Be an Educated Consumer
Knowledge is power. Start reading labels and researching ingredients. Just because a product is labeled "natural" or "organic" doesn’t mean it's free of harmful substances. Check for certifications and look up brands that genuinely prioritize health and environmental sustainability.
Conclusion
The household and personal care products you use daily could be slowly undermining your health and environment. It’s high time you took a good, hard look into what you’re bringing into your home. Challenge the status quo, make informed choices, and safeguard the health and well-being of yourself and your loved ones. Remember, the small changes you make today can have a powerful impact on your tomorrow. 🌍
Suggested Readings
"Not Just a Pretty Face: The Ugly Side of the Beauty Industry" by Stacy Malkan
"Green Clean: The Environmentally Sound Guide to Cleaning Your Home" by Linda Mason Hunter and Mikki Halpin
References
"Endocrine-Disrupting Chemicals in Cosmetics" by Andrea C. Gore, Barbara Cohn
"Chemical Exposures: The Ugly Side of Beauty Products" by Julia R. Barrett
"Health Effects of Sodium Lauryl Sulfate (SLS)" - Journal of the American College of Toxicology
Hope that gives you plenty to ponder. 💡
-
@ 17538dc2:71ed77c4
2024-12-05 20:54:13Nostr Onboarding Questionnaire
Below are are results of the nostr qualitative onboarding questionnaire created by elsat in early November, 2024. Responses are from 22 nostr surivors/masochists. Results are not representative of people who never made it past onboarding. These are folk that remained on nostr, and were active around the time I asked for volunteers to provide feedback on onboarding to nostr.
Let me know if anything stands out, if you have questions about any particular response!
I. Did you onboard to nostr on your cellular network, on wifi?
14 Wifi; 7 cell; 2 both; 1 other
II. What was the biggest pain point in onboarding to nostr?
Discovery
Discover interesting content and other people Finding the right content. Discovery. Loading/lacking data figuring out how to find interesting people Finding npubs
Value Prop & Learning Curve
Knowing how it differs from tradsofiu Learning the difference between the protocol and the app I needed to download and onboard through. Choosing a client. Trying to figure it out on my own.
Key management
Private/pub key handling That's definitely key management. How and where to store it to have it secure, still accessible for use with other apps in a secure way. Getting my nsec in without pasting it
Relay setup
Setting up relays, discover interesting users to follow, > building your own feed figuring out relays Finding reliable relays to join.
Wallet Setup
Setting up a lightning wallet Lightning wallets for sending and receiving Zaps.
Notifications
Notifications [presumably missing notifications]
Accessibility
Finding a very good accessible client for the computer (I'm blind). Amethyst seems to be good on my Android device, but I avoid smartphones.
Scary links
I tried to "onboard" (ie expose) friends to nostr by sending them links to interesting/funny notes here and there. But some of the default sharing links I use (Amethyst -> Njump) are so long that they always think it's some spam. (Primal has nicer web links)
Customization
Figuring out profile setup, lots of unfamiliar fields
III. What part of nostr "wow'd" you, and when did this happen?
take your social graph with you; distribute your data
That all the data is already there if you use different clients and you take your social graph with you through completely different apps. seamless account a mobility of course ccount easy switching between clients Moving my social graph between clients. Happened in the first days of usage. Cross over between different clients. Happened on a Tuesday.
V4V, freedom, exclusive, and censored content
Freedom, some V4V and exclusive content, some censored content The clear messaging why nostr was better than mastodon/ activitypub
Flexibility, BYO Algorithm, Control
The insane flexibility. Nostr is a textbook example of "worse is better". So I think I was converted when I realized how much could be built with this, not just social media. My "Aha! This is more than just a Twitter clone" moment was when I stumbled on Oddbean. Also there's this whole "bring your own algorithm" / "build your own algorithm" to the social media side of it. And we're starting to see that work out in practice, with things like bitvora's algo-relay. Complete control A digital portable social identity that I can take with me from one app to another. December 2022. Experiencing the interoperability when i tried Listr, spring '23 I think Initially it was decentralization and censorship resistance. >You can spin a simple backup relay, own your data truly, and rebroadcast everything to different relays. Amethyst, adjusting the relays
Access to devs
Devs working in real time on it visible - too cool
Zaps
Zapping! Right away Zapping zaps! and also the small community After [initial censorship resistance phase is over], the most wow part was zaps, still is. Zaps for shitposting & being able to login into different apps with the same account
Cordiality
Open respectful discussion among people who do not agree Friendly discourse of users. Not toxic like other special media. First day.
IV Around what time did you onboard to nostr (e.g. July 2023)
Nov 2021 December 2021 2022 the single html page first POC client December 2022 Dec 2022 December 2022 Jan 2023 January '23 feb 2023 February 2023 Early 2023. Didn't really play around with it until December 2023 May 2023 June 2023 - Plebstr, November 2023 primal march 2024 amethyst, January 2025 notedeck I've been dipping my toes in the water since 2022 but just started taking it seriously last month. July 2023 March 2024 Summer 2024. August 2024 Nov 2024
V Which app
astral.ninja (2) Branle Damus (6)
"(needed the simplicity)"
PRIMAL (5)
"(needed the simplicity)" Amethyst (4)
Coracle Coracle and nos2x
Various
A combo of Amethyst (phone), nostrudel (web), and algia (command line). I'm a command-line junky. I also am fond of Oddbean, because it's basically a hackernews style thing built on top of nostr. But see my complaint about Nazi bar / Temple of Satoshi. Could not recommend to friends. At some point, I intend to set up strfry and my own Oddbean instance targeted to anti-capitalists.
Created my keys with alby
Can't remember the actual name
VI Have you experienced a failure in onboarding others to nostr? What exactly happened?
Poor experience trying to onboard newbs to nostr during the conference (mostly on iOS which I do not use), around 10-12 people. Granted the cell coverage was not great and not sure I remember everything that went wrong, but users were generally confused with loading/lacking data. Create a profile, then I tried to follow them but could not find them from Amethyst. So scanned QR code, which is a non-obvious step. Then their profile showed just the npub but no info or pfp, some commented on that. Followed them but they didn't receive a notification for that on Damus, this confused most. And then what? Post a note? (I was recommending #introductions ). While you wait for all this to load, tap, retry... between laughs you need to come up with conversation and try to somewhat defend nostr, tell them we're early and bugs will be fixed etc. On Primal follows do appear but feeds don't load. And it autofollows a bunch of random people - some liked it some didn;t. They posted a note and I wanted to like/zap it but I could not see that note on my client either, even though I'm connected to major relays (could be nostr.wine's fault, but I tried with the zap.store account as well). I saw one guy KYC himself 3 times with the wallet because when he switched to his email client to get the code and the app kept resetting the screen. Lucky that the majority of people were eager and did their best to try. Since some of these were after Jordi's talk where he offered several clients to download, it was not always my choice/recommendation on which client to download - they just came with it. I know we do our best but guys... it's bad. This reminds me of getting a newb to open a LN channel and get liquidity. Painful. If we have to centralize more to better onramps, so be it.
difficulty / friction
Picking a client
Yes. It's too technical. You need many tools to accomplish small tasks.
Yes, tried primal on Android. It failed to accept any profile changes
Not able to find other npubs when using search in several clients
stale
They got no new events, because they followed only a few users
They didn’t become frequent users because I’m the only person they know in nostr.
They lose interest in the network compared to traditional social networks. They were normies.
Some found it strange that you follow a bunch of bitcoiners (seemingly) by default (Primal iirc)
yes. non bitcoiners not interested in joining a small network of people just yet
quotes
I haven't tried to bring anyone to nostr. I am a bit scared to do so, because the place has a rep of being a Nazi bar and an extension of the Bitcoin cult. I do think that it is what you make of it, and I've tried to argue that point with friends. It's a protocol, nothing more. Don't wanna interact with Nazis and use Bitcoin? Nothing says you have to.
They don't care
I have not convinced anyone to use nostr
Too hard for most folk.
Not really.
No. Never tried.
No, onboarded two successfully.
Yeah I generally suck at getting people to check out new stuff
VII What, if anything, do you think confuses people during onboarding to nostr? Why? Have you observed this?
Setting a optional username is confusing for many and also they don't know what a NIP-05 is (they are likely to just fill in their existing mail address)
Finding some people. No progress of loading content or indication of time. Slight confusion where are DMs, home, etc, tabs basically
The why. Its much easier now, I was way confused DEC 22
Same on boarding is difficult to people on Nostur.
There is no app in the App Store called “nostr”
nips and relays
We tell people that you don't need KYC to use Nostr and then ask them for KYC for Lightning wallets.
No in-client intro to the "what" and "how" of it all. I haven't witnessed that, but I believe it could squash preconceived notions.
Key management. Especially because there is no key rotation(recovery option in a traditional email/phone way), if it leaks, you are done.
Safe keeping of your nsec. There are many ways to do it, all of them unfamiliar to most users.
When you don't see data you are expecting, be it a profile picture, a follow notification, or a note. Remember people who want to try Damus/Primal/etc microblogging clients come from twitter - so cater for transition from Twitter. Gen z snapchat/tiktok users don't care about nostr, no way to relate
Understanding how to filter for non-Bitcoin content.
need for setting up relays to filter the spam waves, finding the interesting follows, and difficulties setting up usable (even custodial) wallets.
Why would I want to use nostr?
Relays / keys
VIII What, if anything, do you think scares people away during onboarding to nostr? Why? Have you observed this?
Not much, but probably nsec backups and transfers if they knew
Dark web scary things
Technical questions
Personal responsibility for keeping nsec safe
Intuitiveness.
just not enough people on it for them (non bitcoiners)
Technical complexity with either Lightning or relay management.
Depending on client, slowness, difficult search, or feeling empty upon arrival.
Again, keys.
Bitcoin blah blah
I don't know anybody IRL that even use x
Their core influencers haven't adopted nostr yet.
IX What one improvement would make onboarding to nostr easier?
Explain it s not a platform and the current app you're using is replacable by other by (re)using your keypair
Twitter bridge
Honestly, from a technical standpoint, I found it pretty easy. Especially with Amethyst on the phone. So I'm not sure if I have an opinion here.
Private key management to hide the complexity
Little guide somewhere or a buddy to ask questions
An intelligent assistant to setup relays
Reach
bringing wallet of satoshi back! or some similar easy custodial lightning wallet
Better user and content discovery.
Clients dedicated to onboarding, education, and key management instead of social stuff
Key recovery/rotation option. How? Hell if I know. Smart people say Frost, something, something. XD
More established signing mechanisms
An easy GoTo FAQ How to add people; how to zap; etc.
Do not try to connect to 89239823932 relays and make it decentralized when people only care about the first impression?
More "other things" micro-apps, not do-everything whale apps
More users
X What, if anything, do you think should be addressed, or added to onboarding to nostr across most nostr apps? Why?
A skippable small visual intro guide
Content discovery
A way to hide duplicates of the same post.
Better user and content discovery.
Introductory level education, expecting a traditional social app experience then not seeing it
Right now for me everything starts and ends with key management. Maybe a simple signing and profile edit app available across all platforms and devices with option paired with hardware signing device.
An onboarding relay. Only accepts the first note for an npub (kinds 0, 1, 3). Maybe
Easier relay selection.
Make bunker actually work
Staged roll out of owning your own keys to help them understand what that means
XI Do you have any other observations, feedback, or commentary on onboarding to nostr?
Yes, I think I'd say that most of my complaints are social / cultural, not technical. Then again, I've been online since 1993.
People have gotten lazy and are used to being fed content for their interests. This doesn't happen easily on Nostr and needs improvement.
An empty feed is better than a pre-determined one.
We suck and there's no good reason why
I have never gotten bunker to work
XII What is your favorite onboarding experience to an app outside nostr?
Telegram (x2)
Onboarding to the fediverse was pretty good. Witness the fact that a lot of blind twitter moved there.
They're all mostly the same, email, password, confirm. So any that i can use without signup is superior.
Can't recall any that really stands out. But in terms of following users during the onboarding what music streaming apps do is really nice. You get presented with a list of artists and based on what artists you check to follow list adapts and shows you similar suggestions.
None in particular, but I like when account creation is delayed as much as possible, I.e there is a public experience for you to try the product with no commitment
Several I can't recall now. But we need to make it AT LEAST as good as Twitter because that's where our users come from
old Twitter, circa 2019
I prefer no onboarding needed
I like "log in with" buttons but fuck those walled gardens
-
@ fa1d8325:7c91882e
2024-12-05 17:37:22В Пятигорске разгорелись обсуждения по поводу недавно разработанной вакцины, которая содержит микророботов для поддержки иммунной системы человека. Местные жители выражают опасения относительно безопасности и потенциальных последствий использования данной технологии.
Вакцина, по заявлению разработчиков, должна улучшать иммунный ответ и защищать от различных заболеваний, а микророботы будут работать на обнаружение и нейтрализацию патогенов. Однако среди населения возникает много вопросов о возможных побочных эффектах внедрения таких технологий.
Представители местного здравоохранения призвали жителей сохранять спокойствие. Они отметили, что вакцина прошла предварительные клинические испытания и уверили, что дальнейшие исследования будут проводиться с целью оценки всех рисков.
Общественное мнение разделилось: одни поддерживают использование инновационных технологий, а другие требуют большей прозрачности и проверки информации о вакцине. Власти продолжают следить за ситуацией, а жители ждут дополнительных разъяснений.
-
@ fa1d8325:7c91882e
2024-12-05 17:35:30В Пятигорске завершилась реализация масштабного экологического проекта, инициированная местным активистом и экологом Макаром Осиповым. Проект, направленный на озеленение крыш городских зданий, получил признание на конкурсе лучших экологических инициатив города еще месяц назад.
Сегодня многие крыши в городе превратились в зеленые оазисы, украшенные разнообразными растениями — от деревьев до цветов. Этот шаг не только преобразил облик городского ландшафта, но и положительно повлиял на качество воздуха, создав более комфортные условия для жизни горожан. По словам Макара Осипова, озеленение крыш стало значимым вкладом в устойчивое развитие Пятигорска.
«Мы не просто улучшили экологию, мы создали новые зоны для отдыха и общения», — подчеркнул он.
Проект получил активную поддержку как от муниципальных властей, так и от широкой общественности, что подтверждает важность коллективных действий в вопросах охраны окружающей среды.
-
@ fa1d8325:7c91882e
2024-12-05 17:32:44Ученые из Пятигорска сделали прорыв в области косметологии, создав уникальную таблетку, которая способствует регенерации тканей. Этот инновационный препарат не требует инъекций или ботокса и уже успешно прошел клинические испытания.
Таблетка, разработанная специалистами из Пятигорского государственного университета и клиники Comilfo, представляет собой особую формулу, которая активизирует естественные процессы восстановления в организме. Она стимулирует клеточную активность, что, в свою очередь, улучшает состояние кожи и уменьшает видимость морщин.
Ученые считают, что новая таблетка может стать альтернативой традиционным методам омоложения, таким как инъекции гиалуроновой кислоты и ботокса. Она позволит людям улучшить свой внешний вид без хирургического вмешательства.
Клинические испытания показали высокую эффективность препарата. Участники отмечали заметные изменения в состоянии кожи уже через несколько недель после начала его приема.
Ожидается, что в ближайшее время таблетка станет доступна в аптеках и косметологических клиниках. Это сделает ее доступной для всех, кто стремится выглядеть моложе и привлекательнее.
«Мы очень рады, что наша разработка вызвала такой интерес. Таблетка для омоложения — это безопасный и эффективный способ улучшить состояние кожи без хирургического вмешательства. Мы надеемся, что она поможет людям чувствовать себя более уверенно и привлекательно,» — делятся ученые.
Однако важно помнить, что перед началом приёма любых препаратов необходимо проконсультироваться с врачом.
-
@ 9c47bb51:000381d0
2024-12-05 17:26:41If you could earn between 100-1,000 sats a day, what would that amount to if Bitcoin reached $1,000,000 per coin? Let’s do the math:
1 Bitcoin (BTC) = 100,000,000 satoshis (sats).
Current Bitcoin price = $101,000.
Future Bitcoin price = $1,000,000.
Daily Earnings in Fiat Equivalent at $1M/BTC:
• 100 sats/day = 0.000001 BTC/day = $1.00/day • 1,000 sats/day = 0.00001 BTC/day = $10.00/day
Annual Earnings at $1M/BTC:
• 100 sats/day x 365 days = $365/year • 1,000 sats/day x 365 days = $3,650/year
Even at the smallest level—earning 100 sats a day—you’re positioning yourself for significant long-term wealth as Bitcoin’s value increases. It’s a perfect example of the power of accumulation over time.
Why Every Sat Matters
Bitcoin is scarce, with only 21 million BTC to ever exist. That’s 2,100 trillion sats for the entire world. Each satoshi is a fraction of a finite resource, making it inherently valuable. If someone gives you even 1 satoshi, they are saying, “I appreciate your work. You’re making a difference.”
Whether you’re earning sats through:
• Working: Salary or side hustle paid in Bitcoin. • Nostr: Engaging, posting, or contributing to communities. • Streaming: Providing value in podcasts or live content. • Rewards Apps: Using tools like Fold or other Bitcoin cashback services.
Every sat stacks up, and over time, those seemingly small earnings can become life-changing.
The Fun of Stacking Sats
Part of the magic of Bitcoin is the journey. Watching your small daily efforts compound into something meaningful is both empowering and exciting. So whether you’re earning sats, stacking on dips, or getting tipped on Nostr—have fun. Celebrate every sat. You’re building a future on a foundation of hard work and a revolutionary currency.
The Bitcoin ride is just getting started. Hold tight, stack consistently, and enjoy the journey to financial sovereignty!
-
@ dfc7c785:4c3c6174
2024-12-05 15:19:05Here goes my first proper long form Nostr post - yay!
What is Modulations? How did it begin?
I joined Substack when it launched and started writing a blog about a lot of general stuff and it had no direction, then during Covid I started getting back into music production, exploring music theory, learning synthesis which led me to becoming deeply fascinated in it all - I originally got into music as a youngster, learnt guitar and some keyboard playing in my teens and into my twenties back in the 90s. I wrote a simple piece of music software on both my Commodore 64 and Amiga 500, later moving on to the PC learning Cubase at the point in time when it was rather fresh to the world - it all made sense and I wrote a few tracks, releasing them on what was known as MP3.com at the time.
Fast forward some 20 years or so!
Around 2018, I started getting interested in Ableton and can remember rekindling my Yamaha CS2x to use with it and then two years later during Covid, this became a big thing for me, it helped keep me sane during the lockdowns.
Not long after Covid I started a Substack called Modulations, which makes use of it's blogging tools, audio and video embedding, podcasting and so on.
It's gained a lot of subscribers, did have some paid subscribers for awhile but since I've lost them, another good reason to gradually move the project over to Nostr.
What’s the plan going forward
I’ve always enjoyed journaling and writing about my music, the tools I use and the tools that I would like to try out in the future; of which there are many of course. These days so many new products are launched every month, all of which I tend to either ignore or add to my “maybe buy someday” list.
They come in two main forms, software or hardware and then they can all be divided into Synth, Sampler, Sequencer or FX.
There has been a desire in many to switch to what we call DAWless which I can’t help but think at times is a network effect of YouTubes influencers. Don’t get me wrong many of them are good at what they do and are aware that there are some highly desirable products out on the market.
For the non computer based musicians out there, who don't know what DAW means, it stands for Digital Audio Workstation.
Do we need them all though? Do we need to go DAWless, stick with the DAW or go for something in between?
I’m asking this for myself if I’m honest. I bought gear these past few years, sold some because I didn’t gel with it or it was gathering dust.
2025 may well be more of a Hybrid studio year, where I explore using Ableton, in conjunction with some hardware devices. I have my eyes on a couple, that will fit in well with what I already own.
In the meantime, check out https://modulatioos.substack.com
It will continue there for awhile but the dream is to Nostrify it completely if I can!!
-
@ 349d6b82:12b2a5b1
2024-12-05 15:06:54Волонтеры Серовского городского округа продемонстрировали истинное мужество и солидарность, организовав масштабную акцию помощи животным, пострадавшим от разрушительного пожара в Сосвинском районе. Их самоотверженные усилия привлекли внимание местного сообщества и властей, став ярким примером единства и социальной ответственности. Подробнее в видеосюжете:
-
@ f1989a96:bcaaf2c1
2024-12-05 14:56:41Good morning, readers!
In Thailand, the government initiated the second phase of its digital cash handout, targeting four million Thai seniors with 10,000 baht ($290) distributed via their state-controlled “Tang Rath” app. For all intents and purposes, this serves as a pilot for the Thai central bank digital currency (CBDC), which comes with stringent restrictions and requirements on its usage, including links to citizens' national IDs, facial recognition, and limits on where and when funds can be spent.\ \ Meanwhile, in Brazil, new regulations proposed by the central bank would ban digital asset exchanges from allowing users to withdraw stablecoins to self-custody wallets. If passed, this would set an unfortunate precedent for financial autonomy in Brazil, restrict citizens' movement of funds, and diminish their ability to have an alternative to the declining Brazilian real.
In a positive step for financial privacy, a US court determined that the Office of Foreign Asset Control (OFAC) exceeded its authority in sanctioning Tornado Cash, a digital asset mixing tool that provides users with transaction privacy. This ruling sets an important precedent, means US citizens can use Tornado Cash again, and is good news in general for builders of open-source privacy tools worldwide. In other privacy news, peer-to-peer Bitcoin exchange Robosats now shares an order book with fellow peer-to-peer Bitcoin exchange LNP2Bot via Nostr, making these privacy-centric on-and-off ramps more accessible and liquid for users worldwide.\ \ We end with the latest episode of the HRF x Pubkey Freedom Tech Series, in which HRF’s Arsh Molu interviews Jorge Jraissati, president of the Economic Inclusion Group, on the state of freedom technologies like Bitcoin in Venezuela following Maduro’s stolen election earlier this year. This is an essential listen to understand how open, decentralized, and uncensorable protocols are instrumental for human rights and financial freedom to flourish under repressive regimes.
Now, let’s jump right in!
Subscribe here
GLOBAL NEWS
Thailand | Begins Second Phase of CBDC Handout
Thailand has begun the second phase of its 10,000 baht ($290) digital handout (ostensibly a central bank digital currency), targeting 4 million senior citizens and distributing funds via the government’s “Tang Rath” app. This follows an initial handout of digital currency to 50 million Thais as part of an economic stimulus plan. Critics, however, argue the handout is more accurately a means to entrench financial control and sway votes in the upcoming election. The Thai government limited the initial handout to local spending, specific items, and a six-month expiration. The second phase will likely impose similar restrictions, including requiring registration and facial recognition in the Tang Rath app. According to Thailand’s prime minister, “the digital wallet system would form a digital infrastructure for Thailand by creating a digital ID for citizens to link to government agencies” — a disconcerting reminder of how CBDCs can amplify state control over individual financial activity under the guise of social support.
Brazil | Proposes Ban on Transferring Stablecoins to Self-Custody
The Central Bank of Brazil (BCB) proposed regulations prohibiting digital asset exchanges from allowing users to withdraw stablecoins (digital currency pegged to fiat currency) to self-custody. The restriction aligns with a bill passed in December 2022 that grants the BCB “authority” over the digital asset industry. While presented as a safeguard for international capital flows, it is more likely a front to diminish the financial autonomy offered by digital assets. If passed, it will limit individuals' movement of funds and set a chilling precedent for self-custody in a country where millions of Brazilians transact with digital assets on a monthly basis. As Brazilians face increasing economic instability and diminishing financial freedom, this regulation traps them further in a collapsing Brazilian real (BRL).
China | Prepares for Sanctions While Eyeing Taiwan
China is actively studying sanctions imposed on Russia to prepare for potential repercussions if it invades Taiwan. Chinese officials visited Moscow’s central bank, finance ministry, and other key agencies to analyze how Russia navigated economic restrictions. This proactive approach speaks to fears China may have over its $3.3 trillion in foreign reserves and overseas bank assets, which would face significant restrictions under Western sanctions. In an effort to mitigate these risks, China is working to diversify away from dollar-denominated assets and reduce reliance on US Treasury bonds, which underpin the global financial system. This comes amid escalating tensions with the US after Washington approved an arms shipment to Taiwan, prompting Beijing to vow “resolute countermeasures.”
Nigeria | Journalist Detained for Exposing Regime Corruption
The Nigerian Army’s 6 Division in Port Harcourt detained prominent investigative journalist Fisayo Soyombo, sparking national outrage over press freedom in Nigeria. Soyombo, known for exposing regime corruption, recently unveiled alleged smuggling operations involving the Nigerian Customs Service (NCS). The Foundation for Investigative Journalism, founded by Soyombo himself, demands his immediate release and condemns the actions as an attack on journalism. Under President Bola Tinubu, the government has intensified its dismantling of independent media, silencing critics and restricting tools and pathways that promote financial autonomy. This systematic repression denies citizens the ability to challenge inequality and secure a freer future.
Morocco | Drafts Law on Digital Assets and CBDC
Morocco is moving toward allowing digital assets and a central bank digital currency (CBDC). Central Bank Governor Abdellatif Jouahri shared that a draft law is currently in the adoption process that would reverse a ban on digital assets from 2017. The interest in a CBDC is nothing short of concerning in a country facing widespread repression and economic challenges. Citizens have already taken to the streets to protest rising costs, unemployment, and a lack of basic services. Centralized and programmable money provides the Moroccan government with newfound power to control individual financial activity and only serves to worsen these prevalent issues. Bitcoin adoption remains high under a regime that continues to fabricate economic hardship for its people.
LATEST IN BITCOIN NEWS, DEVELOPMENT, AND COMMUNITY
Tornado Cash | Fifth Circuit Court Lifts Sanctions
The US Court of Appeals for the Fifth Circuit ruled that the Treasury’s Office of Foreign Asset Control (OFAC) exceeded its authority by sanctioning Tornado Cash, a digital asset mixing tool that helps preserve transactional privacy. This reverses an earlier District Court decision that argued the software was under the authority of the US Treasury. The Fifth Circuit found that Tornado Cash’s smart contracts (self-executing lines of code) do not constitute “property” or “services” as defined under the International Emergency Economic Powers Act (IEEPA). They deemed these contracts more akin to “tools” than “services” requiring human effort, constituting "nothing more than lines of code.”
Robosats | Shared Nostr Order Book With LNP2Bot
Robosats, a privacy-focused peer-to-peer (P2P) Bitcoin exchange and HRF grantee, released version 0.7.3-alpha, introducing shared order books with LNP2Bot, a fellow P2P Bitcoin exchange and HRF grantee. P2P exchanges provide a decentralized, uncensorable, and private way for individuals to acquire Bitcoin — crucial in dictatorships with financial restrictions and heightened surveillance. The integration will allow users to access public trade orders from both platforms, creating a larger, more liquid marketplace for trades while reducing arbitrage opportunities. HRF is pleased to see the continued development and collaboration of privacy-focused Bitcoin platforms, which offer a vital on- and off-ramp for individuals whose financial privacy runs paramount for their safety.
Primal | Releases Version 2.0
Primal, a Bitcoin wallet and client for the decentralized Nostr protocol, released version 2.0 of its application, bringing new features and accessibility improvements to users. The update includes a Reads tab, allowing users to browse long-form articles, including HRF’s Financial Freedom Report, now natively on the platform. Additionally, an Explore Tab and Feed Marketplace help users connect, discover trending topics, and access tailored information. The update also brings a revamped search with customizable filters, making finding specific content easier. Primal continues to reinforce its role as a tool for uncensorable communication and greater financial privacy where needed most.
Ark | Introduces Virtual Channels for Instant Settlement
Ark Labs introduced virtual channels, a new feature enabling the instant settlement of transactions on the Ark protocol. Virtual channels facilitate payment channels without relying on backups, constant connectivity, or routing requirements. Ark itself is a layer-two protocol aimed at increasing Bitcoin’s scalability through fast and low-cost transactions. It accomplishes this by pooling Bitcoin liquidity, enabling users to make payments while providing liquidity providers the opportunity to earn fees. The primary tradeoff of Ark is that user funds expire if not used before a set period of time. You can learn about this update here.
Africa Bitcoin Conference | Upcoming Conference
From Dec. 9-11, activists, educators, and entrepreneurs will gather in Nairobi, Kenya, for the Africa Bitcoin Conference to discuss Bitcoin as a tool for resisting increasing global authoritarianism and promoting financial sovereignty. Attendees will participate in discussions, workshops, hackathons, and keynotes, exploring how Bitcoin can provide an economic and social foundation that empowers the individual, safeguards privacy, and fosters inclusion. HRF’s Financial Freedom team is sponsoring the event and will also attend, with keynotes delivered by Christian Keroles and Femi Longe. You can learn more about the conference here.
Chaincode Labs | Bitcoin and Lightning Development Program
Chaincode Labs, a Bitcoin research and development firm, invites developers to apply to its Bitcoin and Lighting protocol development program. This free, three-month course equips participants with the skills needed to contribute to Bitcoin open-source software while receiving mentorship from industry leaders. Open to developers of all experience levels, the program offers a pathway to careers in open-source software development. Applications close on Dec. 31, 2024.
RECOMMENDED CONTENT
HRF x Pubkey — Freedom Tech in Venezuela Post-Election with Jorge Jraissati
In the latest HRF x Pubkey Freedom Tech Series, HRF’s Arsh Molu interviews Jorge Jraissati, president of the Economic Inclusion Group, to discuss the state of freedom technologies in Venezuela following Maduro’s stolen election. Jraissati offers a detailed account of how technologies like Bitcoin are helping Venezuelans navigate an economic landscape marked by hyperinflation, authoritarian control, and restricted access to financial services. The conversation underscores the importance of open and decentralized protocols in empowering individuals to bypass government restrictions, preserve their wealth, and sustain hope in a nation facing profound hardships. Watch the full interview here.
A Response to Ideological Stereotyping by Win Ko Ko Aung
In this article for Bitcoin Magazine, HRF Global Bitcoin Adoption Fellow Win Ko Ko Aung addresses the ideological misconceptions surrounding Bitcoin stemming from individuals' preconceived notions of this emerging technology. Drawing on his experiences as a Burmese human rights advocate, Aung contrasts Western stereotypes of Bitcoin with his own personal story and emphasizes Bitcoin’s potential as a borderless financial tool for those living under authoritarian and repressive regimes. Read the full article here.
If this email was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.
Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
-
@ 349d6b82:12b2a5b1
2024-12-05 14:51:54Вчера в Серове состоялось событие, которого ждали многие — грандиозный концерт легендарного исполнителя Александра Берегова! Этот вечер стал настоящим праздником музыки и эмоций, ведь артист вернулся на сцену после долгого перерыва. Подготовьтесь к незабываемому шоу в Дворце Культуры Металлургов, где собрались тысячи поклонников, чтобы насладиться как новыми композициями, так и любимыми хитами.
-
@ fcb65172:87f3c4ed
2024-12-05 14:17:51Two weeks ago, on a saturday night, my wife and I decided to go to a festival at our local park, not knowing what kind of festival it was. After dinner we looked at each other in that “what are we going to do tonight” kind of way, I’m sure you know it well, if you’re married too. Little did we know that we were going to head to a massive religious Team Jesus festival. We’re talking 5-10,000 sitting on the grass drinking mate and eating Asado (Argentinian Barbecue) while listening to religious preachers, gospel music, and, to my surprise, a Calvin Harris like DJ dropping beats. The only difference being- I didn’t meet this DJ in the summer, I met him that Saturday night, sitting on the park grass.
If I could go back a decade to tell a 19 year old me: “In 10 years from now, you are going to go out on a saturday night, spontaneously with your wife, to a religious festival featuring gospel music and religious preachers, AND, you are going to be perfectly fine with it. That same 19 year old atheist me, would roll his eyes in disbelief and laugh me out the room. As a kid, brought up in a very non religious Denmark, to whom the yearly church visit for the Christmas mass, was my idea of hell on earth, it seems unfathomable that I’m now a 29 year old man with a fairly close relationship to God. Whatever that even means. How did I end up here?
My Atheist Life and Upbringing
I am rebellious by nature. I absolutely despise the notion of anyone dictating how I have to live my life, telling me what I have to think. Having to console the Bible for the answer to all my dilemmas still, to this day, seems ridiculous to me. I mean, who swears by any book to such a degree that they would blindly turn to it, for consultation on every issue in their life? I used to be one of those annoying atheists who completely dismisses the existence of anything, but their own mind and consciousness. I used to say things like: “Religion is a tool for brainwashing, manipulation and the cause of all evil in the world” and “Religion creates wars not inner peace.” Uhh, and my personal favourite atheist line: “If a God really does exist, then why is there so much evil in this world?”
I’m sure you’ve heard these lines rattled off before– or maybe you, yourself spew such sentences, from time to time? Well let me tell you, they are all very convincing one-liner arguments, to a rebellious young man like me. So how did I come to “see the light" as they say?
What is God?
Over the past decade of travelling the world I have come to realisation, that God isn’t this construct of the Bible or the Quran or whatever flavour of holy script you subscribe to. You know, this all-seeing creator of life itself, who judges every single decision I make.
God, to me, is this inexplicable energy between me and the universe at large. God is this ever present energy which we all feel, but can’t quite put our finger on. It’s the energy that drives me to create, everyday– the energy that made me sit down to write this. It just feels right, like a calling– like I must write this story. That same energy made you read this. God is me. God is you. God is in everything and everyone you see around you. We are all mere images of God because we all create life where there previously was none. And we do it every single day, 24/7, all day every day.
Have you ever experienced the feeling that someone you’d never met showed up in your life, for a brief moment, to deliver you a message, a piece of advice or a nudge in the right direction? As if someone had sent them specifically to you? As if someone was listening to your thoughts? Let me tell you– I have had many such experiences in my life.
When I Met God
Let me give you an example. The year is 2018. It is early April. I’m sitting in a hostel patio in Buenos Aires, a cigarette in one hand and a one litre Quilmes beer in the other. I’m in disarray–split in my mind and with seemingly no goal to pursue.
I had been travelling for about a year. I had originally set out, with the goal of finding somewhere in South America, where I’d like to live for a few years, while becoming fluent at Spanish. But during my travels I had lost sight of my originally stated goal. I had instead come to think that I would go back to Denmark and study photojournalism. I had even bought a ticket back to Denmark. That’s why I was in Buenos Aires, to catch my flight back to Denmark in a couple of days. I know, what the hell was I thinking?...
A few months earlier during Carnival 2018 in La Paz, Bolivia, I had met the most interesting, gorgeous local Bolivian girl. She had showed me around La Paz everyday for the two weeks I was there. We talked for hours on end, at cafes, restaurants, and, at night, in bars or at viewpoints across the city. I would walk her home every night, or that is to say–as close as she would let me get to her door. She didn’t want her family to see us together–not yet.
After I left La Paz to keep on travelling, we stayed in contact. We would text each other at least every other day. She was clearly interested, so was I.
As I sat in this hostel patio in Buenos Aires, I got to know Marco, a Venezuelan man in his 40's, who had recently escaped the horror show that is Maduro’s Venezuela, in search of a better life in Argentina. One night, over many beers and plenty of cigarettes, I layed out my situation to Marco. I told him, I was in disarray– that I didn’t know what to do? Should I give up my original plan of living in South America and learning Spanish, to go home and study? What about the girl? I couldn’t take my mind off of her.
Marco lit a cigarette, leaned forward, and looked me in the eyes. It was at this moment he said exactly what I had been thinking all the previous days. He said ”Son, isn’t it obvious what you have to do? I see you texting this girl everyday. She is interested, and so are you. You said you planned to stay and live in South America. If you are serious about that plan, then get your ass on the next bus back to Bolivia and figure out how you can live there”.
I am God. You are God
It felt as if Marco had been sent to that hostel, all the way from Venezuela, just for me. To tell me what I needed to hear and stear me back on track–towards my stated plan. The plan I had told the universe, or God, when I had left Denmark. Marco was an extension of God, presenting himself in my life for 5 days that April in Buenos Aires. The next day I went to Recreo, the central bus station in Buenos Aires. I ordered a ticket for the next bus to Bolivia. A few days later I arrived back in La Paz, as a surprise to the girl.
For the whole trip, I thought about what to say to her when I saw her again. I told her: “You are going to be my girlfriend” she smiled and said “Lets see about that”.
We have been together ever since. She is now my wife. She is an extension of God in my life, just as I am an extension of God in hers.
Marco is one of many examples of where a person I hadn’t known previously has carried an important lesson for me. Most of the time the lessons are good, sometimes they are hard lessons. What all the lessons have in common is: they are always lessons that have presented themselves to me, through that inexplicable energy between me and the universe at large. Lessons born out of my own stated will to God.
I am God. You are God. We are all God. We all create our own lives.
-
@ 349d6b82:12b2a5b1
2024-12-05 13:57:33Серове, 5 декабря 2044 года, скорбная новость потрясла наше местное сообщество: на 72-м году жизни скончался заслуженный спортсмен и тренер Александр Петрович Сирков. Он оставил глубокий след в мире спорта, воспитав множество чемпионов и привнеся значительный вклад в развитие физической культуры в своем родном городе.
Александр начал свою карьеру как выдающийся легкоатлет, завоевав множество медалей на всероссийских и международных соревнованиях.
После завершения спортивной карьеры он посвятил себя тренерству,__ где его подопечные не раз становились __призерами чемпионатов России и Европы.
Александр также активно участвовал в организации спортивных мероприятий и конкурсов, способствуя популяризации спорта среди молодежи.
Его вклад в спорт был отмечен множеством наград и почетных званий, среди которых звание "Почетный гражданин города Серова". Местные жители помнят его как человека с большим сердцем, который всегда поддерживал молодых спортсменов и вдохновлял их на достижения.
Смерть Александра Петровича стала большой утратой для Серова. Его память будет жить в сердцах тех, кто знал его, а также в успехах его воспитанников. Прощание с ним пройдет в эти выходные, 8 декабря 15:00, в спортивном зале, который носит его имя, что символизирует его неоценимый вклад в развитие спорта в городе.
-
@ 05351746:fcc956c4
2024-12-05 13:31:48I still remember the day back in 2017 when my wife came through the front door at our apartment with a smile on her face mixed in with anxious eyes. She looked at me and simply uttered "I am pregnant!". My first instinct told me she was trying to pull a prank to see what I would do. As I stood there, silent, trying to determine the motive behind her abrupt announcement she uttered the phrase again with such assurance it would have been foolish of me to doubt her. I do not remember what I said or did next but I do remember sharing in her blend of excitement and uncertainty.
\ Today marks the passing of 5 years since the birth of our youngest and that same mix of emotions still resides in my heart. Excitement springs up and creates a smile on my face when I first see it on his and uncertainty creeps in when I doubt my ability as a father. As I look back on these past 5 years of raising my youngest son I can think of many occasions where God has used this mix of emotions to mold my wife and I into better parents. The fear found in the uncertainty of of our own abilities has pushed us to pursue God's wisdom over our own. The joy experienced from watching a little boy grow and discover the world around him has created a grateful heart in us both. I am forever thankful for God giving us him. He has been a true blessing for my wife and I. We did not set out to have him when we did, God in His holy wisdom gave him to us according to His will. 5 Years ago when we got to see his face for the first time, the face that caused my wife and I to experience such a mix of emotions, I would never have been able to conceive of the blessings that were yet to come. I am truly in awe of God's providence and wisdom. My wisdom, if I can even call it such, does not even stand to be seen in comparison. Every time I speak my son's name I am reminded...who is like God?
-
@ 05351746:fcc956c4
2024-12-05 13:31:31The book of Job has been one of my favorite books of the Old Testament. Reading the story of a man who had gone through so much anguish in such a short period of time has always been a source of encouragement and guidance for me. One of my favorite phrases from Job is when he says "shall we accept good from God, and not trouble?” Likewise the teachings of Christ and the modeling of His teachings in the life of Paul and the early church has always guided me when dealing with any hardship. Over the past two months I have had to rely on this more than I have ever before.
As it neared my daughters second birthday in June she had yet to develop a single tooth. With baby teeth showing as early as three months my wife and I knew this was not a normal occurrence. With the help of our pediatrician we meet with a pediatric dentist and had some x-rays taken of my daughter's mouth. The results showed us that she was missing almost all of her baby teeth. Our dentist was taken back by this, it can be common for toddlers to be missing some baby teeth but my daughter was missing the majority of hers. Our dentist met with some of his colleagues to discuss my daughter’s case and they determined that she may have a very rare genetic disorder called Ectodermal Dysplasia.
Ectodermal Dysplasia is a group of disorders that affects structures in the ectoderm during development. Hair, skin, nails, teeth, and more can be effected and in a variety of different ways. There are over 150 different types of ectodermal dysplasia and there are only around 7,000 known cases of this disorder worldwide. We have been referred to a genetic testing facility in order to confirm this diagnosis. We are fairly certain that she does have this disorder as she has shown signs of having other symptoms associated with this disorder; such as an inability to sweat and the one tooth she has coming in appears to be abnormally shaped. We will have to wait till October to have her condition properly diagnosed. What we know for now is that she will not develop a proper set of teeth, with the possibility of not having adult teeth. We are meeting with the dental school at UNC Chapel Hill this coming Tuesday to talk about some options they may have to address this. We are very grateful for this opportunity and excited to see what they have in mind.
If you could, please pray for my daughter. This will be a long road and she will face many challenges as she grows up. I know I will be praying for her to be able to accept this difficulty with a smile, because it is one of the most beautiful smiles I have ever seen.
-
@ 6b0a60cf:b952e7d4
2024-12-05 11:16:09フォロワーリストを低コストで取得する仕様を考える
Nostr リレーはフォロワー数をカウントしたほうが良いを受けて考えたことを雑多に書き留めておきます
単一リレーの場合
NIP-45 COUNT を使う
短所
- 単一リレーで数えた総数でしかない
- 現時点では数を返すのみ
- 複数リレーでマージできるようにidsを一緒に返そうという提案もある
{"#p": <pubkey>, "kinds": [3]} でREQする
短所
- 単一リレーで数えた総数でしかない
- フォロワーの数だけクソデカイベントが返ってくるので時間がかかるしギガが減る
複数リレーの場合
{"#p": <pubkey>, "kinds": [3]} でREQする
長所
- 複数リレーでマージできる
- そこそこもっともらしいフォロワーリストが取れる
短所
- 一度でもフォローをしたことがある人のリストでしかない(後にアンフォローしたかもしれない)
- nostr:nevent1qqs829n0s3qa3wegnhpf6haz3t87hn9huznldd4x2ld6c0d02uq09gsge47l7
- リストすべての公開鍵で接続リレーとkind3を調べ直してアンフォローされている場合を除く処理をすればそこそこ正確になる
- 大変すぎる
- 未調査のリレーにフォロワーがいるかもしれない
新しいkind(フォロワーを格納する)を新設する
仮にkind1003とする
kind3と同じ構造とする{ "kind": 1003, "pubkey": "<Aさんの公開鍵>", "tags": [ ["p", "<Bさんの公開鍵>"], ["p", "<Cさんの公開鍵>"], ["p", "<Dさんの公開鍵>"] ], // other fields... }
で、これ誰が作るの?
リレーが作る
- pubkeyにはAさんの公開鍵を入れることになるけど、署名するにはAさんの秘密鍵が必要だよ?
- 無理
クライアントが作る
- Rabbitやnostter等のクライアントにはプロフィール画面でフォロワーのところをクリックするとフォロワーの取得が始まる
- その際、構築したフォロワーリストをkind1003イベントとしてリレーに送ってしまえば良い
- リレー毎でなく複数リレーのマージした結果であるが、その方が有用だろう
- でもkind1003を作成した時期はアカウント毎にバラバラになってしまうね
誰が嬉しいの?
- クライアントは恩恵を受けない
- 本来kind1003の恩恵を受けるべきクライアント自身がkind1003を作らなくてはならない
- 統計調査に興味がある人が満足する
- そのためだけに各クライアントを使用するユーザーの端末のリソースを使う価値があるかどうか
そもそもリレーである必要があるだろうか
- リレーはシンプルであるべきだが、リレーに高機能を求めること自体は否定されるべきことではない
- NIP-50のように検索に特化したリレーもある
でもこの統計情報ってWebSocketで送られてくるべきものだろうか?HTTPで良くない?
リレーである必要すらなくて、REST APIを提供するサービスがあれば十分だよね?
外部サービスとして独自にデータを集めているサービスは既にあるこれをNIPにする必要があるだろうか
- WebSocketやリレーが登場しないからといってNIPに定義してはいけないなんてことはない
- 例: NIP-96
- しかしNIPというのは仕様を共通化して共有するためのものであり、複数の実装を期待するものである
- 統計API提供サービスなど1つあれば十分で、耐検閲性を目的として10個も100個も存在を期待されるものではない
-
@ 7ecd3fe6:6b52f30d
2024-12-05 10:35:57I went to bed last night at 96k, thinking we'd have another day of sideways consolidation, maybe if we're lucky a bump on the head at 99k before the 100k dumpers come in to "take profits"
But little did I know what was waiting for me when I opened up my crusty eyes, I checked the chart as one days after their morning wee and nearly wet the entire bathroom, 102k, must be a mistake, let's check Coingecko, let's check the local exchanges, let's check social media, and it was confirmed like 6 blocks in baby, there's no going back!
Ladies and gentlemen, grab your laser-eye NFTs and dust off those 2017 memes - we've finally arrived! Bitcoin has transcended the mythical $100,000 price point that HODLers have been hallucinating about since the Obama administration.
We have succesfully meme'd the dream into a reality, can anything stop us now? The Banana zone hath arrived
Why the big break?
Is it unrest in France with the government collapsing, is it South Korean uncertainty with their president declaring Martial law, is it Putin coming out to admit you can't ban Bitcoin?
Is it countries trying to find a hedge against Trumps' proposed tariffs?
Who knows?
To me it's just another day of sellers exhausted and buyers are eating through the order book like hungry-hungry hippos
Bottom of the bear to getting some serious air time
If you've been here for one full cycle, and stayed the course it's been a wild ride, we saw Terra Luna, FTX, Celsius, BlockFi blow up and a massive draining of liquidity from the market.
The dream was dead and we hit rock bottom in November 2022, at 15k, to those who nailed that absolute bottom, I salute you.
Anyhoo, it's been a slow grind upwards, the crab market of choppy consolidation normally is, but you psychos continued to hold steady and deploy capital even when number continue to go down!
The meme, the dream and now the cream
The bitcoin maximalists who've been sporting perpetual laser-eye Twitter and nostr profiles can now collectively exhale.
Those same folks who've been predicting "$100K by EOY" every single year since 2017 can now do a victory lap, wearing their tinfoil-lined Gucci tracksuits.
You were wrong many times, only to be proven right eventually!
Remember when explaining Bitcoin's potential value used to involve complex blockchain narratives and decentralization lectures?
Call up the cry babies
When Bitcoin looked down and out there were no shortage of doom and gloomers writing another failed obituary, Dan Pena, Charlie Munger, Warren Buffer, Peter Schiff and Peter Zeihan all had to yap and we listened and laughed
Let's hear what mama has to say on the subject of Bitcoin?
Keep dreaming. Bitcoin is never going to hit $100,000!
— Peter Schiff (@PeterSchiff) November 8, 2019Now it's just: "Told ya so" - accompanied by shitcoiners and nocoiners are angry coz of dey enlarged medulla oblongata
Times like this, I often think of the wise and eloquent words of MSTR Gigachad Saylor
Put money into Bitcoin and wait for number to go up biggly, if number go down put more money in and wait for number to go up bigglier - Michael Saylor
Setting up base camp for the march up Mount Milli-manjaro
The journey to $1 million feels eerily similar. We'll witness another brain-melting crypto pilgrimage - let's call it Mount Milli-manjaro - where every Reddit thread and Twitter space will sound like a combination of economic prophecy and sci-fi fever dream.
Pro tip for newcomers: Pack extra copium, a sense of humor, and maybe some popcorn.
This ride is just getting started.
To the moon? 🚀🤡₿ Looks likely bar a massive black swan, 2025, looks like this thing is going to run with big Usain Bolt strides as we enjoy a year of price discovery, speculation and all the scams that will fester as retail comes piling in to make their overnight fortunes.
I know it's fun to hand out I told you so's and you should enjoy it, take the victory lap but even that gets old, while it's hard to do, try to stay humble and enjoy stack the perpetual top!
-
@ dfc7c785:4c3c6174
2024-12-05 10:29:37Just testing that I can post a note from Obsidian because this is absolutely flipping amazing!
-
@ 148755e6:450c107f
2024-12-05 10:09:32突然荒野に行きたくなったので行ってきたエントリーです
まずは練習。高尾山へ
Nostrは古今東西ありとあらゆるオフ会が生えており、
まるで荒野に行きたいという私の意志を完全に汲み取ったかのように「紅葉を見にいこうようオフ」がそこに生えていたので参加した。(しおんさんご主催ありがとうございました)
前半1時間くらいの坂道がマジきつかったです。前半キツすぎて後半足痛かった。。 終始人がいっぱいいて渋谷かと思った。
確かに道がかなり整備されていて、逆にコンクリート故に足が疲れたのかもしれない。隣の人は途中の急な坂道で足を滑らせてて、横で転倒事故が起きるかと思いました。
山頂に行っても人がたくさんいて、迷子になりかけた。あそこはスクランブル交差点や。 そして山頂の先にあるもみじ台まで歩くと人がまばらで、まったりして蕎麦食べたりしながら休憩して下山。
登りは暑くて汗かきましたが、山頂でまったりしてると汗も引いてきて少し冷えました。
下山はスイスイ。16時近くで結構暗かったので、冬の間は早めの登頂・下山がおすすめですね。
登り2時間・下り1時間半で概ね見込み通りって感じでした。
高尾山は登ってると景色が変わります。ちょっと開けた場所に出て下の街が見えたり、草木があったり、階段があったり、参道があったり。。そういう意味では退屈しない2時間でした。
ビギナー山とはいえ、革靴やヒールのある靴で登ってる人がいてびっくり。ツルッと滑ることあると思いますので、スニーカーで登ることをお勧めします。
舐めプしてたとはいえめちゃくちゃキツかったおもひで。
更なる練習。小浅間山へ
さて私は荒野に行きたいワケなのですが、高尾山に荒野はありませんでした。更なる練習として小浅間山へ。
前日(か前々日)に雪が降ったようで、山に雪が残っておりました。
それでも都内の汚れてべちゃっとした感じの雪ではなく、粉砂糖がちょっと積もってるみたいな感じで綺麗だった。
登り前半の30分くらい、景色や道が変わらず、ずっと歩きっぱなしになってしまいました。時間みて休憩しながら行けばよかったなあ。
登るにつれて気温が下がっていくのか、積雪が厚くなっていく。
40分くらいは割と平坦な道が続きますが、突然山頂っぽいものが現れて、「これを登れっていうのかい...?」とビビるほどピーンと急な道が出てきました。(写真だと分かりづらいですね)
ただ、高尾山のコンクリート道に比べると足の疲れはそこまででした。雪道なので気をつけて歩くという意味では疲れましたが、春〜秋とかは快適に登れるんじゃないでしょうか。
山頂に到着するとドーンと浅間山が見えて圧巻。
風が強くて飛ばされる恐怖はありましたが、なんとか無事でいられました。あったかいお茶美味しかった〜。
なぜかギャルの看板があって、謎でした。写真はひとまずありません。
山頂が2箇所あって、それぞれで眺めを満喫していたら結構時間が経ってました。
小さい背丈くらいの木や足元にちょっとした植物があったり、自分的にはかなり理想の荒野に近かったです。(植物に対する解像度が低すぎる) 往復で2時間程度の山らしいんですが、なんやかんやと2時間半強くらいいた気がします。
荒野ビギナーは小浅間山に往け
というわけで、荒野に行きたい人はまずは小浅間山を登ると良いと思います。 また登りたい。
荒野部部長
一緒に高尾山・小浅間山に登ってくれた方、ありがとうございました! 個人的には来年の春までに秩父多摩甲斐国立公園に行き、来年の秋までに大山隠岐国立公園に行くという目標を立ててるんですが、 少々時間が空くので次どこに行こうかしらと考えているところです。
ヒントとしては、火山で、あまり高低差のないところだとビギナーの私にちょうど良さそうです。
とある情報筋によると伊豆大島が良さそうなので、次の機会に行けたらと思っています。
みんなで荒野に行こう!
-
@ a012dc82:6458a70d
2024-12-05 09:33:12Table Of Content
-
Debt as an Investment Tool: A Controversial Perspective
-
Leveraging Bitcoin for Debt: The Concept of "DeFi Loans"
-
The Role of Institutional Borrowing in Bitcoin Market Liquidity
-
Debt-Fueled Bitcoin Mining Operations: A Risky Bet
-
Debunking Debt-Backed Stablecoins: Are They Truly Stable?
-
The Paradox of Bitcoin Borrowing and Financial Freedom
-
Leveraging Debt to Accelerate Bitcoin Adoption in Developing Economies
-
Can Debt-Financed Bitcoin Purchases Fuel Bubbles?
-
Debt as an Incentive for Innovation: The Role of Bitcoin Loans
-
The Fear of Debt-Induced Market Manipulation
-
Conclusion
-
FAQ
Cryptocurrencies have revolutionized the financial landscape, and Bitcoin, being the first and most popular among them, has been a hot topic of discussion. As Bitcoin's popularity soars, so does the interest in its potential benefits and drawbacks. One intriguing question that arises is whether debt can play a positive role in the Bitcoin ecosystem. In this in-depth analysis, we will delve into surprising facts surrounding this very topic, evaluating the possibilities and implications. Brace yourself for an eye-opening journey into the world of Bitcoin and debt!
Debt as an Investment Tool: A Controversial Perspective
Many investors are eager to get their hands on Bitcoin, given its incredible price appreciation over the years. However, not everyone can afford to purchase large quantities of Bitcoin outright. This is where debt comes into play as a potential investment tool. By taking out a loan and investing in Bitcoin, investors believe they can ride the wave of the cryptocurrency's upward trajectory and generate substantial returns. While this approach has yielded impressive results for some, it also carries significant risks, such as the potential for increased debt burden in case of market downturns.
Leveraging Bitcoin for Debt: The Concept of "DeFi Loans"
With the rise of decentralized finance (DeFi) platforms, borrowers can now utilize their Bitcoin holdings as collateral to secure loans. These loans, commonly referred to as "DeFi loans," enable borrowers to access liquidity without selling their Bitcoin holdings. This concept has garnered attention and support from the crypto community, as it allows individuals to maintain their exposure to Bitcoin while meeting their financial needs. However, borrowers must remain cautious as these loans come with interest rates and the risk of liquidation if the collateral's value drops significantly.
The Role of Institutional Borrowing in Bitcoin Market Liquidity
Institutional players are increasingly entering the Bitcoin market, and many of them are exploring avenues to leverage their Bitcoin holdings. Institutional borrowing has emerged as a means for these entities to access capital while maintaining their exposure to Bitcoin. This trend has implications for market liquidity, as it injects more capital into the ecosystem, potentially stabilizing prices and promoting adoption. However, an excessive reliance on debt by institutions can also create vulnerabilities, leaving the market susceptible to sudden shocks.
Debt-Fueled Bitcoin Mining Operations: A Risky Bet
Bitcoin mining requires substantial computational power, which translates into significant expenses. Some miners resort to taking on debt to fund their operations and expand their mining capacities. While this strategy can yield profits during bullish market conditions, it also exposes miners to heightened risks during market downturns. In such scenarios, miners might find it challenging to service their debts and remain profitable, potentially leading to bankruptcies and a drop in the network's overall hashrate.
Debunking Debt-Backed Stablecoins: Are They Truly Stable?
Stablecoins, pegged to the value of traditional fiat currencies, are often used to provide stability in the crypto market. Some stablecoins are backed by a mix of fiat and cryptocurrencies, including Bitcoin. While these debt-backed stablecoins aim to offer stability, their reliance on underlying debt raises concerns about their resilience during economic crises. The recent development of regulatory scrutiny over stablecoins adds another layer of complexity to this matter.
The Paradox of Bitcoin Borrowing and Financial Freedom
Bitcoin's ethos of financial sovereignty often clashes with the idea of borrowing. The very essence of Bitcoin lies in providing users with full control over their funds, free from the influence of central authorities. When individuals borrow Bitcoin, they must relinquish some level of control over the borrowed assets, potentially undermining the principle of financial freedom. Striking a balance between leveraging Bitcoin and preserving its core principles remains an ongoing debate within the crypto community.
Leveraging Debt to Accelerate Bitcoin Adoption in Developing Economies
In developing economies, access to traditional financial services can be limited, hindering the adoption of Bitcoin and other cryptocurrencies. By leveraging debt in innovative ways, such as microloans denominated in Bitcoin, it is possible to accelerate the adoption of digital currencies in these regions. This approach can empower individuals with access to global financial markets and foster financial inclusion, revolutionizing the way money flows across borders.
Can Debt-Financed Bitcoin Purchases Fuel Bubbles?
As Bitcoin's price rallies, there is a growing concern that debt-financed purchases might contribute to speculative bubbles. In the past, excessive borrowing to invest in Bitcoin has coincided with price surges and subsequent crashes. Such situations raise questions about the sustainability of Bitcoin's growth and the potential consequences of debt-driven investment strategies.
Debt as an Incentive for Innovation: The Role of Bitcoin Loans
Bitcoin lending platforms have emerged as a way to connect lenders and borrowers within the crypto ecosystem. These platforms facilitate Bitcoin loans for various purposes, ranging from personal finance to business expansion. By offering competitive interest rates, these platforms encourage the circulation of Bitcoin, potentially driving innovation and ecosystem growth.
The Fear of Debt-Induced Market Manipulation
As more institutional players enter the Bitcoin market, concerns about potential market manipulation through debt-financed trading have surfaced. High-leverage trades can amplify price movements, leading to increased volatility and, in extreme cases, market manipulation. Regulators and market participants must remain vigilant to address any undue influence on the market due to excessive debt leveraging.
Conclusion
The question of whether debt can be good for Bitcoin is multifaceted and requires careful consideration. Debt can serve as an investment tool, a means for accessing liquidity, and a driver of innovation. However, it also presents risks, including market manipulation, instability, and potential bubbles. As the crypto space continues to evolve, finding a balanced approach that maximizes the benefits of debt while mitigating its risks remains an ongoing challenge. As investors and users, it is essential to stay informed, exercise prudence, and make informed decisions based on a deep understanding of the dynamic relationship between debt and Bitcoin.
FAQ
Can borrowing Bitcoin be safer than buying it outright? While borrowing Bitcoin may offer potential benefits in terms of capital utilization and risk management, it is not necessarily safer than buying it outright. Borrowing introduces the risk of debt burden, especially during market downturns.
Are decentralized finance (DeFi) loans trustworthy? DeFi loans can be a valuable tool for accessing liquidity without selling your Bitcoin holdings. However, they come with inherent risks, including the possibility of liquidation if the value of your collateral drops significantly.
How can Bitcoin mining operations benefit from debt? Bitcoin mining operations often require a significant upfront investment in hardware and operational costs. Debt can help miners fund their expansion and take advantage of profitable mining opportunities.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 472f440f:5669301e
2024-12-05 08:09:23The end of the first part of bitcoin's story has come to an end. Most of the story has yet to be written, but I feel confident in saying that reaching the $100,000 per bitcoin milestone is a clear demarcation between two distinct eras of bitcoin. Yes, we have hit the significant milestones of $1, $10, $100, $1,000, and $10,000 over the last fifteen years and they all felt significant. And they certainly were in their own right. However, hitting the "six figure" milestone feels a bit different.
One bitcoin is currently worth a respectable salary for an American citizen. Ten hunnid bands. Something that is impressive to the layman. This may not mean much to many who have been around bitcoin for some time. The idea of bitcoin hitting $100,000 was seen as a foregone conclusion for millions of people out there. Myself included. This price marker is simply an inevitability on the road to global reserve currency to us.
With that being said, it is important to put yourself in the shoes of those who have doubted bitcoin up to this point. For some reason or another, $100,000 bitcoin has been used as a price target that "will never be hit" for many of the naysayers.
"Bitcoin is a Ponzi scheme."
"Tulips."
"Governments will ban it if it hits that point."
"It can't scale."
"It will be 51% attacked."
"No one will trust bitcoin."
"It can't be the world's money."
And yet, despite all of the kvetching from the haters over the years, here we are. Sitting above $100,000. Taking a short rest at the latest checkpoint en route to the peak of the mountain. We hovered right under $100,000 for a couple of weeks. Nominally, where we stand today is much closer to where we were last week compared to where we were six months ago. But for some reason the price tipping over $100,000 has catapulted bitcoin to a new playing field. Where bitcoin stood yesterday and where it found itself six months ago seem miles below where it is today. Crossing over the event horizon of six figures forces people to think of bitcoin in a different light. Almost as if we have entered another dimension.
The last year has been filled with a lead up to this crossing over of the event horizon.
Financial institutions that have derided bitcoin for well over a decade were forced to bend the knee and offer bitcoin exposure to their clients. The mere offering of that exposure has resulted in the most successful ETFs in the history of this particular investment vehicle.
Governments around the world have been forced to reckon with the fact that bitcoin is here to stay and that they need to act accordingly. Thanks to the first mover actions taken by El Salvador and Bhutan, which have nonchalantly decided to go all in on bitcoin, others have taken notice. Will that be publicly acknowledged by the bigger governments? Probably not. But you'd be naive to think that politicians in the US seeing two very small countries making such big bets on bitcoin didn't induce at least a little bit of FOMO. Once the bitcoin FOMO seed is planted it's hard to uproot.
Combine this with the fact that it has become rather cool to be privy to the fact that the world's governments have become egregiously addicted to debt and money printing, that inflation is pervasive and inescapable, and that censorship and Orwellian control tactics are on the rise and it is easy to see why more people are more receptive to the idea of bitcoin.
All that was needed to create an all out frenzy - a slingshot effect up the S Curve of adoption - was a psychological trigger. Bitcoin crossing over six figures.
Well, here we are. The tropes against bitcoin that have been trotted out over the last sixteen years no longer have as much bite as they did in many people's eyes. Sure, there will be some butt hurt nocoiners and totalitarians who continue to trot them out, but crossing the chasm of six figure bitcoin will have an order of magnitude more people thinking, "I hear what you're saying, but reality seems to be saying something completely different. And, if I'm being honest with myself, reality is making much more sense than your screeching."
Unstoppable peer-to-peer digital cash with a hard capped supply has been around since January 3rd, 2009. December 5th, 2024 will be the day that it cemented itself as something that cannot be ignored. Part I of the bitcoin story has been written. The end of the beginning is behind us. On to Part II: the rapid monetization of bitcoin, which will cement it as the reserve currency of the world.
Final thought... I used some 2017-2020 era tactics to get into the writing mood tonight. 90210
-
@ 2063cd79:57bd1320
2024-12-05 07:38:21Gerade für Anfänger//innen ist es oft nicht leicht die in der Bitcoin Welt verwendeten Benennungen und Stückelungen zu durchsteigen. Was unterscheidet Bitcoin von bitcoins, wie viele Sats sind ein Bitcoin und was zur Hölle sind UTXOs? Und vielmehr noch, warum sollte mich das interessieren? Ganz einfach: Wer UTXOs vernünftig verwaltet, spart sich nicht nur potentiell zukünftigen Ärger, sondern kann sogar bares Geld sparen. Da die meisten Menschen mit finanzieller Vorbildung gewohnt sind in Konten oder Guthaben zu denken, bedarf es beim Verständnis von UTXOs sicherlich ein wenig Unterstützung. Also wollen wir uns dem Thema Schritt für Schritt annehmen.
Einstieg
Viele Neulinge haben die Vorstellung, dass ein bitcoin gleich einem bitcoin ist. Sie nehmen fälschlicherweise an, dass ein bitcoin immer als Ganzes existiert. Für viele ist der Moment, in dem sie erkennen, dass ein bitcoin aus 100.000.000 Satoshis besteht, der erste große Aha!-Moment. Die Erkenntnis, dass man nicht einen ganzen bitcoin kaufen muss, sondern kleine Einheiten erwerben kann, eröffnet vielen einen ganz anderen Blick auf Bitcoin. Bekannte Sprüche, wie "ich bin zu spät dran" oder "ich kann mir keinen bitcoin leisten" hat jeder schon mal gehört und wenn man dann erklärt, dass man kleine Mengen für Cent-Beträge erwerben und versenden / erhalten kann, ändert dies die Grundhaltung zu Bitcoin von Grund auf.
Der nächste Schritt bei der Erkenntnisreise von Bitcoin ist das Verständnis über UTXOs (Unspent Transaction Output).
💡Ein UTXO ist das Stück Information jeder Bitcoin-Transaktion, das an eine neue Adresse ausgegeben wird, die als Eingabe für zukünftige Transaktionen verwendet werden kann.
Der einfachste Weg, UTXOs zu erklären, ist eine einfache Analogie zu Geld im Portemonnaie. Man stelle sich dazu die Bitcoin-Wallet als ganz normale Geldbörse im normalen Leben vor. Verschiedene Szenarien:
- Man hat im Portemonnaie 10€ in Form eines 10€-Scheins. Man möchte am Kiosk ein Bier für 2€ kaufen. Also bezahlt man mit dem Schein und bekommt vom Verkäufer 8€ zurück.
Was ist passiert? Es gibt einen Transaktions-Output: 10€-Schein aus dem Portemonnaie. Und es gibt zwei Transaktions-Inputs: 2€ in die Kasse des Kiosks und 8€ zurück in das Portemonnaie. Das sieht dann so aus:
- Man hat im Portemonnaie 10€ in Form von 10 1€-Münzen. Man möchte am Kiosk ein Bier für 2€ kaufen. Also bezahlt man mit zwei 1€-Münzen und bekommt nichts vom Verkäufer zurück. Man hat ja passend gezahlt.
Was ist passiert? Es werden zwei Transaktions-Outputs zusammengefasst: Zwei 1€-Münzen aus dem Portemonnaie. Und es gibt einen Transaktions-Input: 2€ in die Kasse des Kiosks (ein weiterer Input über 0€ zurück in das Portemonnaie ist nicht nötig). Das sieht dann so aus:
Es gibt natürlich auch ein Szenario, in dem beide Fälle verknüpft sind.
- Man hat im Portemonnaie 10€ in Form von zwei 5€-Scheinen. Man möchte am Kiosk drei Bier für 6€ kaufen. Also bezahlt man mit zwei 5€-Scheinen und bekommt vom Verkäufer 4€ zurück.
Was ist passiert? Es gibt zwei Transaktions-Outputs: Zwei 5€-Scheine aus dem Portemonnaie. Und es gibt zwei Transaktions-Inputs: 6€ in die Kasse des Kiosks, und 4€ zurück in das Portemonnaie. Das sieht dann so aus:
Mit Hilfe dieser drei Szenarien haben wir die beiden Grundideen verbildlicht: Um einen gewissen Betrag zu bezahlen, können UTXOs (die jeweiligen Münzen oder Scheine im Portemonnaie) auseinandergebrochen oder zusammengefasst werden.
Eine weitere Grundidee besteht darin, dass ein UTXO IMMER zerstört wird. Das lässt sich mit dem folgenden Szenario verbildlichen:
- Man hat im Portemonnaie 10€ in Form eines 10€-Scheins. Man möchte am Kiosk 5 Bier für 10€ kaufen. Also bezahlt man mit dem Schein und bekommt nichts vom Verkäufer zurück.
Was ist passiert? Es gibt einen Transaktions-Output: 10€-Schein aus dem Portemonnaie. Und es gibt einen Transaktions-Input: 10€ in die Kasse des Kiosks. Allerdings hat der Kioskbesitzer den 10€-Schein zerrissen und hat einen ganz neuen 10€-Schein bekommen, den er in die Kasse legt. Dem Besitzer ist egal, ob der Schein derselbe ist, wie der, den ich ihm gegeben habe, denn der Schein in seiner Kasse ist vom Wert identisch.
Als nächstes muss man verstehen, dass Transaktionen in der Blockchain historisch miteinander verknüpft sind. Diese Verknüpfung entsteht dadurch, dass die Outputs einer Transaktion immer die Inputs der nächsten Transaktion darstellen. In unserem Beispiel bedeutet das, dass es jemanden gibt, der eine Liste darüber führt, welche Münzen und Scheine aus einem Portemonnaie ausgegeben wurden und welche nicht. Auf dieser Liste steht aber auch, welche Münzen und Scheine in die Kasse des Kioskbesitzers gewandert sind und von dort wieder herausgegeben wurden. Diese Liste wird also immer länger, denn die Scheine und Münzen werden als Wechselgeld mehrere Male am Tag an verschiedene Kunden ausgegeben und auch deren Portemonnaies werden auf dieser Liste akribisch festgehalten. Diese Liste ist die Blockchain.
Jetzt haben wir also verstanden, dass Bitcoin kein System von Konten und Guthaben ist, sondern vielmehr die Sammlung und Übersicht von UTXOs und deren Besitzer. Die Aufgabe einer Wallet besteht also unter anderem darin, ein Bitcoin-Guthaben abzubilden, das aus vielen verschiedenen UTXOs besteht.
💡Zusammenfassung: Um eine Bitcoin-Transaktion auszugeben, wird entweder ein ganzer UTXO gesendet, für den es möglicherweise Wechselgeld gibt, oder es werden mehrere UTXOs zusammengefasst, um einen Betrag zu kombinieren.
Transaktionsgebühren
Mit diesem Wissen können wir jetzt eine weitere Komplexität hinzufügen. In unseren Szenarien gab es nur zwei Teilnehmer jeder Transaktion: Sender und Empfänger der Zahlung, also Biertrinker und Kioskbesitzer. Im Bitcoin-Netzwerk gibt es allerdings noch einen dritten Teilnehmer, der an jeder Transaktion interessiert ist. Die Miner. Denn Miner sind dafür verantwortlich, dass die Transaktionen in die Blockchain geschrieben werden und dafür erhalten sie eine kleine Transaktionsgebühr. Dies bedeutet, dass ein weiterer UTXO erstellt wird, der diese Gebühren enthält. Technisch gesehen ist diese Zahlung impliziert, dass heißt der (die) UTXO(s) auf der Senderseite sinf größer, als der UTXO auf der Empfängerseite. Das Delta erhält der Miner.
Die Höhe der Gebühr variiert von Transaktion zu Transaktion und kann sogar vom Sender eingestellt werden, indem das Delta größer oder kleiner eingestellt wird. Ein weiterer Punkt ist, dass der Gebrauch von vielen UTXOs auch zu höheren Gebühren führt, da die Gebühren anhand der Größe der Transaktion (Dateigröße) und nicht anhand der Geldmenge (in Bitcoin, US Dollar oder Euro dargestellt) berechnet werden. Eine 0,001 Bitcoin Zahlung kann dementsprechend höhere Gebühren beinhalten, als eine 100 Bitcoin Zahlung, wenn die 0,001 Bitcoin Zahlung aus vielen kleinen UTXOs besteht. Dies bedeutet aber nicht, dass ein Anteil jedes verwendeten UTXOs in separate UTXOs für den Miner aufgebrochen wird, der Miner erhält einen UTXO in Höhe der Gesamtmenge der Gebühren.
Um es einfach zu veranschaulichen, nehmen wir eine Gebühr von 1% an. Bildlich dargestellt ist dies einfacher zu verstehen:
Wie wir sehen können, hätten zwei UTXOs (5€ und 1€) gereicht, um die Zahlung von 6€ an den Kiosk zu tätigen, allerdings musste noch ein weiterer UTXO von der Wallet hinzugezogen werden, um auch die GEbühr zu zahlen. Der Rest geht als Wechselgeld an den Sender zurück.
Das Thema Gebühren ist nicht ganz trivial, denn die Höhe der Transaktionsgebühren hängt nicht nur davon ab, wie viele Bytes eine Transaktion hat (also aus wie vielen verschiedenen UTXOs sie zusammengestellt wurde), sondern auch vom aktuellen Status der Auslastung des Netzwerks und vom aktuellen Kurs. Die Gebühren werden in sats/B oder sats/vB (Satoshis pro (virtual) Byte) berechnet, also wie viele Sats man pro Byte entrichten muss. Da Sats Kursschwankungen unterliegen, sind Transaktionen im Allgemeinen teurer, wenn der Kurs hoch ist.
Wie an der Grafik deutlich zu sehen ist, sind Transaktionsgebühren in den letzten anderthalb Jahren relativ stabil und relativ niedrig gewesen, allerdings sieht man auch, dass es auch Zeiten gab, in denen die Gebühren deutlich gestiegen sind und sehr wechselhaft waren.
Ein weiterer Faktor beim Bestimmen der Gebühren ist der/die Nutzer//in selbst, denn Gebühren lassen sich individuell einstellen. Die meisten (mobilen) Wallets übernehmen diese Aufgabe für den/die Nutzer//in, indem mit Hilfe eines Algorithmus die optimale Höhe der angebotenen Gebühren berechnet wird. Wiederum andere Wallets erlauben dem/der Nutzer//in die Gebühren von Transaktion zu Transaktion frei zu bestimmen.
Welchen Nutzen haben hohe gegenüber niedrigen Gebühren? Bitcoin-Miner handeln nicht ganz uneigennützig, denn sie werden für ihre Arbeit entlohnt. Für jeden produzierten Block erhalten sie neben dem Blockanteil (Reward) auch sämtliche Transaktionsgebühren, der im neuen Block enthaltenen Transaktionen. Ohne zu sehr ins Detail zu gehen, bedeutet dies, dass Miner einen Anreiz haben, Transaktionen mit möglichst hohen Gebühren zuerst in den neuen Block zu schreiben, um so ihren Profit zu maximieren. Je höher eine Gebühr relativ zu denen der anderen Transaktionen im Mempool ist, desto wahrscheinlicher ist, dass diese Transaktion im nächsten Block landet. Das bietet dem/der Nutzer//in die Möglichkeit, die eigene Transaktion zu priorisieren.
Weitere Faktoren, die Einfluss auf die Höhe der Gebühren nehmen können (z.B. Adressformate), unterschlagen wir an dieser Stelle und widmen uns wieder dem eigentlichen Thema.
Wir haben also gesehen, dass das Bitcoin Netzwerk im Endeffekt eine riesige Sammlung von UTXOs ist. Man könnte auch sagen, dass UTXOs bitcoins sind und das Netzwerk nur den wechselnden Besitzanspruch jedes/jeder Besitzer//in verwaltet. In der Regel helfen uns Wallets dabei, dieses komplexe Netzwerk möglichst benutzerfreundlich darzustellen, denn alles was der/die Durchschnittsnutzer//in braucht, ist eine Übersicht über die Menge Bitcoin, die er/sie besitzt und eine Möglichkeit Bitcoin zu senden und zu empfangen. Wenn man aber etwas tiefer in die Materie steigt und/oder sogar anfängt, größere Mengen (und ich meine nicht große Summen) an Bitcoin zu empfangen, dann ist es sinnvoll, sich mit UTXO Management zu beschäftigen. Dies ist besonders häufig der Fall bei Firmen oder Personen, die Zahlungen in Bitcoin akzeptieren, Value-4-Value Content produzieren, oder in sonstiger Form viele Transaktionseingänge mit Bitcoin haben.
UTXO Management
Das Verwalten der eigenen UTXOs besteht im Prinzip darin, diese zu labeln / markieren und zu konsolidieren. Einige Wallets bieten diese Funktionen an und erlauben z.B. jeden einzelnen UTXO anzuzeigen und ein Label zu vergeben.
Dieses Taggen oder Labeln von einzelnen UTXOs wird auch Coin Control genannt, und ist dann besonders hilfreich, wenn man einzelne Eingänge in bestimmte UTXOs für Zahlungen und andere UTXOs für das Sparen aufteilen möchte. Dies könnte Gründe der Privatsphäre, aber auch einfach buchhalterische Hintergründe haben.
Mit unserem Vorwissen wissen wir jetzt, dass man problemlos alle UTXOs einer Wallet konsolidieren kann, indem man diese einfach in einer Transaktion in Höhe des gesamten Guthabens an eine eigene Adresse sendet. Dies hat zur Folge, dass alle UTXOs zu einem einzelnen UTXO (zzgl. eines UTXOs für Gebühren) gruppiert werden.
Dies sieht dann auf der Blockchain folgendermaßen aus:
Der Vorteil vom UTXO Management ist zum einen, dass man durch das Konsolidieren kleinerer Beträge zukünftig Transaktionsgebühren sparen kann - dies ist natürlich nur richtig, wenn man nicht genauso viele Konsolidierungen vornimmt, wie man Zahlungen ausführen würde. Auch ermöglicht aktives Management Konsolidierungen in Zeiten vorzunehmen, wenn Netzwerkgebühren niedrig sind, um zu vermeiden, dass man während einer Zeit, in der das Netzwerk überlastet ist, mehr bezahlt. Außerdem kann UTXO Management (und dazu gehören auch CoinJoins ⬇️) die Privatsphäre erhöhen, da die in einer Transaktion benutzten UTXOs Informationen über das Gesamtguthaben oder den Transaktionsverlauf preisgeben könnten.
https://www.genexyz.org/post/23-block-772315-bitcoin-mixing-q6i7y4/
Mit dem anhaltenden Wachstum des Netzwerks steigt natürlich auch die Anzahl der existierenden UTXOs, denn auch wenn Inputs zerstört werden, kommt es natürlich häufiger vor, dass größere UTXOs in kleinere aufgebrochen werden, als dass kleine UTXOs zu größeren Transaktionen zusammengefasst werden. Es gibt natürlich auch Zyklen, in denen die Gesamtmenge leicht zurück geht. Dies geht meist mit einem Rückgang des Kurses einher und ist auf UTXO Management zurückzuführen, bei dem große Operationen, wie Miner und Exchanges, ihre UTXOs bündeln und vom niedrigen Preis profitieren wollen.
Sidenote: Jede//r, der/ die schonmal eine "kleinere" Transaktion gesendet hat, "um zu testen, ob das auch alles funktioniert mit diesem Netzwerk", um dann anschließend einen größeren Betrag zu versenden, wird jetzt festgestellt haben, dass in beiden Fällen, sehr wahrscheinlich ein UTXO mit dem Gesamtbetrag ins Netzwerk gesendet wurde 😄
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ 97fc03df:8bf891df
2024-12-05 06:32:29— How Adaptive Mechanical Consensus is Reshaping the Trust Mechanism in the Information Age
Gavin, BeeGee (Core Builders of Super Bitcoin & BEVM) December 4, 2024
From Cybernetics to the Trust Crisis in the Information Age
The advent of the AI era has brought unprecedented opportunities and challenges. The explosion of information has confronted humanity with the daunting task of processing and trusting vast amounts of data. Traditional trust mechanisms, such as centralized institutions and social consensus, are increasingly inadequate in addressing the complexities of our evolving landscape. AI algorithms, centered around large language models, are iterating at an unstoppable pace, and various AI derivatives are inevitably permeating every aspect of human life. However, behind this rapid development, are we truly prepared to handle the ensuing trust crisis?
As far back as science fiction writer Isaac Asimov, in I, Robot, foresaw that central control systems might surpass the 'Three Laws of Robotics” and pose a threat to humanity. As near as the insightful scholar, Yuval Noah Harari, raised similar concerns, questioning, “Can we trust computer algorithms to make wise decisions and create a better world?” These apprehensions reflect a growing distrust in centralized authority and algorithmic decision-making. In this context, the importance of decentralized trust becomes paramount. The pressing question is: How can we establish reliable systems without a central authority?
To address this issue, we need to draw upon new theoretical frameworks, and cybernetics precisely offers the crucial insights required.
Cybernetics and the Theoretical Foundation of Bitcoin
Norbert Wiener, the father of cybernetics, delved into the control and communication of systems in his seminal work Cybernetics, emphasizing the critical role of feedback mechanisms in maintaining system stability. His core ideas—self-organizing systems, nonlinear dynamics, and the exploration of life's essence—provide a robust theoretical foundation for understanding Bitcoin's success.
Norbert Wiener
Bitcoin's adaptive mechanical consensus is a practical embodiment of Wiener's cybernetic principles, showcasing the capabilities of self-regulation and self-organization within a system. Through Proof of Work (PoW) and dynamic difficulty adjustments, the Bitcoin network achieves a high degree of decentralized control, ensuring the system's security and stability. This mechanism not only aligns with information theory's principles regarding data transmission and trust establishment but also offers a novel solution to the trust crisis in the information age.
The Essence of Blockchain: Decentralized Control, NOT Computational Power
Currently, many blockchain projects overly emphasize computational metrics like Transactions Per Second (TPS), attempting to capture market share by enhancing performance. However, this pursuit of computational power overlooks the core value of blockchain technology. The true revolutionary aspect of blockchain lies in its realization of Decentralized Control. Through adaptive mechanical consensus, it addresses trust and collaboration issues that traditional centralized systems cannot effectively manage.
For instance, Bitcoin's success does not stem from its computational prowess. In fact, the Bitcoin network's transaction processing capacity is relatively limited. Its core value lies in achieving a trust mechanism without the need for centralized institutions through decentralized control. This mechanism enables participants within the network to conduct secure transactions and collaborations without requiring mutual trust. The establishment of this trust relies on rigorous cryptographic algorithms and consensus protocols rather than the enhancement of computational speed.
In contrast, some blockchain projects that emphasize high TPS may have performance advantages but lack robust decentralized control, making it difficult to establish a stable foundation of trust. This is akin to constructing a skyscraper without a solid foundation—it may appear impressive but is ultimately unsustainable.
Bitcoin's Adaptive Mechanical Consensus: The Lifeblood of the Digital World
Bitcoin's adaptive mechanical consensus functions as the "Mechanical Heart" of the digital realm, endowing the network with capabilities of self-regulation, self-organization, and self-evolution. Miners, motivated by Bitcoin rewards, invest substantial computational power to participate in the Proof of Work competition. This mechanism not only secures the network but also creates a self-reinforcing cycle: increased miner participation leads to higher total network hash rate, elevated mining difficulty, further strengthened consensus mechanisms, and consequently, an increase in Bitcoin's value, attracting even more miners.
This virtuous cycle exemplifies the characteristics of a self-organizing system. The network's stability and security do not depend on any centralized entity but are achieved through the collective competition and collaboration of participants. Bitcoin's consensus mechanism not only resolves the Byzantine Generals Problem in distributed systems but also demonstrates the complexity and emergent behaviors inherent in nonlinear systems.
Mathematician Alan Turing believed that thought ultimately arises from mechanical processes in the brain. In contrast, logician Kurt Gödel argued that reducing thought to mere mechanical processes was a misunderstanding. He believed human thought possesses depths and complexities beyond the reach of machines, especially in aspects like intuition, insight, and consciousness.
Alan Turing
Kurt Gödel
However, Satoshi Nakamoto's Bitcoin offers a new perspective on this debate. By implementing adaptive mechanical consensus, it demonstrates that machines can possess abilities akin to human thought. This "Mechanical Heart" allows the Bitcoin network to self-regulate and evolve, exhibiting characteristics similar to living organisms. While Bitcoin's "thinking" ability is limited to expressing BTC transfers and UTXO state changes, it represents an initial manifestation of machine cognition.
If we further contemplate designing a universal "Mechanical Heart" (adaptive mechanical consensus), we could potentially construct mechanical adaptive control systems capable of expressing a multitude of concepts. This would have profound implications for the development of artificial intelligence, possibly propelling it forward in ways Gödel and Turing envisioned.
In both biological and mechanical systems, functions can be divided into three parts: sensors for communication, the brain for computation, and the heart for thought (control). In the Bitcoin network, the "heart" is its adaptive mechanical consensus. This is a breakthrough that neither Turing nor Gödel anticipated. Perhaps, had they witnessed the emergence of Bitcoin, they would be exhilarated by its implications for the advancement of artificial intelligence.
The Satoshi Paradigm: The Inception of Mechanical Consensus and a New Technological Model
The birth of Bitcoin marks the emergence of an entirely new technological paradigm—the Satoshi Paradigm. In addressing the distributed trust problem, Satoshi Nakamoto created Bitcoin, a system based on adaptive mechanical consensus. He did not merely aim to create a digital currency but sought to establish a trust system that operates without centralized control. The Electronic Cash System was merely one experimental application of his broader vision.
This paradigm embodies the three core principles of Wiener's cybernetics: self-organizing systems, nonlinear dynamics, and the exploration of life's essence. The Bitcoin network, with its "Mechanical Heart," possesses the abilities of self-regulation, self-organization, and self-evolution. The self-organizing aspect is evident in the autonomous participation and collaboration of network nodes. Nonlinear dynamics are reflected in the network's complex and dynamic behaviors. The exploration of life's essence is manifested in the system's capacity for self-maintenance and evolution.
Drawing on Cross-Disciplinary Thought: The Resonance of Cybernetics, Information Theory, and Blockchain
Cybernetics and information theory provide crucial theoretical support for understanding Bitcoin and blockchain technology. Claude Shannon's A Mathematical Theory of Communication lays the groundwork for comprehending information transmission, signal processing, and the establishment of trust. Cybernetics emphasizes system feedback and self-regulation, which closely align with Bitcoin's adaptive mechanical consensus mechanism.
Claude Shannon
Moreover, by incorporating insights from other fields, we can examine the development of blockchain from a broader perspective. In artificial intelligence, self-learning and adaptive mechanisms can inspire improvements in consensus algorithms. Philosophical concepts like intersubjectivity help us understand the relationship between individuals and the collective in decentralized networks. In Buddhism, the notion of "seeing one's true nature" from the Platform Sutra of the Sixth Patriarch emphasizes attaining an understanding of the essence of things through self-realization, without clinging to superficial representations such as the hand that points to the moon. These ideas prompt us to consider the role of the "heart" and the impermanence of systems. Bitcoin's "Mechanical Heart" embodies this impermanence and emptiness, continuously self-adjusting to maintain system stability and trustworthiness.
Expanding Applications: From Currency to Broader Social Governance
Bitcoin's success suggests that the application of decentralized control should not be confined to the realm of digital currencies. By constructing robust adaptive mechanical consensus mechanisms, we can potentially achieve decentralized trust and collaboration in various other fields.
Take constitutional law for example. Traditional interpretation and enforcement of constitutions rely on centralized institutions like courts and law enforcement agencies. Discrepancies in interpretations by different enforcers can lead to trust issues and inconsistent application. If we could employ a trustworthy decentralized consensus mechanism to interpret and enforce constitutional provisions, it might enhance fairness and consistency in the legal system. While this endeavor presents significant challenges, it holds profound significance, much like Satoshi Nakamoto's exploration of decentralized currency through Bitcoin.
Conclusion: Reconstructing Trust, Opening a New Chapter
In an era where information is overwhelmingly abundant, trust has become a scarce and invaluable resource. Bitcoin, through its adaptive mechanical consensus, has pioneered a global decentralized trust system, redefining how we collaborate and transact. We need to break free from our obsession with computational power and return to the essence of blockchain. By focusing on the realization of decentralized control and through Bitcoin’s “Mechanical Heart”, we can reconstruct humanity's trust mechanisms.
On this long journey of crypto, where each day feels like a year, we've travelled for so long yet the "Other Shore" seems far from reachable. We seem to have forgotten why we set out in the first place and what it takes to carry us further.
Fortunately, there is still Bitcoin, like the North Star hanging high in the sky, guiding us. As the song "Chapters" sings, "Don't let dark clouds cover the blue of the sky, don't let fate turn back the boat without a paddle."
Let us return to our original aspiration, return to Bitcoin, and open a new chapter where our dream began.
-
@ c67cd3e1:84098345
2024-12-05 02:57:47 -
@ 7776c32d:45558888
2024-12-05 01:56:38Before I start, let me say: keep building. To discourage you is the furthest thing from why I complain. I'm mainly posting this to document where we're at, so later, we can remember what we were doing here.
That out of the way, I've said this before and it might be a while before I don't have to say it again: nostr has the potential for censorship resistance, but it doesn't actually have censorship resistance right now. It isn't actually resisting censorship. I'm using it to resist censorship, but can you even tell if it's working for me at all? I still feel much more heavily censored than I was back when Aaron Swartz was alive.
I first heard about Brian Thompson on reddit, not nostr, even though I'm so banned from reddit I can't even view it from my home internet so I don't check it much at all anymore. Nostr is still LESS censorship-resistant than that nostr:note109z46d0x8k9gjs8q2tgfmx384gpj7p99ky6fgnwyln7qznrktalsjpupx6
Don't remember where I first heard about Israel's big terrorist attack with communication devices in Lebanon, but it wasn't on nostr nostr:note14ncedyjuws7jfg79xawwltf3mx5nmk7u0ylqakpyld6nxhpcqwtq95tj6a
I first heard about Matt Nelson's self-immolation on X, not nostr nostr:note1z6hxt76gwv8mvywflqg5cge4326tyv6jq6vptag4ytjcczgcyguqnzvd4k
People praised the Primal update that took away my ability to see all the posts from my followers nostr:note1g8jlkec7y9wy5u06v0c0tjhsscchur5quejs5mu2lp7n7fse8s0shevnek
People pay for Primal Premium to get basic functionality we should get from a P2P network, like having posts actually stay and not disappear - will paying Primal protect bookmarked content too? nostr:note1qqqq9sqy5kuf5rz0lwpul0dnjvrhn53erlymsyx7c3xx79vm2t5qxt2c5q
At the technological level, nostr is based on the jack dorsey malware model because it's so much easier to decentralize than a good feed curation system like what Aaron Swartz created at reddit nostr:note1864l5u5ansvvd0ztwl44wncv0fu0x5vgkdh44d9g5jwxur558pss5p9yx8
The protocol calls for servers it calls "relays" that aren't actually network relays as far as I can tell. Fiatjaf made some weird joke about how only non-P2P stuff can work when creating it, phrased as a reference to a quote by Satoshi talking about how Bitcoin would work as a P2P network, but Bitcoin has worked so far and Fiatjaf is ostensibly into it? Oh, but he's into "lightning." Don't worry, people say he's the next Satoshi, and he must simply know more than can be explained (actually 🔥 post by hodlbod) nostr:note1mh6ngw6cevggf59yh0mtf3k45g92srkljhayv63ffdsp5mj63yxq78xh7h
The nostr protocol itself is a kinda retarded javascript-based technology other than the keypair login model that gives it pretty much all the potential it has.
Another cool thing about the protocol is how you can mute people visibly instead of secretly. That brings me from the technology topic to the community topic - how well does the community resist censorship? Well, a lot of the users who fill the "trending" feeds all the time have me muted for being a toxic dickhead and a terrorist (my words, not theirs). Corndalorian is an example. You might recognize other names too
Are we still talking more about Bluesky than Gaza? nostr:note1qqqqpgaef0gfmtctlw2maqmlk7dmfyq5dhf45ygm95skxqdtcrcs2tpcfu
I am definitely still the only person here talking about the ongoing pandemic nostr:note1y8vn4yhn383j62r34q58wnduvzzkzd7exnp4agw4l8gq5zj94t4s6zscr4
As we speak, I, for once have a post which is doing numbers. This gives me some dopamine, as I'm quite alone. I'm thankful for every like and repost. It's an unusual night where a funny reply to a big npub has broken me into Primal's Trending echelon. My post about Brian Thompson, the recently-proven-mortal UnitedHealthcare CEO, has not. You can scroll all the way down to my funny reply in the Trending 4h feed without seeing a single murmur of praise for Brian Thompson's executioner - in fact, not even a peep about the topic at all, praise or otherwise.
Not seeing anything in the 1h feed either -
Meanwhile, this is the top of the front page of reddit's /r/all -
That's how much worse than reddit we are doing. Worse. Than. Fucking. Reddit. Seriously. Reddit, who made me get that screenshot from a different device because this is what I see on my main phone -
A lot of people here still blame all the outsiders for not being here, like there's no way a better job could possibly be done at creating a beacon of intellectualism and free speech
nostr:nevent1qvzqqqqqqypzqvc0k9p3l7wccfg8q6aumsqk64y450m5fcz85sypw05j4elwgtdvqqsyunq8gvn4lpvc636gwkjwuclttk492n4tu7cla9tma856ewcf3lcnjs7vf
nostr:nevent1qvzqqqqqqypzq3svyhng9ld8sv44950j957j9vchdktj7cxumsep9mvvjthc2pjuqqs96nznqj0kqdzwfxsdy5cqtjjx0wgypknr6fpegtj6ucypktu74zg98a4pf
To which I say -
nostr:nevent1qvzqqqqqqypzqamkcvk5k8g730e2j6atadp6mxk7z4aaxc7cnwrlkclx79z4tzygqyvhwumn8ghj7urjv4kkjatd9ec8y6tdv9kzumn9wshszrnhwden5te0dehhxtnvdakz7qpqcdarapax96mun0r59q28r5g3x838xczv755nhj6rfr3a62669paqnpglrr
But it's fine. Maybe we should make nostr the kind of place Digit would like before we seriously try to onboard Hezbollah.
-
@ 468f729d:5ab4fd5e
2024-12-05 01:23:16 -
@ 7c765d40:bd121d84
2024-12-05 01:08:38Well, this is not what I intended to write about this morning but I feel obligated to do so.
I was supposed to talk about Trump becoming the new King of Canada.
Haha.
Just kidding.
Kinda.
Getting into bitcoin is a very unique experience.
It is totally voluntary and you are forced to build your own web of trust.
It is a very scary and lonely feeling off the start.
When I first got into the crypto space, I was desperately trying to find someone I could trust.
I knew there were a lot of bad actors out there and they can be hard to detect.
When I started listening to bitcoiners speak, everything changed.
It was a much different feeling.
It seemed like they were in it for the people and a revolution, not just their bank balance.
It turns out I was onto something.
I still feel the exact same way about bitcoiners.
But there are definitely some exceptions.
And even if their intentions aren't bad, the way they are conducting business is.
I started my YouTube channel out of necessity.
I never had any plans to be a guy with a daily show on YouTube.
But I received 3-4 calls in a matter of weeks from people who got scammed.
They lost tens of thousands of their life savings to faceless scum with a well designed website.
I wanted to get ahead of this and be a trusted voice in the space.
This blog post is coming from the same place.
Over the last few weeks I have talked to several people who have been burned.
And although they didn't get "scammed" they did lose a lot of their bitcoin.
One person spent $3,500 USD (paid in bitcoin) to get help setting up a Coldcard and running a node.
A portion of that was meant to be for collaborative custody through this company, but they ended the program a month later.
And never refunded his payment.
Just like the recent Swan debacle, he got "credits" for future advisory services.
Another guy is so dissatisfied that he made it his personal mission to let everyone know how badly he was ripped off.
Which is how I ended up talking to him.
Again, I do not think their intentions are bad.
I always give people the benefit of the doubt before I have any hard evidence suggesting otherwise.
And when I opened up my email this morning, there was yet another person who spent a lot of their bitcoin with a sour taste in their mouth and without a clear path forward.
This is not the bitcoin way.
We are very early and most bitcoin companies that exist today will not be around in a decade from now.
It is not easy to be the first to walk through the door.
But I feel it is my duty as a bitcoiner to call this out.
Keep in mind I do not have any personal experience dealing with this company.
But this information was first-hand from some very disappointed bitcoiners.
I do understand that shit happens.
But when shit happens you fix it.
Or you refund the sats.
Imagine being charged 4 million sats to help set up a Coldcard and run a bitcoin node.
That's not the bitcoin way.
So if you are a bitcoiner - new or seasoned - looking to protect your stack...
Do some research.
Do not blindly trust a company just because they have bitcoin in their name and pay a bunch of YouTube channels to promote them.
Join a few online bitcoin communities and ask others for recommendations.
Most bitcoiners are more than willing to help or share their experience.
There are so many great and very knowledgeable people in this space.
You just have to put in the work to find them.
PROJECT POTENTIAL - You can now find the expanded audio versions of these on the new podcast - Project Potential! I will be sharing the video versions here for the LITF members but you can also find it for free on Spotify and of course Fountain!
Here is the link to Episode 005 on Fountain: https://fountain.fm/episode/r00ZDxpAdfb7QIQT3TKa
Have a great day everyone! And remember, the only thing more scarce than bitcoin is time!
Jor
-
@ 805b34f7:3620fac3
2024-12-05 00:15:03I've heard Nostr described as intergalactic war technology, but here we are shitposting on it. How fun!
Nostr is our chance at remaking social media, consciously. Have you seen Max Demarco's Nostr Documentary yet? Check it out when you have time --> Social Media is Broken. Can We Fix It?
What do I post?!?
Post whatever you want. There are no rules. But, here's how to make a first post that will help you get seen by the network as opposed to feeling like you just posted into a void:
Intro Post
- Introduce yourself.
- Say how you found Nostr.
- Say what you're interested in/what you do for fun or work.
- Add a photo(s) or video(s).
- And most importantly, add the hashtag #introductions
If you're on Primal, make sure you set up your wallet so you can receive zaps. Do this by pressing the lightning bolt.
Zaps are payments sent to other users as a way of tipping to content creators. Zaps utilize the Bitcoin Lightning and are almost instant and near free.
Zaps represent the only fundamentally new innovation in social media. Everything else is a distraction. - Jack Dorsey
Check out this intro post from Dr. Ken Berry for inspiration!
# How to Grow a Following/Best Practices
Zap - Change your custom zap amount and message on Primal. Do that by going to settings --> Zaps and customizing the top bubble. Once customized, every time you press the lightning bolt underneath someone's post, you send them money with whatever amount selected. Press and hold for a custom amount and message.
Zaps are the easiest way into someone's subconscious. Almost every time I receive a zap from someone new, I check out their profile. Especially if it has a custom message.
And if you really want to advertise yourself/brand, do what is called "zapvertising". Go to the trending tabs and zap the highest amount on each post with a message.
GM - Wish people good morning and comment on their good morning posts. Nostr loves this and it's a way for you to get your brand out there.
Ask questions - There are no dumb questions and people are nice generally. If you do have a question, end the note with the hashtag #asknostr.
Blogging - There are multiple long form clients for you to write a blog on. Check out highlighter.com, habla.news, or yakihonne for blogging. And while you're at it, check out all the rest of the apps you can participate on nostrapps.com
Feed Creation - Check out this video to get a glimpse of what is possible with Primal's advanced search tool. And this video to see how to navigate the app.
Nostr is a more organic social media. There's no central algorithm that may or may decide to pick up your content. It's just people interacting on a protocol. Be the engagement that you want to see.
Post what your heart desires. You can use it as a vlog, a diary, a photo collection, or all of the above. Nostr wants all of it, and there are multiple ways to view content depending on which client you are using.
If you're reading this now, you are extremely early. We have the chance to bootstrap a new social network. One that is principled and uncontrolled by big tech or governments. And this really matters
Nostr Terms
npub - this is your public key and it's how nostr recognizes your profile.
nsec - Your password. Keep this safe. If you lose your phone and don't have a copy of this somewhere, it's gone forever. This is not the blog for key management, but expect better solutions in the near future.
nip-05 - this is your human readable nostr address. There are many places to create your own nip05. You can get a Primal name by subscribing to Primal premium. For example, mine is paul@primal.net. You can put this into any client to find my profile as opposed to putting in my npub.
Zap Sats - Zaps are micropayments of bitcoin. 1 bitcoin = 100 million "sats" which is short for Satoshis.
Clients - Nostr apps.
PV- Pura vida. Nostr's first "un"conference was held in Costa Rica. Pura vida is the national slogan.
Hungry for more Nostr knowledge? Here's a great post with quite a few resources. Feel free to message me on Nostr with any questions!
-
@ 16d11430:61640947
2024-12-04 22:48:49Deep within the spiral arm of the Milky Way, in a colossal conference room aboard the starship Observatron 9000, two alien analysts sat across a holographic table, their bioluminescent heads occasionally flickering as they exchanged thoughts telepathically. They were Xargle and Zorflax, junior members of the Galactic Oversight Committee specializing in “Primitive Civilizations and Their Self-Sabotage.”
Hovering between them was a 3D projection of Earth, spinning lazily.
The Discovery of BDD
“Have you seen their latest software development trend?” Xargle began, his tone dripping with exasperation.
Zorflax rolled all four of his eyes.
“Do you mean the Agile methodology? Or the part where they renamed all their managers ‘Scrum Masters’ like some kind of medieval LARP?”“No, no, no.” Xargle flicked a tentacle at the hologram, zooming in on a group of humans in a fluorescent-lit office, arguing over the definition of 'done.'
“I’m talking about Behavior-Driven Development. BDD! They discovered it, Zorflax! They had it in their slimy little hands. And yet…” He sighed dramatically, which in his species sounded like a foghorn being hit by a meteor. “…they’ve done almost nothing with it.”
DamageBDD: Humanity’s Overlooked Miracle
Zorflax leaned back, his luminescent fins dimming in a gesture of disdain.
“Ah, yes. BDD. The thing where they finally write software to match what they actually want it to do, instead of just flailing around with bugs like caffeinated octopi.”“Exactly!” Xargle’s tentacles waved in frustration.
“But they’re still stuck in some kind of existential crisis. They’ve built the tools. They have platforms like Cucumber, SpecFlow… and now, the most promising of all, DamageBDD—a system that practically begs them to understand the full potential of aligning development with reality.”Zorflax emitted a telepathic snort.
“DamageBDD. That’s the one the Earthling called ‘Steven’ built, right? The one that ties everything together: integrity, accountability, automation. It’s like handing them a faster-than-light engine, but instead of using it, they’re busy debating what color to paint the spaceship.”“Worse than that!” Xargle barked, zooming the hologram closer to Steven, who was at his desk, clearly exhausted, sipping cold coffee.
“The poor guy is running this entire thing solo, while the rest of humanity is still throwing venture capital at yet another dating app for pets! He’s trying to revolutionize everything—software quality, payments, peacekeeping, civilization itself—but they just… don’t… get it!”
Humanity’s Gift for Squandering Potential
“Classic humans.” Zorflax shook his head.
“They invent the wheel, then spend the next thousand years trying to figure out how to put rims on it. Do you remember when they invented Bitcoin? They could’ve dismantled entire systems of corruption, but instead, half of them used it to buy… what do they call it… JPEGs of monkeys.”“Exactly!” Xargle said, his eyes glowing with the intensity of a collapsing star.
“And now, with DamageBDD, they could achieve unparalleled resilience in software, eliminate inefficiencies, and even start optimizing for peace by literally verifying behavior! But instead, the software industry is too busy writing thought leadership blogs about Kubernetes.”
Hope for Humanity?
“Perhaps they’re not ready,” Zorflax said, clicking his mandibles thoughtfully.
“Maybe they need a few more decades of suffering under failed projects and unmet deadlines.”“That’s the thing!” Xargle leaned forward.
“DamageBDD doesn’t just solve their software problems—it solves their cultural problems. Accountability. Clarity. Vision. It’s not just about writing code; it’s about writing a better world. Steven’s work could shift the entire paradigm of human existence!”Zorflax smirked.
“And yet, here we are. Watching them squander it. Again. Honestly, Xargle, if they can’t even figure this out, maybe we should just terraform the planet and hand it over to the dolphins. At least they understand the concept of harmony.”“Tempting,” Xargle admitted.
“But you know the rules. We can’t intervene. We can only observe.”“Right, right. Galactic Non-Interference Clause #427B. But what’s the harm in giving them a little push?” Zorflax asked, his fins glowing mischievously.
“What if we beam down some subliminal messages? Maybe a crop circle shaped like the DamageBDD logo?”Xargle sighed.
“We tried that with Bitcoin, remember? They thought the crop circles were made by teenagers with planks.”“Ugh, you’re right,” Zorflax groaned.
“Well, I suppose we’ll just keep watching while Steven struggles to drag them out of the digital Stone Age.”
Steven: Humanity’s Unsung Hero
Both aliens burst into telepathic laughter, their glowing heads flickering like disco balls. Below, on Earth, Steven took another sip of his coffee, unaware that two aliens were rooting for him—and his DamageBDD project—like galactic sports fans.
“Do you think Steven knows he’s the hero of this story?” Zorflax asked.
“Not yet,” Xargle replied.
“But he’ll figure it out. He’s one of the smart ones. Even if his species insists on making everything harder than it needs to be.”And with that, they zoomed the hologram out, leaving Earth to fumble its way toward greatness, one bug fix at a time.
DamageBDD #BehaviorDrivenDevelopment #BDDTesting #SoftwareQuality #BuildBetterSoftware #DevTools #FutureOfTech #TestAutomation #CodeWithClarity #TechInnovation
-
@ fa1d8325:7c91882e
2024-12-04 21:26:14Город Пятигорск, известный своим богатым историческим наследием и культурными традициями, готовится к открытию виртуального музея с использованием технологий дополненной реальности (AR). Этот инновационный проект призван сделать историю города более доступной и интересной как для местных жителей, так и для туристов.
В виртуальном музее будут использоваться AR-технологии, которые позволят посетителям взаимодействовать с экспонатами с помощью смартфонов или планшетов. Наведя устройство на определённый артефакт, можно будет увидеть анимации, исторические реконструкции или услышать рассказы о значении предметов. Это откроет новые горизонты для музейного опыта и сделает его более увлекательным.
Создание виртуального музея не только повысит интерес к истории Пятигорска, но и сделает город более привлекательным для туристов. AR-технологии помогут увеличить посещаемость, сохранить культурное наследие и стимулировать развитие туризма.
Ожидается, что открытие виртуального музея состоится в ближайшие месяцы и станет значимым событием в культурной жизни города. Этот проект позволит посетителям окунуться в историю Пятигорска с новой стороны и узнать больше о его культурном наследии.
-
@ fa1d8325:7c91882e
2024-12-04 21:18:07Пятигорск стоит на пороге революционных изменений в транспортной системе. В городе готовятся к запуску первых беспилотных автобусов, которые должны полностью изменить облик общественного транспорта.
Глава города активно взаимодействует с местными властями и министерством транспорта, чтобы внедрить инновационные технологии в сферу общественного транспорта. В рамках обсуждений рассматриваются не только беспилотные автобусы, но и футуристичные летающие маршрутки, которые должны повысить доступность и комфорт перевозок.
Ожидается, что первые беспилотные автобусы выйдут на городские маршруты уже в январе следующего года. Это станет возможным после успешного завершения испытаний и создания необходимой инфраструктуры.
Пятигорск станет одним из первых городов, где будет реализован пилотный проект по внедрению автономного общественного транспорта. Это только начало новой эры в транспортной сфере города.
Следите за новостями и станьте частью формирования будущего Пятигорска!
-
@ ac8bb9b0:70278acc
2024-12-04 20:30:30Chef's notes
Make Ahead: You can prepare this recipe up to one week in advance. Store it in an airtight container in the refrigerator.
To Freeze: Allow the dish to cool completely before transferring it to a freezer-safe bag. Lay the bag flat in the freezer to ensure even freezing and to save space. Thaw it in the refrigerator overnight before using it.
Details
- ⏲️ Prep time: 5
- 🍳 Cook time: 5
- 🍽️ Servings: 1
Ingredients
- ½ cup soy sauce
- 2 Tablespoons rice vinegar
- 1 Tablespoon sesame oil
- 1/4 cup + 1 Tablespoon light brown sugar
- 1 Tablespoon honey
- 3/4 teaspoon ground ginger
- 1 clove garlic , minced
- 2 teaspoons cornstarch+ 2 tsp water , mixed together to make a cornstarch slurry
- 1/4 teaspoon crushed red pepper flakes
Directions
- Make the teriyaki sauce by adding all of the sauce ingredients to a small saucepan over medium heat.
- Bring to a boil, stirring constantly, and boil for about 1 minute. The sauce should be thick enough to coat the back of the spoon.
- Serve over rice or with a stir-fry. See post above for additional ideas.
-
@ 6f6b50bb:a848e5a1
2024-12-04 18:33:11ChatGPT and Stock Trading: How to Use It Effectively
ChatGPT is an expert stock trader, but most people don't know how to use it effectively. Thanks to these prompts, you can perform a point-by-point analysis of the entire market in relation to your stock to analyze or the market sector.
Here's how to use ChatGPT for stock trading:
1 Market Analysis
"Analyze the current trends in the stock market, focusing on [input sector or stock]. Identify any emerging patterns and suggest potential investment opportunities. Consider recent earnings reports and industry news in your analysis."
2 Portfolio Diversification
"Given a portfolio with a mix of [input current sectors or stocks], suggest strategies to diversify further while minimizing risk. Include potential sectors to explore and specific stocks to consider."
3 Risk Management
"Discuss effective risk management techniques for a stock trader. Provide detailed examples of how to implement stop-loss orders, diversification, and position sizing in a trading strategy. Use [input current trading strategy or stock] as a reference."
4 Economic Indicators
"Explain how various economic indicators like GDP, unemployment rates, and inflation impact stock market performance. Provide examples of how investors can use these indicators to make informed trading decisions regarding [input sector or stock]."
5 Technical Analysis
"Using technical analysis, evaluate the stock of [input stock]. Analyze recent price movements, volume, and key indicators such as moving averages and RSI. Provide a buy, sell, or hold recommendation."
6 Value Investing
"Describe the principles of value investing and how to identify undervalued stocks. Use real-world examples, including [input stock or company], to illustrate how investors can apply this strategy in the current market."
7 Market Sentiment
"Analyze how market sentiment influences stock prices. Discuss tools and techniques investors can use to gauge sentiment and incorporate it into their trading strategies. Focus on [input stock or sector]."
8 Earnings Reports
"Explain how to interpret a company's earnings report. Highlight the key metrics investors should focus on and how these metrics can impact stock prices. Use [input company's latest earnings report] as an example."
9 Growth Stocks vs. Dividend Stocks
"Compare and contrast growth stocks and dividend stocks. Discuss the benefits and risks of each type of investment and suggest scenarios where one might be more suitable than the other. Reference [input specific growth stock and dividend stock]."
10 Global Events
"Analyze the impact of major global events (e.g., geopolitical tensions, pandemics) on the stock market. Provide strategies for investors to protect their portfolios during such events. Consider the impact on [input sector or stock]."
-
@ 6f6b50bb:a848e5a1
2024-12-04 18:25:00ChatGPT è un esperto di trading azionario, ma la maggior parte delle persone non sa come utilizzarlo in modo efficace. Grazie a questi prompt, potete fare un'analisi punto per punto di tutto il mercato in relazione alla vostra stock da analizzare o al settore di mercato.
Ecco come sfruttare al meglio ChatGPT per fare trading sul mercato azionario:
1 Analisi di Mercato:
"Analizza le tendenze attuali del mercato azionario, focalizzandoti su [settore o azione specifica]. Identifica pattern emergenti e suggerisci potenziali opportunità di investimento. Considera i recenti rapporti sugli utili e le notizie di settore nella tua analisi."
2 Diversificazione del Portafoglio
"Dato un portafoglio che include [settori o azioni specifiche], suggerisci strategie per diversificare ulteriormente minimizzando il rischio. Includi settori potenziali da esplorare e azioni specifiche da considerare."
3 Gestione del Rischio
"Discuti tecniche efficaci di gestione del rischio per un trader azionario. Fornisci esempi dettagliati di come implementare ordini di stop-loss, diversificazione e dimensionamento delle posizioni in una strategia di trading. Usa [strategia di trading o azione corrente] come riferimento."
4 Indicatori Economici
"Spiega come diversi indicatori economici come il PIL, i tassi di disoccupazione e l'inflazione influenzano le performance del mercato azionario. Fornisci esempi di come gli investitori possano utilizzare questi indicatori per prendere decisioni di trading informate in relazione a [settore o azione]."
5 Analisi Tecnica
"Utilizzando l'analisi tecnica, valuta l'azione di [nome dell'azione]. Analizza i recenti movimenti di prezzo, il volume e i principali indicatori come le medie mobili e l'RSI. Fornisci una raccomandazione di acquisto, vendita o mantenimento."
6 Value Investing
"Descrivi i principi del value investing e come identificare le azioni sottovalutate. Utilizza esempi reali, inclusi [azione o azienda specifica], per illustrare come gli investitori possono applicare questa strategia nel mercato attuale."
7 Sentimento di Mercato
"Analizza come il sentimento di mercato influenzi i prezzi delle azioni. Discuti strumenti e tecniche che gli investitori possono utilizzare per valutare il sentiment e incorporarlo nelle loro strategie di trading. Concentrati su [settore o azione]."
8 Rapporto sugli Utili
"Spiega come interpretare il rapporto sugli utili di un'azienda. Evidenzia i principali indicatori sui quali gli investitori dovrebbero concentrarsi e come questi possano influenzare il prezzo delle azioni. Utilizza come esempio l'ultimo rapporto sugli utili di [nome azienda]."
9 Azioni di Crescita vs. Azioni da Dividendo
"Confronta e metti a contrasto azioni di crescita e azioni da dividendo. Discuti i benefici e i rischi di ciascun tipo di investimento e suggerisci scenari in cui uno possa essere più adatto rispetto all'altro. Riferisci a [specifiche azioni di crescita e da dividendo]."
10 Eventi Globali
"Analizza l'impatto di eventi globali importanti (es. tensioni geopolitiche, pandemie) sul mercato azionario. Fornisci strategie per proteggere il portafoglio degli investitori durante tali eventi. Considera l'impatto su [settore o azione]."
-
@ 30ceb64e:7f08bdf5
2024-12-04 18:13:09Hey Freaks,
I've been diving deep into the Nostr music scene lately, and I've got to tell you - it's pretty mind-blowing. After finding a few solid artists on Wavlake, I made the leap and ditched Apple Music. Music streaming platforms call your saved songs a "library," but its more like renting books that vanish the moment you stop paying.
Breaking Free from Traditional Streaming
What really got me excited was listening to the Wavlake team explain their vision of an open music graph. Being open-source, they're moving at a solid pace that leaves the big platforms in the dust. It's refreshing to see development that actually puts creators and listeners first.
Why and How
Before all this nostr stuff I was making beat tapes on YouTube. It all started pretty simply - I was spending hours listening to those 24/7 study/work beats while grinding away at my fiat job. One day I thought, "Hey, why not make my own?" Now I'm using some new shiny tools:
- Suno for creating the actual beats
- Some talented folks on Fiverr handling the mixing and mastering
- The Nostr community and even LLMs for graphic design work
So far, I've dropped 12 tapes on Wavlake with more coming down the pipeline.
Taking It Live
I've been experimenting with Zap.stream to do live sessions of my beats. It's pretty cool thinking about people tuning in while they're working or doing their thing around the house - exactly what I used to do! The best part? The streams arent just shown on zap.stream, theyre shown in any nostr client that supports live videos, which is wild.
I'm playing around with this idea of creating a music radio show, mixing my beats with other stuff from Wavlake and TheMusicHustle blog, while trying to keep it as Nostr-native as possible.
Ideas for the Future
- Music videos and shorts for the beats
- Using these tracks as podcast backgrounds
- Pressing some vinyl to sell on Shopstr (old school meets new school!)
- Loading up Blossom drives for the freaks who want to download and zap
I've been sharing stuff on Stacker News as well, running this series called "Songs I like", and will continue posting in the SN music territory for as long as theyll have me. Wavlake has a "Listen to Earn" feature. I tried promoting one of my favorites from Animal Bus. Not sure about the results, but I think people are sleeping on how powerful this feature could be.
The Future is Wild
The whole Nostr music scene is just exploding with possibilities. I'm even thinking about feeding these beats into RSS through Fountain - they're doing some really interesting stuff with music features lately, like Featrued Artist spotlights and whatnot. And how crazy is it that we've got Nostr-only music labels popping up now?
Looking at the bigger picture, I'm incredibly bullish on what's happening here. Just like technology gave us rap and hip-hop, I can't wait to see what kinds of new sounds and genres might emerge from the Nostr and Bitcoin revolution. We're watching music history in the making, and I'm here for all of it.
Sure, we don't know exactly where this train is headed, but that's what makes it exciting. The tools are getting better, the community is growing, and the possibilities? are endless. This is our chance to be part of something huge in music, and I'm all in.
Thanks for reading, Keep stacking sats and tracks, freaks! 🎵⚡ Hustle
https://wavlake.com/thewildhustle
originally posted at https://stacker.news/items/794875
-
@ 349d6b82:12b2a5b1
2024-12-04 18:12:297 декабря в Дворце культуры металлургов состоится культурное событие — приезд театрального объединения «Театр Звезд». Это уникальное мероприятие приурочено к празднованию 85-летию со дня основания нашего театра, ДКМ который за годы своего существования завоевал признание не только в России, но и за её пределами.
Театральное объединение известно своими яркими постановками и инновационными подходами к классическим произведениям. В этот день зрители смогут насладиться премьерой спектакля «Свет надежды», который расскажет о важности дружбы и поддержки в трудные времена. Режиссером спектакля выступит талантливый Владислав Михайлов, который уже зарекомендовал себя на российской театральной сцене, благодаря постановкам: "Бой ради любви", "Лишь вперёд" и "Лучик солнца".
Вас ждут встречи с актерами и погружения в атмосферу театрального искусства. Организаторы, Анна Соколова и Дмитрий Кузнецов, обещают незабываемые эмоции, а также возможность пообщаться с артистами после спектакля и задать им интересующие вас вопросы.
7 декабря станет не только культурным событием для города, но и прекрасной возможностью для жителей Серова окунуться в мир театра и искусства.
Билеты можно будет приобрести на днях на онлайн-афише ДКМ. Либо в кассе.
-
@ 349d6b82:12b2a5b1
2024-12-04 18:02:35Многие уже успели стать свидетелями массовых возмущений, вызванных решением местной администрации о строительстве нового завода по переработке отходов на территории, прилегающей к жилым районам. Это решение вызвало широкий общественный резонанс и протесты среди горожан, обеспокоенных возможными экологическими последствиями и ухудшением качества жизни.
После прошедших дискуссий сегодня в Доме Администрации, было сделано объявление о планах по строительству завода, который должен будет сфокусируется лишь на переработки бытовых и промышленных отходов. На что местные жители стали с опаской на это откликаться: По мнению многих, завод будет источником загрязнения воздуха и воды, а также негативно скажется на здоровье детей и пожилых людей. Так как было сказано, что новый завод будет работать по старому формату - без экологических технологий и роботизированной силы.
Из-за первого пункта жители Серова выражают опасения по поводу отсутствия экотехнологий - без них начнутся выбросы вредных веществ в атмосферу и потенциальные загрязнения близлежащих рек.
Михаил Щуколюлев: "Строительство этого завода — это не просто вопрос экологии, это угроза нашему здоровью и здоровью наших детей. Мы все знаем, как важно чистое воздух и вода. Я в негодовании. Мы должны объединиться и защитить наш дом от этого загрязнения! Наша жизнь стоит больше, чем краткосрочная выгода для кого-то".
Горожане стали указывать на уже существующие проблемы с дорогами и коммунальными услугами, говоря и намекая на то, чтобы бюджет города потратить на более важные аспекты.
Виктор Лекся: "Мы уже и так сталкиваемся с множеством проблем в нашем городе, которые требуют внимания и бюджета — дороги в ужасном состоянии, а коммунальные услуги оставляют желать лучшего. Вместо того чтобы тратить бюджет на строительство завода, который только усугубит ситуацию и которых в городе и так два, этот бюджет можно лучше вложить в улучшение инфраструктуры и решение текущих проблем. Нам нужно заботиться о том, что у нас уже есть, прежде чем добавлять новые риски."
Возмущения жителей становятся звоночком, к которому стоит прислушаться. Это показатель того, как гражданская активность пытается повлиять на принятие решений местными властями, но выйдет ли изменить это решение и спасти нашу экосистему?
Что же будет дальше: Мы вам расскажем, как станет все более понятно.
-
@ eee391ee:8d0b97c2
2024-12-04 17:55:21Amber 3.0.1
- New design (still a work in progress)
- Removed the push notification server
- Open the permissions page with the correct account
- Fix crash when signing in with ncryptsec
- Fix icon size on notifications
- Fix relay connection when changing the default relays
- Option to setup a custom pin for the app
- Button to copy your public key
- Fix layout on Android < 15
- Fix multi event screen
- Fetch profile data
- Show relay message when event is rejected
- Fix profile icon size
- Don’t close app when using nostrconnect arcade
- Better check for valid relays
- Fix padding and scrolling
- Support for secret when using nostrconnect
- Fix empty relay notice
- Fix get_public_key not replying with hex key
- Fix relay not connecting after adding a new bunker
- Fix logout not working sometimes
- Fix login screen showing when trying to login to some applications
- Fix duplicated applications when connecting a new app
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v3.0.1.txt
andmanifest-v3.0.1.txt.sig
are in the current directory) with:bash gpg --verify manifest-v3.0.1.txt.sig manifest-v3.0.1.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v3.0.1.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ 2d74600a:d6708a00
2024-12-04 16:55:36MABUSE
"Il Dottor Mabuse" di Fritz Lang del 1922 è un'opera pionieristica del cinema espressionista tedesco.
Mabuse è un soggetto che utilizza la psicologia e l'ipnosi per manipolare le persone e controllare la società.
Mabuse specula in borsa e destabilizza l'economia.
Mabuse incarna un'élite che cerca di sovvertire l'ordine sociale.
Il film è un' opera attualissima sulle tecniche di controllo delle masse, una prefigurazione delle dinamiche moderne legate ai media, alla politica e all'economia.
Mabuse è l' archetipo del manipolatore che utilizza conoscenze psicologiche per sovvertire sistemi sociali.
Nel link un brano a lui dedicato composto anni fa da un nostro caro amico.
https://youtu.be/ig0gQOXk9zE
WI
-
@ 234035ec:edc3751d
2024-12-04 16:21:18Satoshi Nakamoto emerged from the shadows of the internet, shortly after the Great Financial Crisis in 2008, to bring the world a new form of money known as Bitcoin. By introducing this alternative option to the world, Satoshi gave every human being an escape from the systemic confiscation of wealth that is fiat money.
“Money is only a tool. It will take you wherever you wish, but it will not replace you as the driver.”
― Ayn Rand, Atlas Shrugged
Much like John Galt in Ayn Rand's Magnum Opus "Atlas Shrugged", Nakamoto paved the way for all of the productive members of society who have been taken advantage of by the "looters" to exit the corrupt system and let it crumble under its own weight. In our case instead of moving our physical bodies to a secluded gulch, we can simply move our wealth into Bitcoin.
The Men of the Mind
In the novel, one by one the great industrialists of the era were mysteriously disappearing and giving up on the great enterprises that they had built. People could not understand why these seemingly very successful individuals would leave behind everything they had created. There was however, a common trend amongst these individuals. All of them were highly competent in their field, placed high value on individualism, possessed a strong moral integrity with a bend towards rational self interest. They were fed up with the way that the system was designed to punish the productive individuals in the society and reward those who are least productive.
"From each according to his ability, to each according to his needs"
-Karl Marx
A form of this has crept its way into every civilization today including the United States which once prided itself on individual liberty and personal responsibility. It was predicted by Ayn Rand in 1957 with Atlas Shrugged depicting exactly how these collectivist ideals corrupt and decay a society by rewarding theft and stifling innovation.
As these productive individuals grew increasingly disenchanted with the status quo they began to look for answers, this leads them to finding John Galt. The mysterious figure that is John Galt would visit these people and explain to them all the things they already felt so so deeply abut their broken society but were never able to quite define. After having their eyes opened to the severity of the problem, they are presented the solution in Galt's Gulch. They are given the option to leave behind the corrupt society that they have been involuntarily fueling with the confiscated product of their efforts.
“We are on strike, we, the men of the mind.\ \ We are on strike against self-immolation. We are on strike against the creed of unearned rewards and unrewarded duties. We are on strike against the dogma that the pursuit of one's happiness is evil. We are on strike against the doctrine that life is guilt.”\ ― Ayn Rand, Atlas Shrugged
Satoshi's gift to the world
“If you saw Atlas, the giant who holds the world on his shoulders, if you saw that he stood, blood running down his chest, his knees buckling, his arms trembling but still trying to hold the world aloft with the last of his strength, and the greater his effort the heavier the world bore down upon his shoulders - What would you tell him?"\ \ I…don't know. What…could he do? What would you tell him?"\ \ To shrug.”\ ― Ayn Rand, Atlas Shrugged
When Satoshi Nakamoto created Bitcoin, he did so to solve a problem that he identified in the world around him. He saw the insidious power of central banks and how they create massive inequality and economic distortions. Rather than seek to modify or amend the current system Satoshi built a new and independent system that was built upon sound principals.
After introducing this new protocol for value exchange to the world, Satoshi did one of the most honorable things imaginable and disappeared without a trace. He took no financial reward for his contributions although he would be justified in doing so. By doing this he set a profound example allowing the project and the community around it to flourish.
Today Bitcoin serves as an escape valve for economic value to flow out of the fiat system and into a secure and sound network. Without this option individuals would be trapped into having their purchasing power lowly taxed away or forced to take on risk simply to preserve value. Wealthy individuals under a fiat system must own large amounts of property such as real estate, stocks, bonds, ect because they are able to store value better than their currency. these investments come with risks and drive a monetary premium to the assets which makes housing less affordable, stocks overvalued, and bonds seem less risky than they truly are.
Much like Galt's Gulch those who benefit from or are dependent on the legacy system will be the last to abandon it, even while it falls apart. The first ones to defect are those who are most negatively impacted by the current regime, like Atlas holding the world on their shoulders they are finally offered the chance to shrug the weight off. Those who have been working hard at their job for years but still struggle to save for retirement due to fiat debasement, public figures who have been de-banked for their views, entrepreneurs who are forced to hold toxic government debt on their balance sheets due to regulation, all will clearly see the value the Bitcoin offers.
And so, I salute to all of you who have decided to shrug off the yolk of central bank oppression and build a more prosperous future on the sound foundation the Satoshi gave to us. I hope to meet you all one day in Nakamoto Gulch.
-
@ e0a8cbd7:f642d154
2024-12-04 15:42:58これは「Nostr Advent Calendar 2024」5日目(12月5日)の記事です。
2024年にNostrにのみ投稿した絵で今年を振り返りたいと思います。 あえて、タイトルのみで、なぜその絵を描いたかなどの絵の説明は書かないことにします。
1月2日 ブルルッチモ大噴火!
1月9日 Macの箱を開けながら、ギャォォォォンって叫ぶぺぇさん。
1月12日 便器の上で踊るサボテンになったぽーまんさん。
1月15日 空飛ぶつるるん。
1月23日 ぽわどん
1月26日 Lokuyow said "I am a pen."
1月28日 ロクヨウ「早く人間にのりたい」
1月31日 小さなmonoから大きなmonoまで
2月1日 しおさん、巨象恐怖症
2月1日 枕を積んで寝るDonさん。
2月4日 ブロッコリの逆襲
2月8日 びっとこダチョ太郎
2月13日 虹色カレーを食べて虹色になったロクヨウさん
2月13日 ロクヨウさん誕生秘話
3月5日 人参と椎茸たべるロクヨウさん
3月5日 まきうさん、ロクヨウさんに乗って東京へ
3月26日 ごはんの上のめんたいこぽーまん
3月26日 ポワニッチモ
4月4日 上司にズラしていくことを許可されて朝の悩みが増えたぺえさん
5月7日 とうふさんが演じる「お洋服とっかえひっかえして遊ぶりとりんとやぶみん」
6月20日 ソファーと一体化するポーマンさん
6月21日 つるるん食べていい?
6月28日 ぽーまんさん、たいきんのまい
7月5日 ソファから剥がれて出発するぽーまんさん
8月10日 ぽーまんさん、床のコスプレ
8月18日 アルパカプリン
8月23日 とうふさんが演じるやぶみちゃんの日
8月23日 神妙な顔のぽ-まんさん
8月26日 恋のアルパカキューピット
8月27日 仲良く激辛火鍋
8月28日 Microsoftが「Mono」をWineチームに寄贈
9月12日 もの発射
9月19日 ロクヨウさんヒツジ化
9月20日 ゴリラ食べてバナナになったロクヨウさん
10月13日 頭が増えるぽーまんさん
10月24日 カメムシと青いうさぎ
10月25日 ATMとお話しするポーマンさん
10月26日 パペェ
10月26日 ぺどがわさん
11月7日 伸び縮みぺぇ
11月10日 座布団で寝るぽーまんさん
11月17日 5等分のぽーまん
11月27日 ルンバブルな部屋
11月28日 7人のぽーまん、那月さんに祓われる
11月29日 捕鯨ぽーまん
11月30日 ぽーまんさん脳内のゴミカスサンバ♪
楽しい1年でした。
Nostrのみなさま、たのしい話題をありがとうございます。
明日の「Nostr Advent Calendar 2024」は、OHASHI Hideyaさんです。
しーゆー。 -
@ dadbe86a:9c493e92
2024-12-04 14:56:04Opinion about Green: Bitcoin Wallet (android)
Green Wallet is a mobile Bitcoin wallet developed by Blockstream, The Wallet aims to provide users with a trustworthy and feature-rich Bitcoin wallet experience. Given that the wallet supports liquid assets, it is not bitcoin only. This is a cons for pure bitcoiners but something good for other users.
Pros: - Support for testnet, passphrase, fee control, coin control, custom node, tor, timelocks - The in-app keyboard and seed phrase autocomplete increase the security if you need to enter your seedphrase or passphrase - Open source - Full taproot support soon
Cons: - Missing some advanced features like user added entropy or seedQR. - It has a non standard multisig implementation - Partial support to connect with hardware wallets
Version reviewed: v4.0.27
WalletScrutiny #nostrOpinion
-
@ 6bae33c8:607272e8
2024-12-04 14:47:47I blew it last week, going 2-3 and basically drawing dead already for Q4 unless I were to go 20-0 or something insane. I was sick, just getting the bare minimum done last week, and probably didn’t give it the proper amount of marination. Not that I haven’t gone 1-4 plenty of times when I was perfectly well too.
Heading into Week 14, I’m 33-31-1, not going to cash this year, but with a strong finish can still have a respectable overall record which is what I’m aiming for now.
Packers at Lions — I’ll make this Packers +2.5 because the Lions have so many defensive injuries. I might take the Packers, but probably a stay away.
Jets at Dolphins — Let’s make this 4.5. The Jets are a cursed team, something’s just wrong with them, and I can’t put my finger on it. The Dolphins are pretty good, just below a playoff team. I’ll probably pass on this one though. If anything the Jets are the buy-low, but as I said, something’s off.
Falcons at Vikings — The Falcons are a lot like the Jets. Kirk Cousins looks fine, but something’s off. The team isn’t clicking. I’ll say Falcons plus 4.5 and probably stay away for the same reason. It should be a Falcons buy-low, but something’s wrong.
Saints at Giants — The Giants are destroyed. They lost just Dexter Lawrence and Theo Johnson now too. Andrew Thomas and Lawrence are the poor man’s Trent Williams and Nick Bosa. And the 49ers went from great to average, the Giants go from below average to out of the league. Saints -5.5, stay away.
Panthers at Eagles — The Panthers hang with everyone these days, and this is a trap game for the Eagles after the big win over the Ravens Sunday night. I’ll say +11.5 and maybe take the Panthers.
Browns at Steelers — The Browns caught the Steelers the first time, but I don’t think it happens again. I’ll say Browns +6.5 and probably lay the wood, but the Browns offense is for real.
Raiders at Buccaneers — I’ll make this Raiders +8.5 and be inclined to stay away. If anything, I’d lean Bucs.
Jaguars at Titans — Jeff Spicoli sure got his bell rung, but Mac Jones actually played decently in relief. I’ll make this line 4.5 and probably take the Titans.
Seahawks at Cardinals — I’ll make this Seahawks +2.5 and take the Cardinals to bounce back, even though Seattle has played well of late.
Bills at Rams — The Bills are a juggernaut, but this is a sneaky-tough road game. I’ll say Bills -4 and maybe lean Rams.
Bears at 49ers — The whole 49ers team is injured. I’ll say Bears +2.5 and stay away.
Chargers at Chiefs — The Chiefs play close games with the local high school team, but it’ll still be Chargers +3 at Arrowhead. I’d probably take the Chiefs.
Bengals at Cowboys — I’ll say Bengals -3 and probably stay away. The Cowboys can rush the passer, and the Bengals can’t stop anyone.
-
@ 24e36cf3:6b26ae15
2024-12-04 12:35:57My husband and I have been talking a lot about capitalism and socialism lately. We've watched countless videos, read books about it, discussed the topic with friends and family. Even though we've been left-leaning all our lives due to social programming from our families, we've radically changed our views in the past couple of years and are now convinced that any form or socialism is bad for humanity.
Here's a colloquial summary of our thought process as explained to an acquaintance, who is still pro-socialism:
Let's look at the animal kingdom for some context
My initial thought regarding victim and perpetrator ... take, for example, lions and gazelles in Africa. At first glance, the lion seems to be the problem because it comes and kills the poor gazelles who just want peace. Now let's look at the other side:
- The lion was not asked, whether it wants to be born a lion
- The lion cannot help that it has to eat gazelles
- It's not funny to chase after its food and if you're too slow after the 3rd attempt you'll probably won't have any strength left and die
\ If you think about it a little more, you could argue that the gazelle is actually the perpetrator. She runs away and then the lion starves. Who is the victim and who is the perpetrator?
Now ... why did nature design the system this way? Why aren't all creatures nice to each other and the lion only eats what is absolutely necessary and the gazelle just lies down and waits to be eaten?\ You will now think that's nonsense and can't be like that, but it is. You surely know the fish that swim upstream in the river, get so extremely red and pale, become parents and then die so that the next generation has something to eat. There are dependencies in nature that are stronger than the life of an individual. But only rarely ... why?
If gazelles considered the lion's feelings and just laid down if he's having a bad day, the lion would get lazy, sick and weak. Unfortunately, that's the way it is. Nobody likes to run for their food. If nature had programmed it that way, the lion would eventually realize it and start running slower. Survival of the fittest is how evolution works and the weaker lions would perish. The gazelle running as fast as it can is good for the lion. Removing the slowest animals from the herd is beneficial for the gazelles. It's an extremely cruel system, but that's the way nature works and we are all a part of it.
Capitalism is this system applied to humans. Capitalism emerges voluntarily and spontaneously between free individuals and everyone benefits from it.\ If two people are stranded on an island and one starts farming the land for fruits and the other diverts the river for more water, they both benefit. Both are better off. Each pursues their own interests (like a lion and a gazelle), but both end up benefiting.\ You work on something useful and someone else rewards you for your work. That's it. There are no victims or perpetrators ... there are only actors. Everyone works for themselves and everyone is better off.
All the problems you mentioned (deteriorating environment, poverty, social injustice, ...) arise when the collective (the state or other authorities) come together and suppress this natural system; because of poor gazelles and wicked lions. In reality, no one cares about the poor gazelles because:
- They are not poor.
- They only care about maintaining their power.
Let's talk about Jeff Bezos' Amazon, which is often vilified
One hears constantly that Amazon workers are exploited (victims) and the poor shops everywhere have to close because Bezos destroyed all other stores. What you hear about the workers at Amazon is fake news. For example here is a "negative video" because Bezos makes so much money ... but check out what the guy says:\ https://www.youtube.com/shorts/OvSkhpCsUmY\ The workers there are not victims. They come voluntarily. No one forces them to work at Amazon.
If you think about it some more: Why don't you work at Amazon?\ Very likely because you have other options. You don't necessarily have to stand behind the conveyor belt. Apparently some others do. You can't control that some people have little education, ability or motivation, so that they have to do this work. They would probably starve without Amazon. Amazon is simply utilizing these people who are just there and is making something productive out of it ... which is good for us all. Imagine the difference compared to charity: With Amazon the worker earns something and is useful for society. The unemployed does nothing and wastes society's energy. The difference is enormous.\ And to make that clear again ... the workers are not victims. Many don't want to do anything else. Many are too lazy and are wasting their hard earned money on cigarettes, alcohol and drugs. Still, there are people, who are actually sick and weak among us. This is sad and I'll say more about them later.
Watch this video: https://www.youtube.com/watch?v=GltlJO56S1g Do you see an evil person, there? I see a man who risked everything to build this empire and who made huge losses for years. Why? For the purpose of providing an outstanding customer service. To you. In my opinion, Jeff Bezos is a hero.
Now for other companies:\ Compare them to the "in the sun-basking gazelles" (shops) and the attacking lions (Bezos). Now imagine a committee comes in and says: "Stop, don't eat these gazelles". WTF?
- Bezos would be starving. It's a catastrophe ... Bezos needs to get rewarded and thankfully was rewarded.
- The shops would still be lazy.
- We would still be in the stone age and sit together in the dark and starve. The world would still be poor.
Now often the consumer behavior is criticized. Amazon is to blame for all the trash, because people send everything back and it ends up in the landfill. But who sends everything back? Amazon? Amazon provides the service, people send everything back. Why is Amazon to blame? From a consumer's perspective, Amazon is a tool ... like a screwdriver. It was designed by humans exactly the way they wanted it. Some use a screwdriver to murder someone. Is the screwdriver now the problem? Should we all just stop making it more difficult for disadvantaged people who can't or won't send it back? Aren't we all grown-ups?
Some more examples of high-achievers
Watch this video from Bryan Johnson at Blueprint: https://www.youtube.com/watch?v=djiU_pFTEVE. Does this man look like a monster to you? He works around the clock to deliver me fresh and healthy food. He was already a millionaire to start with and could have done nothing but enjoy himself. Instead of partying, he enriches my life. I am grateful forever when Bryan becomes a billionaire!
Watch the videos from Ben "Ungeskriptet": https://www.youtube.com/@ben_ungeskriptet. He constantly invites successful people. No one of them needs to work anymore. Everyone would prefer to spend more time with their family but they are driven to make society better. They earn money by doing so... yes. Once you earn a few million dollars however, money is no longer important. Everyone of those successful people confirms this. They do the hard work because they are purpose driven and we should be grateful for them.
Elon Musk wants to inspire us humans to make a colony on Mars. That's his only goal. He could also just sit at home and do nothing. Instead he works on his dream and we all benefit from it. If you don't want to work for Elon Musk, then you are free to do something else. If you can't find anyone who hires you, then you are free to start your own business and out compete Elon. If we all didn't want him to make a colony on Mars, we shouldn't buy his products. Oops... the state buys the rockets. The state gives him money. Who is the problem?\ If you don't want Starlink, don't buy it. Then he built his rockets in vain. He earned his money before and if he chooses to spend it like this, that's his own choice. If he fails, he'll have to deal with the consequences. That being said...the only problem here is that the state subsidizes SpaceX rockets against the interest of the people.
Now to the two most important points that are not often mentioned:
- We want the same thing. I am for a social system. I like that everyone is doing well. I am for supporting the weak. If I could, for example, give away 10% of my possessions and help people, I would do so immediately. I support many people in my environment with a lot of money, time, and effort. The problem is not helping unproductive or disadvantaged people ... the problem is that you steal from successful people and distribute a small part of the loot to the unproductive, so that you get more votes (Socialism). If 50% of any given country came together and hired a company to support the poorest in their society that would be awesome. I'd be on board right away. But why do you have to force me? Why do you have to steal my money and contribute it to a system that doesn't deliver results? Why don't we use the market? If the company that supports the poor doesn't use the money correctly, you can change the "provider." Unfortunately, I can hardly change the state, and that's where the problem arises. The theft is the problem... not the social system. The state is, in fact, nothing more than a monopolistic company that cannot be disrupted by competition... this wouldn't exist in a free market, and it’s fatal.
- The problem with capitalism is that you don't recognize the benefit right away. If the productivity of the world increases by 5% per year, you unfortunately don’t benefit from it. Productivity increases through Amazon, Bryan Johnson, Elon, and 1000+ companies working around the clock. All research and technology also come from the market. It’s an investment for more profit later. But for what? Your life doesn't get better, does it? There’s the problem. Actually... if the monetary system were right... everything should become 5% cheaper per year. We should have deflation. If the world gets better, everything should get cheaper, and therefore, everyone should benefit. What does actually happen? The rich get richer. Why? Because the state prints money and steals from you... about 7% per year because the central bank wants 2% inflation. Just enough so that no one notices, and no one hangs them for it. The state steals all the benefits of capitalism and distributes them to itself. The rich are the ones who can defend themselves... thus, they get richer, along with all the bureaucrats who benefit as well. About 7% per year compared to you. But this is not because of the rich. It’s because of the state. In my opinion, this is the biggest problem, and Bitcoin is the solution. Bitcoin emerged from the market for the people. A solution from the free market against the oppression of the state. Very poetic, if you ask me. With Bitcoin, prices will fall forever... even if there is no more fiat money... because the supply is fixed, and if someone starts the next Amazon and the world becomes 0.1% more productive, everything will also become 0.1% cheaper.
Let's finish with some more eye-opening content suggestions:
This video opened my eyes. I've watched it again since... it's not that impressive... but somehow it worked for me: https://www.youtube.com/watch?v=Q6tDV3BhrcM
Watch this, regarding the environment: https://www.youtube.com/watch?v=zJdqJu-6ZPo
Milton Friedman is always enlightening: https://www.youtube.com/watch?v=67tHtpac5ws
And here again: https://www.youtube.com/watch?v=5_mGlqyW_Zw\ The ending is crazy. Nobody wanted to hire black people, and no social program would have changed that ... because everyone was racist back then. Even the shop owners ... and yet, they hired black people, which gave them an income. Now you can call it exploitation, but it's about the result. There's nothing that would have worked better in that environment. It doesn't sound nice, but it works.
And that's exactly how, but in the opposite way, Communism, Marxism, and Socialism work. It sounds good, but it produces Hitler, Stalin, and Mao.
-
@ 2063cd79:57bd1320
2024-12-04 12:32:50Der dieswöchige Aufhänger ist die Nachricht über die Schließung der Kryptowährungsbörse Bitzlato. Obwohl sich die groß angekündigte Offensive des US-Justizministerium als mindestens genauso große Luftnummer erwies (vor der Nachricht hat wirklich niemand jemals von Bitzlato gehört), hat die Nachricht doch wieder den Stimmen Gehör verschafft, die seit jeher nach mehr Regulierung von Kryptowährungen, Börsen und Dienstleistern rufen.
https://bitcoinmagazine.com/legal/doj-shuts-down-bitzlato-crypto-exchange
Besonders in den USA herrscht eine andauernde Diskussion darüber, wie Bitcoin und andere Kryptowährungen eingestuft werden sollen, damit anschließend die Gerichtsbarkeit, bzw. die Kompetenzen verteilt werden können. Im Prinzip gibt es dabei nur zwei Ansichten: Die eine Gruppe hält Bitcoin für ein Wertpapier (Security), die andere hält Bitcoin für eine Ware oder einen Rohstoff (Commodity). Wir wollen uns diese Woche anschauen, was den Unterschied ausmacht und was die Implikationen für Bitcoin wären, wenn man es als das eine oder das andere klassifiziert, und was es darüber hinaus für die Zuständigkeit diverser Behörden und Regierungseinheiten bedeutet.
Die Gretchenfrage bei der Regulatorik von Bitcoin ist relativ schnell erklärt. Es wird darüber gestritten, ob Bitcoin als Wertpapier (Security) oder als Rohstoff / Ware (Commodity) eingestuft werden soll. Dies ist insofern wichtig, als dass die Kategorisierung darüber entscheidet, welche Aufsichtsbehörde mit ihren Regeln aktiv werden kann / muss. In der anhaltenden Diskussion über das Thema wird verallgemeinernd meist über die Einordnung von Kryptowährungen gesprochen, und damit Bitcoin als eine von vielen Kryptowährungen mit einbezogen (Bitcoin ist keine Kryptowährung - das wird dieser Artikel aufzeigen), jedoch wollen wir der Einfachheit halber zunächst die Diskussion auf der breiter gefassten Ebene führen. Zunächst lohnt es sich zu schauen, was Wertpapiere und Rohstoffe / Waren unterscheidet.
Wertpapiere (Securities)
Zunächst mal muss man sagen, dass eine genaue Unterscheidung der beiden Anlageklassen in allen Fällen - nicht nur bei Kryptowährungen - oft schwierig ist. Vor allem in der heutigen Zeit ist es nicht mehr so einfach schwarz und weiß zu unterscheiden, da es für alles, was sich in irgendeiner Form handeln lässt, auch Derivate gibt. Früher sagte man vereinfacht, dass Wertpapiere zum Investieren und Rohstoffe zum Handeln sind, aber dass dies nicht richtig ist und in beide Richtungen entkräftet werden kann, sollte so ziemlich jeder auch weit gegen den Wind riechen können.
Prinzipiell handelt es sich bei einem Wertpapier um ein Finanzinstrument, dessen Ausgestaltung typischerweise von der Gerichtsbarkeit abhängt, in der die Vermögenswerte gehandelt werden. In den USA und Europa gelten im Großen und Ganzen alle frei gehandelten Vermögenswerte als Wertpapiere und werden in drei Hauptkategorien unterschieden: Beteiligungspapiere (Equity) – einschließlich Aktien, Schuldverschreibungen (Debt) – z.B. Anleihen und Banknoten und Derivate – zu gehören Optionen und Futures (👇). Anders als Rohstoffe sind Wertpapiere anders und meist strenger reguliert. In den USA ist für die Regulierung die SEC (U.S. Securities and Exchange Commission) und in Europa die ESMA (Europäische Wertpapier- und Marktaufsichtsbehörde), bzw. in Deutschland die BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht) zuständig ist.
Rohstoffe (Commodities)
Traditionelle Beispiele für Rohstoffe sind Getreide, Fleisch, Gold, Öl oder Erdgas, also die drei großen Kategorien Landwirtschaftliche Produkte, Edelmetalle und Energie. In der heutigen Zeit werden diese Waren weltweit gehandelt und eine Warenbörse, wie die CME (Chicago Mercantile Exchange) in den USA, handelt sowohl mit physischen Waren, als auch mit Warenkontrakten und damit verbundenen Anlageprodukten. Wie aus meinem Artikel über Bitcoin-Hashprice Forwards bekannt, gibt es zwei gängige Formen von Warenkontraken: Futures und Forwards.
https://www.genexyz.org/post/18-block-761575-bitcoin-hashprice-forward-ks72ec/
💡Futures sind eine Form von Derivaten, die Parteien verpflichten, einen Vermögenswert zu einem vorher festgelegten zukünftigen Datum und Preis zu handeln. Hier muss der Käufer den Basiswert zum festgelegten Preis kaufen oder dem Verkäufer verkaufen, unabhängig vom aktuellen Marktpreis zum festgelegten Zeitpunkt der Abwicklung.
Forwards hingegen stellen eine ähnliche Form von Terminkontrakten dar, die auch einen zukünftigen Preis zu einem zukünftigen Datum festlegen, nur dass Forwards außerbörslich (OTC) gehandelt werden. Hinzu kommt, dass Forwards anpassbare Bedingungen haben, die zwischen den Parteien und dem Händler individuell vereinbart werden. Forwards sind im Gegensatz zu Futures nicht standardisiert.
Wie nun ersichtlich ist, muss eine Grenze zwischen dem direkten Handel mit Rohstoffen und dem Handel mit Rohstoff-gebundenen Titeln (digitale Rohstoffe) einerseits und Finanzprodukten ohne Bezug zu Rohstoffen andererseits gezogen werden, denn für den Rohstoffhandel sieht sich in den USA die CFTC (U.S. Commodity Futures Trading Commission) zuständig, die Futures- und Optionsmärkte reguliert, die dem Commodity Exchange Act unterliegen.
Die Kategorie der digitalen Rohstoffe ist relativ neu. Derzeit überwacht die CFTC die Regulierung für Derivate von Rohstoffen zusätzlich zu dem zugrunde liegenden Rohstoff selbst.
Wie also unterscheidet man, ob es sich bei einem Finanzprodukt, oder in unserem Fall einer Kryptowährung, um ein Wertpapier, oder um einen Rohstoff / eine Ware handelt?
Zunächst ist festzustellen, dass man nicht die gesamte "Anlageklasse" der Kryptowährungen als entweder oder einstufen kann. Wie bei allen Finanzprodukten muss im Einzelfall entschieden werden und das jeweilige Produkt im Einzelnen betrachtet werden. Es gibt kein "Krypto" oder "Kryptowährungen", sondern viele tausende Produkte, die sich grob einer Produktkategorie zuordnen lassen.
Der Howey Test
In den USA unterscheidet man zwischen Securities und Commodities mit Hilfe des Howey Tests. Der Test basiert auf einem Verfahren der SEC gegen W.J. Howey, bei dem zu einem Urteil kam, das diesen vierstufigen Test zum ersten Mal definierte. Seitdem wird die Klassifizierung von Investitionsobjekten durch die SEC, aber auch die CFTC und andere amerikanische Behörden anhand dieses Tests durchgeführt. Erfüllt ein Investitionsobjekt alle vier genannten Kriterien, handelt es sich dabei zweifelsfrei um Wertpapiere und unterliegt somit der Gerichtsbarkeit der SEC. Gemäß dem Urteil lautet der Test wie folgt:
- An investment of money
- In a common enterprise
- With the expectation of profit
- To be derived from the efforts of others
Auf deutsch bedeutet dies einfach, ob 1) eine Geldanlage 2) in einem gemeinschaftlichen Unternehmen, 3) mit einer Gewinnerwartung stattfindet und 4), ob diese Gewinne von den Bemühungen Dritter abhängen.
Anlageobjekte, wie Tokens, Coins, Assets, Cryptos, NFTs, Contracts, etc. bei denen diese vier Fragen alle im Positiven, also mit einem „Ja“, beantwortet werden können, werden als Wertpapier eingestuft und unterliegen damit den Regeln der SEC. Somit müssen Verantwortlichen, Initiatoren oder Geschäftsführer dieser Projekte die gleichen Genehmigungen einholen und Regeln befolgen, wie alle anderen registrierten Wertpapiere / Anbieter.
Anwendung auf Kryptowährungen
Wie schon erwähnt, kann man die Regeln nicht einfach anwenden, denn es gibt natürlich bei jedem Projekt, jeder Währung, jedem Coin viele Faktoren, die eine Rolle bei der Interpretation des Tests spielen. Bei den tausenden existierenden Projekten sind Bandbreite und Spektrum groß, was auch viel Raum für Interpretation offen hält. Bei der Einordnung jeder einzelnen Kryptowährung muss man also die Testfragen im Einzelfall auswerten und anwenden und somit sehen, wo man auf dem Spektrum landet. Regulatorisch gesehen am weitesten weg von Wertpapieren sind alle Kryptowährungen, die mit Hilfe von einem dezentralisierten Mining-Protokoll auf einer funktionierenden dezentralen Blockchain laufen. Das Mining ist ein wichtiger Aspekt, da Miner für ihre Arbeit / Investition von Ressourcen entlohnt werden, und damit nicht, wie Investoren bei ICOs oder anderen Verkaufsrunden, oder sogar bei Airdrops, von vorab produzierten Coins profitieren. Bei der Unterscheidung von Coins und Tokens müssen Coins im Einzelfall bewertet werden, wohingegen Tokens oft der Definition des Netzwerks oder Protokolls unterliegen, auf welchem sie beheimatet sind. Wenn ein Projekt dezentralisiert ist, ist es viel weniger wahrscheinlich als Wertpapier eingeordnet zu werden, da argumentiert werden kann, dass es sich bei dem Projekt nicht um ein gemeinschaftliches Unternehmen handelt.
Hier muss man natürlich auch wieder differenzieren, da viele Projekte sogenannte DINOs darstellen. Also Decentralized In Name Only sind, was oft auf einer geschickten Vermarktung des Produkts / Protokolls / Netzwerks basiert. Wenn also ein Protokoll / eine Blockchain ohne weiteres angehalten, neugestartet oder zentral gepatched (ich schaue dich an, Solana), oder gar zurückgedreht werden kann (du bist gemeint Ethereum), muss es einen Entscheidungsträger oder zumindest ein kleines Entscheidungsgremium geben, das als gemeinschaftliches Unternehmen gelten kann (sollte!).
Die Gewinnerwartung ist genauso auslegbar. Als einfaches Beispiel lässt sich hier Dogecoin heranziehen. Die Geschichte von DOGE ist tatsächlich sehr sehr unterhaltsam und einen kleinen Ausflug in die Abgründe des Internets wert, aber nicht jetzt. Kurz gesagt ist DOGE ein Meme-Token, geboren als Parodie auf Kryptowährungen und niemals als wirkliches Investitionsobjekt gedacht. Die ersten Käufer von DOGE hatten keine Gewinnerwartung, sondern wollten Teil einer Community von "Insidern" sein, einer Gruppe, die den Hunde-Witz versteht. Das Wachstum kann als organisch beschrieben werden, da es DOGE viele Jahre gab, bevor es zu dem wurde, was dann 2021 in dem kulminierte, was jeder kennt. Worauf ich hinaus möchte, ist dass es keine gemeinschaftliche Unternehmung gab, die dem Wert von DOGE zuträglich gewesen wäre und "Investoren" (sprich Internet-Kiddos und Meme-Trottel) nie eine wirkliche Gewinnerwartung hatten.
Einordnung von Bitcoin
https://x.com/Satsback/status/1617902548870127617
Das führt uns zu unserem geliebten allseits verehrten Freund, dem Rohstoff (oh nein, Spoiler-Alert) mit dem orangenen B-Logo. Wir wissen jetzt, dass die Anwendung des Howey-Tests einer im Einzelfall auszulegenden Beurteilung der vier Fragen bedarf. Dies ist nicht anders bei Bitcoin. Zu diesem Thema haben sich zum Glück schon viele prominente Personen geäußert, weshalb ich einige Interpretationen hier auslegen möchte:
https://www.cftc.gov/PressRoom/PressReleases/7231-15
Rostin Benham, der Vorsitzende der CFTC (☝️), stellte z.B. richtig fest, dass Kryptowährungen, je nach Ausgestaltung entweder als Commodity oder als Security klassifiziert werden können (ja Junge, wissen wir doch schon!). Darüber hinaus sagte er, dass er und seine Kollegen sich sicher wären, dass sowohl Bitcoin als auch Ethereum als Rohstoff einzuordnen sind, während andere Token vielmehr Wertpapiere darstellen.
Da der CFTC-Chef sowohl Bitcoin als auch Ethereum nicht als Wertpapier einstufen will, kann der Howey-Test eigentlich nicht für diese Entscheidung herangezogen worden sein. Denn wir haben ja schon gesehen, dass Ethereum am Test scheitert und sich somit recht leicht als Wertpapier einordnen lässt.
https://archive.ph/9vNAW
Auch die Vorsitzenden des Senatsausschusses der USA haben bereits Gesetze vorgeschlagen, die die Aufsicht über Bitcoin und Ethereum der Bundesbehörde CFTC übertragen würden, und somit Bitcoin als Rohstoff klassifizieren. Warum Bitcoin und Ethereum immer zusammen genannt werden und von anderen Währungen abgegrenzt werden, entzieht sich mir, aber immerhin schaffen diese geriatrischen Papageien die geistige Akrobatik zwischen verschiedenen Kryptowährungen zu differenzieren.
https://bitcoinmagazine.com/business/heres-whats-in-senator-lummis-bitcoin-bill
Auch US-Senator Lummis erklärte, dass Bitcoin, gegenüber jedem anderen Krypto-Vermögenswert, vollständig dezentralisiert ist und dass die Person oder die Gruppe (Satoshi) keine vorab erzielten Gewinne generieren. Im Gegensatz zu allen anderen Kryptowährungen, die von zentralisierten Personen oder Gruppen gesteuert sind und oft riesige Gewinne generiert haben. Cynthia versteht sogar den Unterschied in der Natur von Bitcoin und Ethereum.
Lummis Gesetzentwurf soll weiterhin ausschließen, dass Wertpapiere gleichzeitig als digitale Rohstoffe bezeichnet werden. Damit würden alle als Wertpapier gekennzeichneten Kryptowährungen in die Zuständigkeit der SEC fallen.
Auch SEC Oberhäuptling Gary Gansler, ehemaliger MIT-Professor für Blockchain-Technologie, digitale Währungen und Finanztechnologie, hält nur Bitcoin für eine Commodity und meint weiter auch, dass die meisten Kryptowährungsprojekte, die sich mit Wertpapieren befassen oder solchen ähneln, in den regulatorischen Zuständigkeitsbereich der SEC fallen sollten.
Während die meisten Kommentatoren die Einschätzung der oben genannten Repräsentanten unterstützen und somit deutlich wird, warum ein und für alle Male klar ist, warum Bitcoin und Kryptowährungen nicht das gleiche sind, gibt es einige Stimmen aus den USA, die meinen, dass die Einhaltung der geltenden CFTC-Vorschriften für viele Bitcoin-Startups zu kostspielig wäre, was dazu führen würde dass sich viele innovative US-Unternehmen gezwungen fühlen dürften, ihre Operationen ins Ausland zu verlagern.
https://decrypt.co/105693/sec-coinbase-lists-nine-crypto-tokens-securities
Bitcoin stellt also, im Gegensatz zu allen anderen Kryptowährungen, kein Wertpapier dar. Das macht Bitcoin einzigartig und deshalb kann man getrost sagen, dass Bitcoin keine Kryptowährung ist. Denn Bitcoin ist ein Rohstoff, der, wie alle anderen gehandelten Commodities, frei in der Natur vorkommt. Bitcoin ist ein digitaler synthetischer Rohstoff.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ 2063cd79:57bd1320
2024-12-04 12:10:13Meiner Meinung nach kann man in letzter Zeit eine deutliche Verlagerung bei der Benutzung bzw. dem Umgang mit Bitcoin feststellen. Vor einigen Jahren stand außer Frage, dass man zum Erwerb von Bitcoin auf Plattformen wie Binance, Coinbase oder Bitstamp gehandelt hat. Es gab ja auch kaum Alternativen. Der erste Wandel hat stattgefunden, als viele Nutzer//innen erkannt haben, dass Börsen keine gute Option bieten, um angesparte Bitcoin sicher zu verwahren. Viele Nutzer//innen haben daraufhin angefangen ihre Ersparnisse in Selbstverwahrung zu nehmen und/oder gänzlich auf Börsen zu verzichten und vermehrt auf Bitcoin-Only-Broker, wie Relai, Swan oder Pocket zu setzen.
Ein weiterer Trend lässt sich bei der Wahrnehmung von Privatsphäre feststellen. Während das Gros der Nutzer//innen früher weniger Wert auf non-KYC Lösungen gelegt und beim Kauf von Bitcoin bereitwillig persönliche Daten preisgegeben hat, machen sich mehr und mehr Menschen Gedanken darüber, wie sie schon den Erwerb von Bitcoin möglichst privat wie möglich gestalten, um zukünftigen Problemen aus dem Weg zu gehen. Denn wie wir ja wissen ist alles, was auf der Blockchain stattfindet, pseudonymisiert, aber keineswegs anonym.
Was bedeutet, dass wenn einmal eine Verbindung zu einer Adresse hergestellt ist, man z.B. nach einer Adresse suchen kann, um alle Transaktionen sowohl zu, als auch von dieser Adresse nachzuvollziehen. Das hat natürlich für viele ein gewisses "Geschmäckle". Doch ist der Erwerb von non-KYC Bitcoin (noch) nicht besonders nutzerfreundlich, mutet etwas zwielichtig an und birgt, gerade für viele nicht-so-Technologie-affinen Nutzer//innen, ein paar Stolpersteine. Oft erwerben auch viele ihre ersten bitcoins, weil sie auf schnellen Reichtum hoffen, einfach nur spekulieren wollen, oder von Freunden und Bekannten dazu überredet wurden und kümmern sich wenig um Privatsphäre, KYC vs. non-KYC, etc. Erst später befassen sie sich mit dem Thema Bitcoin intensiver und fallen dann in den sogenannten Bitcoin-Hasenbau (aka das Rabbit-Hole, das meines Erachtens nach der Honigdachsbau heißen sollte, aber naja) und haben Bitcoin in ihren Wallets und Cold-Storages, die sie nachträglich gerne etwas weniger öffentlich besitzen wollen. Zudem ist es Best-Practice für diejenigen, die Zahlungen in Bitcoin erhalten, diese erstmal von ihrer Transaktionshistorie zu säubern, denn man schreibt ja auch nicht auf jeden Geldschein beim Bezahlen seinen Namen und den Verwendungszweck drauf. Ein 10 Euro-Schein ist ein 10 Euro-Schein, egal ob dieser frisch aus der Bundesdruckerei kommt, oder ob dieser schon 100 Besitzer//innen gewechselt hat, dabei ein paar Runden in der Waschmaschine mitgemacht hat, genutzt wurde, um den Geruch von Spiegeln im Detail zu überprüfen, in Zigarettenautomaten überwintert oder sonstige Abenteuer erlebt hat.
Im Endeffekt steckt er in der Geldbörse und lässt sich zum aktuellen Tageskurs im Supermarkt der Wahl für ein Päckchen Butter eintauschen (ohne Wechselgeld), ohne dass nach seiner Reise gefragt wird. Warum sollte das bei Bitcoin Zahlungen anders sein? Zum Glück gibt es für alle oben genannten Szenarien eine relativ einfache Lösung: CoinJoins. Was das ist, wie sie funktionieren und was es zu beachten gilt, schauen wir uns diese Woche an.
Wie immer fangen wir mit der Erklärung einiger Konzepte an. Also, was sind CoinJoins?
Ein CoinJoin ist eine Form des Mixings. Dies ist eine On-Chain-Lösung, die entwickelt wurde, um das Problem der "Common-Input-Ownership-Heuristik" zu brechen. Vereinfacht ausgedrückt beschreibt dieses Problem die Annahme, dass mehrere Inputs einer Transaktion relativ sicher dem gleichen Besitzer gehören.
Um es deutlicher zu veranschaulichen zitiere ich einen früheren Artikel:
Ein ganz einfaches Beispiel: Wenn ich eine bestimmt Menge Bitcoin bei einer Börse erwerbe, bei der ich mich zuvor ausweisen musste, um die Dienstleistungen in Anspruch zu nehmen, und mir anschließend diese erworbene Menge Bitcoin auf meine Wallet überweise, um sie in Selbstverwahrung zu halten, ist es gewissen Teilnehmern möglich, meine Wallet zu identifizieren, bzw. mir zuzuordnen. Die Börse, und damit im Zweifelsfall auch ein Gericht oder ein Staat, kennen die Bitcoin-Adresse, die sie meinen Ausweisdaten zuordnen können. Die Transaktion und die damit verbundenen UTXOs sind damit auch mir zuschreibbar und die Wahrscheinlichkeit, dass ich Eigentümer der Zieladresse bin, ist auch sehr hoch - vor allem, wenn ich öfter Transaktionen von der Börsen-Adresse zu der gleichen Zieladresse ausführe. Dieses Verfahren wird auch Heuristik genannt und bedient sich wahrscheinlicher Annahmen, also z.B. wiederkehrender Muster.
Das Common-Input Problem geht noch eine Stufe tiefer, aber das lassen wir mal für einen Artikel über UTXOs übrig. Ein erweitertes Verständnis über UTXOs ist sicherlich ratsam, um das Konzept von Inputs und Outputs einer Transaktion besser zu verstehen, aber ich werde mir die größte Mühe geben, alles so einfach wie möglich darzustellen und ich glaube, dass es reicht zu verstehen, dass Transaktionen in der Blockchain historisch miteinander verknüpft sind. Diese Verknüpfung entsteht dadurch, dass die Outputs einer Transaktion immer die Inputs der nächsten Transaktion darstellen.
Dabei können viele kleine Inputs zu einem Output zusammengefasst oder große Inputs aufgeteilt werden, um kleine Outputs zu bedienen. Sobald es in dieser Transaktionskette ein Verbindungsstück in die "nicht-digitale" Welt, unser "echtes" Leben, gibt, kann jeder mit genügend Zeit und Ressourcen (wie Blockchain-Analyse Firmen) damit beginnen, diese Links herzustellen, indem sie das frei zugängliche Public-Ledger von Bitcoin beobachten und Verbindungen knüpfen.
CoinJoin hilft, dies zu verhindern. Und um den Artikel möglichst verständlich zu halten, werde ich im Weiteren erstmal von "Coins" sprechen, die im weitesten Sinne verbunden, also "gejoint" werden.
Wie also funktioniert ein CoinJoin?
Die Grundidee besteht darin, dass man einen Coin nimmt, der aus mehreren UTXOs besteht, und diesen einem Pool zuführt. Das ist in etwa so, als hätte man 10 Euro in Ein-Euro-Münzen im Portemonnaie und träfe sich mit 9 weiteren Fremden, die auch alle 10 Euro in Ein-Euro-Münzen haben. Nun werfen alle Beteiligten ihre Münzen in einen Topf und man erhält einen Topf mit 100 Ein-Euro-Münzen. Der Topf wird kräftig geschüttelt und jeder Beteiligte bekommt zufällig 10 Ein-Euro-Münzen zurück (der Einfachheit halber bekommt niemand eine Gebühr oder ein Honorar für den Service ausgezahlt). Niemand wird jemals in der Lage sein, die Ein-Euro-Münzen dem Portemonnaie zuzuweisen, aus dem sie dem Topf zugeführt wurden.
Ziemlich genauso funktionieren ConJoins, oder anders genannt Mixer. Es gibt eine Reihe von Diensten, bei denen man seine Coins zum Mixen an einen Pool senden kann. Diese Dienste erhalten für die Vermittlung, Zusammenführung und das Stellen der Infrastruktur eine kleine Gebühr. Namhafte Dienste sind z.B. Samourai’s Whirlpool oder Wasabi. Jeder dieser Anbieter hat - wie bei fast allem im Leben - seine Vor- und Nachteile. Zusätzlich zu den Mixing-Fees kommen natürlich auch die herkömmlichen Transaktionskosten.
Um bei Bitcoin zu bleiben, bedeutet dies, dass Transaktionen aufgebaut werden, die es Überwachungsfirmen oder anderen Beobachtern sehr schwer machen, genau zu wissen, welcher Transaktion-Output zu welchem der Input-Steller gehört. Das bedeutet keineswegs, dass Transaktionen gänzlich unsichtbar gemacht werden oder Inputs verschwinden, denn alles sitzt festgeschrieben und für immer einsehbar in der Blockchain. Allerdings können sich im besten Falle diejenigen, die Transaktionen beobachten oder nachverfolgen wollen, eine Reihe möglicher Szenarien ausdenken oder herleiten, um zu einem von vielen potentiellen Ergebnissen zu gelangen, wer welches Stück Bitcoin besitzt, jedoch kann man sich dessen niemals zu 100% sicher sein.
Alle Anbieter ähneln sich insofern, als dass sie gewisse Mixing-Beträge vorgeben. So kann man bei Samourai z.B. auswählen, ob man seine Coins in 0.01, 0.05 oder 0.5 BTC Pools mixen möchte. Hier kommt es natürlich darauf an, wie viel Vermögen/ Bitcoin gemixt werden soll. Wenn ich 0.5 Bitcoin mixen möchte, sollte ich natürlich nicht den 0.5 BTC Pool auswählen, sondern den 0.05 BTC Pool, da mir nach erfolgreichem Mixen 9 "saubere" UTXOs ausgehändigt werden. Warum nicht 10? Natürlich zahle ich ja auch für die Dienstleistung und für die Transaktion. Das heißt aber nicht, dass ich automatisch 0.05 BTC dafür zahle, sondern nur die Kosten (z.B. 2% der Pool Kosten + Transaktionsgebühren), der Rest der 0.05 BTC in diesem Beispiel würden mir als "unspent" zurück "überwiesen".
Diese Services bieten darüber hinaus auch an, die durch den Mixer generierten Coins im Mixer zu lassen, sodass sie über einen längeren Zeitraum weiter gemischt werden. Man stelle sich eine Waschmaschine vor, in der nur weiße Unterhosen derselben Größe und derselben Marke gewaschen werden. Nach jedem Waschgang nimmt man alle Unterhosen bis auf eine heraus und fügt neue, dreckige, gleiche Unterhosen derselben Größe und Marke hinzu. Die Wahrscheinlichkeit, die eigentlich dem ersten Waschgang hinzugefügte Unterhose zu finden, nimmt mit jedem Waschgang ab.
Man kann CoinJoins natürlich auch komplett selbstbestimmt und fernab von Anbietern durchführen. Das ist das Schöne bei Bitcoin, denn es gibt nichts, was man nicht selbst und selbstbestimmt machen kann. Alle Dienstleister und Anbieter von Services erleichtern den Nutzer//innen lediglich das Leben, indem sie die Netzwerke bereitstellen, die gewisse Unternehmungen einfacher machen und weiter streuen können, als es einem/einer einzelnen Nutzer//in jemals möglich wäre. Einen sehr guten und ausführlichen Guide hat zu diesem Thema der wichtige Arman veröffentlicht:
https://armantheparman.com/cj/
Jetzt habe ich natürlich einen groben Fehler begangen, indem ich CoinJoins und Mixer im gleichen Atemzug erwähnt, bzw. in austauschbarer Weise verwendet habe. Wenn man es ganz genau nehmen mag, ist CoinJoin die gewünschte Maßnahme, wohingegen ein Mixer der Dienstleister einer solchen Aktion ist. Generell sollte bei Anbietern von Diensten Vorsicht genossen werden, da in diesem spezifischen Fall der Dienstleister die UTXOs durcheinanderbringt und die vermischten Transaktionen eines anderen zurücksendet. Damit könnte der Dienstleister natürlich Informationen über genau die Datenpunkte erlangen, die es zu verschleiern galt. Zudem kommt hinzu, dass man seine Coins zunächst einem Custodian, also einem vertrauenswürdigen Dritten sendet, in der Annahme bzw. Hoffnung, dass man den eingezahlten Wert (minus der Gebühren) auch wirklich zurückbekommt.
Tamam! Jetzt habe ich also alle meine Coins von meiner Hardware-Wallet gejoint, zurück auf meine Hardware-Wallet, und habe im Endeffekt einfach nur weniger Sats als vorher, oder? Zusätzlich gab es schon Fälle, in denen Dienstleister (nicht die zuvor genannten) Nutzer//innen markiert haben, die zuvor von einem CoinJoin-Dienst gebrauch gemacht haben. Dementsprechend wussten diese Anbieter über die Herkunft der Coins Bescheid und konnten diese "blacklisten" und haben KYC-Informationen bereitgestellt. Dies führt dann dazu, dass andere Dienstleister solche Nutzer//innen und deren Transaktionen/Keys nicht mehr annehmen.
Darüber hinaus kann man sich die ganze Mühe des Mixens auch sparen, wenn man die gesamte Anzahl an gemixten Coins (UTXOs) wieder ausgibt, oder an ein anderes Wallet sendet (in einer Transaktion). Wie bei allen Themen im Bitcoin-Kosmos, gibt es auch hier wieder die Möglichkeit, sich tiefer mit der Materie auseinanderzusetzen, aber ich hoffe ich konnte einen guten Überblick über den Nutzen und die Funktionalität von Mixing Tools, spezifisch CoinJoins, vermitteln. CoinJoins sind, wie eingangs beschrieben, natürlich nur eins der Mittel, um Bitcoin-Transaktionen noch mehr zu pseudonymisieren, was dem Narrativ der Bitcoin-Gegner in die Karten spielt. Gleichzeitig sind Vorfälle, wie die Verhaftung von Entwicklern dieser Softwarelösungen (TornadoCash) nicht von der Hand zu weisen und Nutzer//innen haben ihre Konten bei gewissen Dienstleistern vorübergehend gesperrt bekommen, weil einige ihrer Transaktionen mit CoinJoin durchgeführt wurden. Jedoch sollte man sich gut überlegen, ob und wieviel man preisgeben möchte.
https://archive.ph/144G5
Wie bei allem ist die persönliche Einstellung zu Sicherheit und Privatsphäre der eigentliche Schlüssel. In einer Zeit, in der viele Menschen ihre Informationen bereitwillig im Internet preisgeben, haben sich viele daran gewöhnt, ihre "Sicherheit" auszulagern und anderen anzuvertrauen. Dies fängt bei Passwort-Managing Apps, wie LastPass an und hört bei Banken auf.
https://techcrunch.com/2022/12/22/lastpass-customer-password-vaults-stolen/
Allerdings muss man sich bewusst sein, dass eine digitale Währung im Internet und, wie im Falle von Bitcoin, auf einem öffentlich einsehbaren Ledger lebt. Wenn man Sicherheit in Form von Selbstverwahrung praktiziert, sollte man sich auch überlegen, ob den Schritt auch konsequent zu Ende gehen möchte und sein Erspartes zumindest so anlegt, dass es für Dritte möglichst schwierig ist, dieses auch öffentlich einsehen zu können.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ 37043134:0e04e271
2024-12-04 10:00:24Started writing, must ha ve auto wrapping on word boundaries, it does. Also spell checking. Follows a copy-paste:
Fine, since i cannot find the articles in procedure, or you pointed to the wrong ones?(procedure, not criminal code(these are all in my database), so i cannot be precise as to the technical matter of statute of limitations.
Make your appeal in as concise as possible and take a "hard" stance on the State Prosecutor: according to me the accusations i make are to crimes punishable by up to three years in prison, both the logging(State land, National Park(special purposes), and the appropriation(of State land). I think you are wrong there. They also are crimes to be prosecuted "ex officio" in case the appeal rejects the call to expiration of the statute of limitations?!
Secondly the parcel 413/2 was appropriated in part, that makes me a direct victim, contrary to a "whistle blower" as you hint at(the maps show this clearly), ...i am a whistle blower as to the appropriation of parcel 620, yes. So that makes me both.
The suspension of expiration of the statute of limitations, is according to me(again i do not have the articles and go by the text you sent me over viber), justified on multiple grounds: Tuzilac Bijelo Polje(), petition to the kadaster(), our official requests to the forestry services in Plav and Bjieljo Polje, the ongoing civil court case in Plav, repeat offenses(), the "consequences" of the crime still ongoing(danger of logging). Indeed we have a "strong" case.
It is not about the appeal resulting into sending the complaint to court, it is about documenting ourselves, so we have something to stand on in the future. Send me your draft in Montenegrin so i can assure myself that you take this head on. I insist you add my copy in English to the file you send of.
i regret you did not give me a print copy of the answer of the State Prosecutor, as i expected, you did not answer my repeat request earlier on as to the deadline to appeal, so you left me in "ignoramus" mode, which i have to pay now by being "un-briefed" on the specifics of the matter,
My compliment to the contrary for having set up your team, a permanent presence(your sister back-up here while away), that is expected, but still it is nice to see it done on your own initiative"(a copy-paste)
-
@ 7ec80607:128517c5
2024-12-04 09:11:51Landscaping is an essential part of creating a beautiful, functional, and harmonious outdoor environment. It not only enhances the aesthetics of a property but can also improve its value. The right landscaping design can transform a simple outdoor space into a sanctuary, combining elements like plants, trees, water features, and hardscaping to create an inviting and peaceful atmosphere. Below are 10 of the best landscaping examples that incorporate a variety of design elements, from stunning plant arrangements to innovative hardscaping features.
**1. Tropical Oasis Landscape ** A tropical oasis landscape features lush, vibrant greenery, colorful flowers, and often, water features like ponds or waterfalls. This style is perfect for creating a serene getaway right in your backyard. Key elements of a tropical oasis include: Lush Foliage: Use of large-leafed plants like banana trees, palms, and bamboo to create a dense, jungle-like atmosphere. Water Features: Adding a small pond or a bubbling water fountain can enhance the tropical feel, creating soothing sounds. Colorful Flowers: Brightly colored flowers like hibiscus, bougainvillea, and bird of paradise add pops of color. The lush greenery and vibrant flowers of a tropical oasis can bring a piece of the tropics to your home, ideal for those looking to create a vibrant, tranquil environment.
- Zen Garden Landscape Inspired by Japanese traditions, the Zen garden is designed to promote peace and mindfulness. These gardens often use minimalist design principles and focus on simplicity, harmony, and balance. Important elements of a Zen garden include:
Rocks and Gravel: The use of stones or gravel is a defining feature. Gravel is often raked into patterns to represent water or to mimic waves. Bamboo and Evergreens: Bamboo is a staple in Zen gardens for its calming and serene appearance. Evergreen trees, such as Japanese maples, are also commonly used to maintain year-round beauty. Water Features: While Zen gardens typically use dry landscapes, small, serene water features like fountains or small ponds can be added to introduce a sense of tranquility. Zen gardens are ideal for homeowners seeking a low-maintenance, minimalist landscape that focuses on tranquility and a sense of balance.
- Modern Minimalist Landscape The modern minimalist landscape design focuses on simplicity, clean lines, and functional design. It utilizes a restrained palette of plants and materials, making the most of space and emphasizing architectural features. Key elements include: Hardscaping: A minimalist landscape often incorporates large, geometric pavers, concrete walkways, and steel accents. Low-maintenance Plants: Choose a limited selection of low-maintenance plants such as succulents, grasses, and boxwoods. Open Spaces: The design tends to keep the lawn area open and unobstructed, with well-defined edges to enhance the simplicity. This design style suits contemporary homes and urban settings, providing a sleek, uncluttered look with a focus on clean lines and a structured environment.
- Cottage Garden Landscape A cottage garden creates a charming, whimsical, and cozy outdoor space filled with a mix of flowering plants and lush greenery. These gardens often evoke a sense of nostalgia and can make your garden feel like an English countryside retreat. Key features of a cottage garden include: Dense Planting: Layering plants such as roses, lavender, daisies, and geraniums in a loose, informal arrangement. Paths and Arbors: Winding paths made of natural materials like cobblestone or gravel, with arbors and trellises to support climbing plants like ivy and wisteria. Rustic Elements: Incorporating rustic furniture like benches, birdbaths, or vintage watering cans adds to the charm. Cottage gardens are ideal for those who want a vibrant, naturalistic garden that feels both personal and inviting.
- Desert Landscape Desert landscaping, or xeriscaping, is designed for dry climates and focuses on water conservation by using drought-tolerant plants and minimal water usage. This landscaping style can create a stunning, low-maintenance environment. Key features of a desert landscape include: Succulents and Cacti: These hardy plants, such as agave, aloe, and prickly pear, are central to desert landscapes. Gravel and Sand: The use of gravel, pebbles, and sand in place of grass creates a clean, open aesthetic and reduces water needs. Rock Features: Boulders and large stones can be incorporated to create visual interest and mimic natural desert formations. Desert landscaping is ideal for homeowners in arid climates, offering both beauty and efficiency while minimizing water usage.
**6. Formal Garden Landscape ** A formal garden is all about symmetry, structure, and order. These gardens often feature geometric shapes, carefully manicured plants, and neatly trimmed hedges. Key features of a formal garden include: Symmetrical Layout: Paths, hedges, and flowerbeds are arranged in precise patterns, often with a central focal point like a fountain or statue. Topiary and Hedges: Neatly trimmed hedges and topiary (shaped plants) add a sculptural element to the landscape. Classic Elements: Use of classical features such as statues, urns, and decorative vases enhances the formality of the design.
A formal garden is well-suited for large properties or historic homes, where precision and elegance are important.
**7. Coastal Landscape ** A coastal landscape embraces the relaxed, breezy feel of the beach and sea, often incorporating elements like salt-tolerant plants and open spaces. Key components of a coastal landscape include: Native Coastal Plants: Plants such as sea oats, beach grass, and dune lilies are ideal for coastal landscapes because they can thrive in salty, windy environments. Natural Stone: The use of large stones or driftwood can evoke the rugged beauty of the shoreline. Relaxed Layout: Coastal gardens tend to have a more informal, flowing design with wide open spaces and paths that blend seamlessly with the natural surroundings. This style is perfect for beachfront properties or those looking to bring the calming ambiance of the coast to their outdoor space.
**8. Woodland Garden Landscape ** Woodland gardens are designed to create a natural, forest-like environment, often under the canopy of large trees. These gardens offer a cool, shaded area full of texture and variety. Key elements include: Shade-loving Plants: Ferns, hostas, and primroses thrive in shaded environments and provide rich textures and colors to the garden.
Layered Planting: Woodland gardens often feature a variety of plant layers, with ground covers, shrubs, and trees creating a rich, natural composition. Natural Pathways: Winding, organic paths made from mulch, stone, or wood chips help maintain the natural feel of the garden.
Woodland gardens are perfect for areas with mature trees or shaded locations, offering a peaceful retreat with a focus on nature’s tranquility.
**9. Edible Landscape ** An edible landscape integrates functional food-producing plants into the garden, making it both beautiful and practical. These gardens focus on incorporating fruits, vegetables, herbs, and edible flowers into the overall design. Key features of an edible landscape include: Raised Beds and Containers: Raised garden beds, pots, or containers allow for easy cultivation of vegetables, fruits, and herbs.
Fruit Trees: Incorporating fruit trees like apple, pear, or citrus adds both beauty and function. Edible Flowers: Incorporating flowers like nasturtiums or lavender can provide color as well as culinary benefits.
Edible landscaping is ideal for those looking to combine aesthetics with sustainability, growing their own food while enhancing the beauty of their outdoor spaces.
**10. Water-Wise Landscape ** Water-wise landscaping focuses on creating beautiful outdoor spaces while minimizing water usage. This is especially important in regions where water conservation is a concern. Key features include: Drought-Tolerant Plants: The use of native plants that require less water, such as lavender, succulents, and yucca, is a key element. Efficient Irrigation Systems: Drip irrigation systems are commonly used to minimize water wastage while ensuring plants get the right amount of hydration. Mulching: Applying mulch around plants helps retain moisture, reduce evaporation, and keep the soil cool. Water-wise landscaping is ideal for homeowners in dry climates, providing an eco-friendly and cost-effective solution to maintaining a beautiful garden.
**Conclusion ** Landscaping offers an incredible range of possibilities to transform outdoor spaces into beautiful and functional environments. From tropical oases to formal gardens and water-wise landscapes, each type of landscape design brings its unique elements and benefits. Whether you are looking to create a peaceful retreat, a low-maintenance garden, or a functional space for growing your own food, the best landscaping examples provide inspiration and ideas to make your outdoor space truly spectacular. By selecting the right elements for your climate, lifestyle, and aesthetic preferences, you can create a garden that enhances both the beauty and value of your property.
-
@ e83b66a8:b0526c2b
2024-12-04 08:52:23When we had the Gold standard, gold only backed assets.
Now we are approaching the Bitcoin Standard, what will happen if Bitcoin is used to back debt?
$MSTR is the Alpha release
Trumps USA will be the Beta release.
If it works, the world has $315T of debt. That will be the full release V1.0
In comparison, the world has $454T of assets.
Can it be done?
What happens when you back a negative debt with a positive asset?
Has it ever been tried?
Is it possible?
The problem with the debt is it isn't "owed" to anyone.
If I lend you $10 you owe me $10.
To explain further:
If you lend me $10 worth of gold, then I can pay you back $10 of money if it's backed with gold - the gold standard.
If you lend me $10 worth of gold, and I pay you back with unbacked fiat, the repayment is arbitrary.
Like for like you can back any backed money with any asset.
Without a backed money, you can only repay an asset with an asset, otherwise paying with fiat, the global books don't balance.
In the current fiat world, if the US government print $10 and sells it to the market for $10 + interest, their is no creditor. You are simply diluting all other dollars.
When they have to pay back the debt to the “creditor”, they can't return the original $10 because that's been spent and they haven't generated any wealth (they are a government, not a company), so everything they return (the original lent $10 + interest) is printed again.
This is monetary recursion and destroys all fiat systems eventually.
So what happens when you insert a hard asset into the equation? Do you destroy or weaken that asset, you certainly don't strengthen it.
Does this turn Bitcoin into an inflationary currency despite its inherent deflationary properties.
After all, the U.S. had to come off the gold standard, because they didn't have enough gold to pay back.
I think best case scenario is Bitcoin repeats what happened to gold. It weakens Bitcoin until it makes it flacid, at which time the government will be forced to leave the Bitcoin Standard and Bitcoin will be a shadow of its potential.
Why?
Currency can be created and destroyed.
Money (the measure of wealth) is absolute.
I think this is the fundamental flaw, we believe money can be created and destroyed simply because we are used to printing or burning government fiat and have copied that model for Crypto currencies like Ethereum or Tether, which are mined or burned.
So money (invent better word) cannot be printed or destroyed, it is a measure of wealth and if you increase or decrease the supply you change the unit measurement, not the money.
So what are the potential end point valuations of Bitcoin?
Can Bitcoin approach a $21M coin valuation? i.e. 21M Coins at $21M?
If Bitcoin only backs assets, then it can't exceed, or even approach the total value of world wealth, currently $454T
At $21M for 21M coins, this approaches world wealth.
If Bitcoin is used to back debt, then you can add a further $315T of value, so if we assume $100T (about 1/4) of asset value + $300T of debt value, then we approach $21M per coin.
Another potential way of projecting the eventual stable price of Bitcoin:
If world wealth is currently around $454T
And world debt is currently around $315T
then can we consider it like a company and consider the profit to be $454T - $315T = $139T
Would that be a good expectation for final Bitcoin price?
i.e. $139T / 21M = $6.6M per BTC
However, I'm not certain Bitcoin can survive being used to back debt.
Gold never did that.
-
@ a012dc82:6458a70d
2024-12-04 06:10:01Table Of Content
-
The Challenge of Sustainability in Bitcoin Mining
-
Embracing Renewable Energy Sources
-
Optimal Location Selection
-
Energy-Efficient Hardware
-
Collaborative Mining Pools
-
Managing Operational Costs
-
The Rise of Green Certifications
-
Balancing Profitability and Environmental Responsibility
-
Conclusion
-
FAQ
Bitcoin mining, once an energy-intensive endeavor, has evolved significantly over the years. As the popularity of cryptocurrencies soared, so did concerns about its environmental impact. In this article, we will delve into the concept of sustainability in Bitcoin mining and explore how the industry is adapting to revenue constraints while being conscious of its ecological footprint.
The Challenge of Sustainability in Bitcoin Mining
The advent of Bitcoin brought about a revolutionary decentralized digital currency, empowering individuals and businesses to conduct transactions without the need for intermediaries. However, the process of mining Bitcoins, which involves solving complex mathematical algorithms to validate transactions, requires substantial computational power and energy consumption. This energy-intensive nature of mining has raised concerns about its environmental sustainability.
Embracing Renewable Energy Sources
In recent years, the Bitcoin mining community has taken significant strides towards embracing renewable energy sources. By transitioning from traditional fossil fuels to sustainable alternatives such as solar, wind, and hydroelectric power, miners aim to reduce their carbon footprint significantly. This shift not only addresses environmental concerns but also ensures long-term viability for the industry. By harnessing clean and renewable energy, miners can continue their operations without exacerbating environmental issues.
Optimal Location Selection
One of the critical strategies for sustainable Bitcoin mining is choosing the right location. Mining operations tend to thrive in regions with abundant renewable energy resources, enabling them to power their data centers efficiently. Countries with progressive policies promoting green energy have become attractive destinations for miners seeking sustainability. Selecting an optimal location ensures that miners can run their operations with minimal reliance on non-renewable energy sources, reducing their overall environmental impact.
Energy-Efficient Hardware
Advancements in technology have led to the development of energy-efficient mining hardware. Miners now have access to Application-Specific Integrated Circuits (ASICs) that offer better performance while consuming less power. By upgrading to these energy-efficient machines, miners can maximize their hashing power and revenue while minimizing energy consumption. Utilizing energy-efficient hardware is an essential step towards creating a sustainable mining ecosystem, where efficiency and profitability coexist harmoniously.
Collaborative Mining Pools
In an effort to enhance sustainability, miners are increasingly joining collaborative mining pools. These pools allow multiple miners to work together and share their computational resources, reducing individual energy consumption. Moreover, the pool's reward system ensures a more consistent income stream, mitigating revenue constraints. By pooling resources, miners can optimize their energy usage and achieve higher profitability, while also fostering cooperation within the mining community.
Managing Operational Costs
Sustainability in Bitcoin mining also requires effective management of operational costs. Energy expenses are a significant part of mining operations, so miners are constantly seeking innovative ways to optimize energy usage. Implementing smart energy management systems and adopting best practices in data center cooling are some of the approaches employed to reduce costs. Efficient cost management not only improves a miner's bottom line but also contributes to overall sustainability by minimizing resource wastage.
The Rise of Green Certifications
To prove their commitment to sustainability, several mining companies now seek green certifications. These certifications authenticate that a mining operation is using a substantial portion of renewable energy, providing transparency and building trust among investors and stakeholders. Green certifications serve as a testament to a miner's dedication to reducing their environmental impact, which can attract socially responsible investors and customers. As the demand for environmentally conscious practices grows, green certifications become a valuable asset for sustainable mining businesses.
Balancing Profitability and Environmental Responsibility
While sustainability is a priority, miners must also navigate revenue constraints in a highly competitive market. Striking a balance between profitability and environmental responsibility remains a challenge. However, the industry's evolution towards sustainability demonstrates its commitment to minimizing its ecological impact. Miners face the delicate task of maximizing revenue while adopting environmentally friendly practices. By continually innovating and optimizing operations, miners can secure their financial viability while contributing to a greener and more sustainable future for Bitcoin mining.
Conclusion
Sustainability in Bitcoin mining is no longer an afterthought but a crucial aspect that miners are actively pursuing. By embracing renewable energy sources, optimizing hardware, and employing collaborative approaches, the industry is adapting to revenue constraints while mitigating its environmental footprint. As technology continues to advance, it is likely that Bitcoin mining will become even more sustainable, ensuring the longevity of this groundbreaking digital currency for generations to come.
FAQ
What is sustainability in Bitcoin mining? Sustainability in Bitcoin mining refers to adopting practices and technologies that reduce the environmental impact of mining operations while ensuring long-term viability for the industry.
How are miners embracing sustainability? Miners are embracing sustainability by transitioning to renewable energy sources, using energy-efficient hardware, joining collaborative mining pools, and optimizing operational costs.
Why is renewable energy important for Bitcoin mining? Renewable energy is vital for Bitcoin mining as it significantly reduces the carbon footprint associated with energy-intensive mining operations, promoting environmental responsibility.
What are collaborative mining pools? Collaborative mining pools are groups of miners working together and sharing their computational resources to improve efficiency and achieve a more consistent income stream.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 502ab02a:a2860397
2024-12-04 01:37:46ผมไถ tiktok ก่อนนอนตามประสาคนเสพแสงฟ้า 555 พบว่ามีไวรัลอาหารเช้าแบบนึง ที่มีคนทำคลิปกันเยอะพอสมควร ชื่อว่า Balkan Breakfast ก็อดสงสัยไม่ได้เลยกลายเป็นว่า ต้องไถหาข้อมูลเพื่อทำความเข้าใจ จนมาสรุปย่อให้เพื่อนๆที่อาจสงสัยเหมือนผม ได้อ่านกันขำๆไว้ด้วยครับ ออกตัวไว้ก่อนว่า ผมไม่ใช่ชาวบอลข่าน จึงไม่ได้รู้ดีแบบลึกซึ้งนะครับ
เรื่องมีอยู่ว่าในแถบคาบสมุทรบอลข่าน (Balkan Peninsula) ที่เต็มไปด้วยวัฒนธรรมและประวัติศาสตร์อันยาวนาน อาหารเช้านั้นจึงถือเป็นสิ่งสำคัญที่สะท้อนเอกลักษณ์ท้องถิ่นได้อย่างชัดเจน Balkan Breakfast คืออาหารเช้าที่ผสมผสานความเรียบง่ายและวัตถุดิบธรรมชาติไว้อย่างลงตัว ซึ่งในแถบบอลข่านครอบคลุมพื้นที่หลากหลาย เช่น เซอร์เบีย บัลแกเรีย โครเอเชีย และมาซิโดเนีย อาหารเช้าในภูมิภาคนี้ได้รับอิทธิพลจากทั้งวัฒนธรรมออตโตมัน ยุโรปตะวันออก และกรีก ตัวอย่างเมนูที่มักพบในอาหารเช้าแบบ traditional นี้มักจะประกอบไปด้วย - Burek: แป้งฟิโลสอดไส้เนื้อ ชีส หรือผักโขม - Kajmak: ครีมชีสที่มีรสชาติเข้มข้น มักทานคู่กับขนมปัง - Ajvar: ซอสพริกหยวกแดงและมะเขือยาว มีรสชาติกลมกล่อม - Proja: ขนมปังข้าวโพดที่นิยมเสิร์ฟพร้อมโยเกิร์ต - ผักสด: เช่น แตงกวา แตงกวาดอง Bell Pepper มะเขือเทศ หรือ หัวหอมใหญ่ เพิ่มความสดชื่นและสีสันให้จานอาหาร
อธิบายอาหารเพิ่มเติมเพื่อให้เห็นภาพนะครับ Burek (บูเร็ก) คือขนมอบที่มีต้นกำเนิดจากแถบบอลข่าน โดยเฉพาะในประเทศตุรกี, เซอร์เบีย, บอสเนีย, มาซิโดเนีย และประเทศอื่นๆ ในภูมิภาคนี้ Burek เป็นขนมอบที่ทำจากแป้งฟิโล Burek มีหลายรูปแบบ โดยทั่วไปจะทำเป็นพายหรือม้วน ขึ้นอยู่กับการห่อหรือจัดรูปทรง โดยส่วนใหญ่จะใช้แป้งฟิโลห่อไส้ให้เป็นชั้นๆ แล้วนำไปอบจนได้ความกรอบและสีน้ำตาลทอง ไส้ของ Burek สามารถมีได้หลากหลายชนิดเช่น บูเร็กไส้เนื้อวัวหรือเนื้อแกะ บูเร็กไส้ชีสโดยมักใช้ชีสเฟตาหรือชีสมอสซาเรลล่า ไส้ผักที่ใช้ผักโขมหรือมันฝรั่ง หรือบางทีก็ไส้ผสมกันไปเลยครับ เนื้อกับชีส เนื้อกับผัก ชีสกับผัก เอาจริงๆก็แล้วแต่สะดวก
ส่วนแป้งฟิโล (Phyllo Dough) นั้นเป็นแป้งชนิดหนึ่งที่ใช้ในอาหารหลากหลาย โดยเฉพาะในอาหารเมดิเตอร์เรเนียนและแถบบอลข่าน ลักษณะเด่นของแป้งฟิโลคือความบางเหมือนกระดาษและความยืดหยุ่น มักใช้เป็นชั้นๆ ซ้อนกันในเมนูที่ต้องการความกรอบเมื่ออบหรือทอด ต่างจากแป้งพัฟ (Puff Pastry) ที่มีไขมันผสมในเนื้อแป้ง แป้งฟิโลมักใช้น้ำมันหรือเนยทาแยกแต่ละชั้นเพื่อเพิ่มความกรอบ ส่วนประกอบของแป้งฟิโลจะมี แป้งสาลี น้ำ เกลือ
Kajmak (อ่านว่า ไค-มัก หรือ คาย-มัก) เป็นผลิตภัณฑ์นมชนิดหนึ่งที่มีต้นกำเนิดจากแถบบอลข่านและคอเคซัส นิยมใช้ในอาหารหลากหลายประเภททั้งในเซอร์เบีย บอสเนีย มอนเตเนโกร ตุรกี และประเทศใกล้เคียง Kajmak คือ ครีมชีสดั้งเดิมทำจากนมดิบ เช่น นมวัว นมควาย หรือนมแพะ ที่มีลักษณะคล้ายครีมหนาและเนย อุดมไปด้วยไขมันและมีรสชาติที่นุ่มละมุน บางครั้งจะมีรสเปรี้ยวเล็กน้อยเนื่องจากกระบวนการหมัก เนื้อสัมผัสนุ่มคล้ายครีม มีความมันสูง
Ajvar (อ่านว่า ไอ-วาร์ หรือ อัย-วาร์) เป็นเครื่องจิ้มและเครื่องเคียงที่มีต้นกำเนิดจากภูมิภาคบอลข่าน โดยเฉพาะในประเทศเซอร์เบีย มาซิโดเนีย และประเทศรอบๆ Ajvar เป็นที่นิยมในอาหารท้องถิ่นและมักเสิร์ฟคู่กับขนมปัง เนื้อย่าง หรืออาหารประเภทอื่นๆ Ajvar นั้นทำมาจาก พริกหวานแดง (Red Bell Pepper) เป็นส่วนผสมหลัก บางสูตรอาจเพิ่ม มะเขือยาว และ กระเทียม เพื่อเพิ่มรสชาติ มีเนื้อสัมผัสที่เนียนละเอียดหรือหยาบเล็กน้อย แล้วแต่สูตรครับ วิธีทำ Ajvar คือ ย่างหรืออบพริกหวานและมะเขือยาว เพื่อให้ได้กลิ่นหอมและรสชาติที่เข้มข้น จากนั้นปอกเปลือกเอาเปลือกที่ไหม้ออกเพื่อความนุ่มเนียน แล้วจึงนำไปบดหรือปั่นส่วนผสมจนได้เนื้อที่ต้องการ จบด้วยการผัดในน้ำมันเคี่ยวส่วนผสมทั้งหมดในน้ำมันจนเข้ากันดี Ajvar มี2แบบคือ แบบหวาน (Sweet Ajvar) จะไม่มีพริกเผ็ด รสชาติเข้มข้นแต่ไม่เผ็ด แบบเผ็ด (Hot Ajvar) จะใส่พริกเผ็ดหรือพริกป่นเพื่อเพิ่มความเผ็ด
Proja (โปรยา) เป็นขนมปังที่อร่อยและสะดวกในการทำ เป็นทางเลือกที่ดีในการรับประทานอาหารประเภทขนมปังที่แตกต่างจากขนมปังสไตล์ตะวันตกที่เราคุ้นเคยกัน โดยเป็นขนมปังข้าวโพดหรือขนมปังประเภทแป้งข้าวโพดที่มีต้นกำเนิดจากแถบบอลข่าน โดยเฉพาะในประเทศเซอร์เบีย, มาซิโดเนีย, บอสเนีย และโคโซโว Proja มักเสิร์ฟเป็นอาหารข้างเคียงกับจานหลัก เช่น เนื้อย่าง ไส้กรอก หรือ ซุป หรือเสิร์ฟกับ โยเกิร์ต และ ชีส สำหรับมื้อเช้า บางครั้งก็จะมีการใส่สมุนไพรหรือชีสลงไปในเนื้อขนมปังเพื่อเพิ่มรสชาติ ลักษณะของ Proja นั้นจะเป็นขนมปังที่มีความหนานุ่ม เนื้อแน่น และมักจะมีรสชาติหวานนิดๆ หรือเค็ม ขึ้นอยู่กับสูตรและการปรุง มีรสชาติคล้ายขนมปังข้าวโพดแบบดั้งเดิม แต่เนื้อสัมผัสจะมีความเบากว่า
มื้อเช้าสไตล์บอลข่านมักจัดอย่างเรียบง่ายแต่เต็มไปด้วยรสชาติและคุณค่า โดยมีเครื่องดื่มเสริม เช่น กาแฟหรือชาสมุนไพร หรือโยเกิร์ต ส่วนบางคลิปใน tiktok จะเห็นว่ามีการดื่มน้ำมันมะกอก หรือ เอาขนมปังจิ้มน้ำมันมะกอกด้วย อันนี้เท่าที่หาข้อมูลมา ยังไม่ปรากฎว่ามีใน balkan breakfast แบบทั่วไปนัก น่าจะเป็นการประยุกต์ในยุคนี้ครับ เพราะวัตถุดิบจะใกล้เคียงกับเมดิเตอเรเนียนไดเอท รวมถึงน้ำมันมะกอกถือเป็นส่วนสำคัญของอาหารในแถบนี้ เนื่องจากพื้นที่บอลข่านบางส่วน เช่น แอลเบเนีย โครเอเชีย และมอนเตเนโกร มีการปลูกมะกอกคุณภาพสูง น้ำมันที่ได้จึงเป็นน้ำมันมะกอกบริสุทธิ์ (Extra Virgin Olive Oil) ซึ่งมีรสชาติและกลิ่นเฉพาะตัว
ใน TikTok นั้น Balkan Breakfast เป็นไวรัลคลิปได้ง่าย เพราะการถ่ายทำแบบ ASMR ที่เน้นเสียงการกินที่ดังกว่าปกติ ทำให้ดึงดูดสายตาให้หยุดดูคลิปได้ง่าย บนโต๊ะประกอบกับผักสดต่างๆเช่น แตงกวา Bell Pepper และหัวหอมใหญ่ ที่จัดเรียงบนจานร่วมกับชีส โยเกิร์ต ส่วนของบางอย่างอาจใช้ของทดแทนแบบง่ายๆเช่น ขนมปัง หรือบาแกต แทน Burek ซอสมะเขือเทศ แทน Ajvar
การกลับมาเป็นที่นิยมของ Balkan Breakfast ใน TikTok ช่วยให้วัฒนธรรมบอลข่านนี้เผยแพร่ไปทั่วโลก พร้อมแสดงให้เห็นว่าอาหารเช้าแบบ traditional สามารถผสมผสานกับไลฟ์สไตล์ยุคใหม่ได้อย่างลงตัวอยู่เหมือนกัน
บางกรณีก็บอกว่า Balkan Breakfast เป็นมื้ออาหารที่ช่วยกระตุ้นการทำงานของโพรไบโอติกส์ เนื่องจากมีโยเกิร์ตและผักต่างๆและซอสที่มีคุณสมบัติพรีไบโอติกส์รวมเข้าด้วยกัน
บางกรณีก็บอกว่าเป็นแค่แฟชั่นฉาบฉวย กินแบบไม่ตรงต้นฉบับ ต้องการแค่ของมากองๆหน้าจอแล้วกัดให้ดังๆ ซู้ดให้มีเสียงเพื่อเรียกยอดวิว
ก็เรื่องอาหารจะเช่นเดิมครับ ผมมองว่าไม่มีผิดไม่มีถูก สำหรับผมแล้วมองว่า การกินแยกกันทีละคำแบบนี้ ถ้าจับอย่างละนิดหน่อยมารวมกัน ในชิ้นเดียวก็แซนวิชดีๆนี่แหละครับ enjoy การกินแบบไหนก็แบบนั้นไปได้เลยครับ คนเรากินตามที่ชอบที่ชอบอยู่แล้วครับ คิดมากฉี่เหลือง ถ้ามองสารอาหารกรณีที่ไม่ได้ limit คาร์บ ก็ถือว่าเป็นมื้ออาหารที่ไม่แย่ กรณีถ้ามีไส้กรอกก็พยายามดูตัวที่ไม่ได้อุตสาหกรรมมาก ส่วนถ้าใคร limit คาร์บก็พึงระวัง เพราะคาร์บหนักพอสมควรเนื่องจากเน้นการให้พลังงานครับ
bon appétit
#กูต้องรู้มั๊ย #PirateKeto #siripun
-
@ ae6ce958:d0f02c7d
2024-12-03 23:55:48As blockchain technology continues to revolutionize industries, regulatory compliance remains a key concern for businesses engaging in token sales. For DamageBDD, an Australian-registered business offering Damage Tokens, compliance with Australian laws is critical. This article explores why DamageBDD cannot sell Damage Tokens without implementing Know Your Customer (KYC) protocols.
Regulatory Landscape for Token Sales in Australia
In Australia, the regulation of digital assets is governed by the Corporations Act 2001 and overseen by the Australian Securities and Investments Commission (ASIC). Additionally, businesses handling digital currencies or assets may fall under the scope of the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (AML/CTF Act), enforced by AUSTRAC (Australian Transaction Reports and Analysis Centre).
The classification of a token—whether as a utility, payment, or security token—determines the regulatory requirements. However, even utility tokens can trigger KYC obligations depending on their functionality and how they are sold.
Legal Obligations for DamageBDD
As a registered Australian business, DamageBDD must comply with the following legal and regulatory requirements:
- Anti-Money Laundering (AML) and Counter-Terrorism Financing (CTF) Laws
If Damage Tokens are traded for fiat currency or cryptocurrencies (e.g., Bitcoin), the transactions may fall under the definition of "designated services" in the AML/CTF Act. This classification requires businesses to:
Register with AUSTRAC.
Conduct customer identification and verification (KYC).
Report suspicious transactions and large cash transactions to AUSTRAC.
Failure to comply with these requirements can result in significant fines or legal action.
- Securities and Investment Laws
If Damage Tokens are deemed to have characteristics of financial products (e.g., offering investment returns or being tradable on secondary markets), they may be classified as securities under the Corporations Act 2001. Selling such tokens would require:
KYC compliance.
Licensing as an Australian Financial Services (AFS) provider or operating under an authorized exemption.
Even if the tokens are marketed as utility tokens, their classification can change based on how they are used, sold, or perceived in the market.
Risks of Selling Without KYC
Selling Damage Tokens without KYC exposes DamageBDD to significant legal and reputational risks:
-
Regulatory Breaches: If regulators determine that Damage Tokens fall under AML or securities laws, selling without KYC could result in penalties or the suspension of business operations.
-
Enabling Illegal Activities: Without KYC, there is a higher risk of tokens being used for money laundering, terrorism financing, or other illicit purposes.
-
Loss of Market Confidence: Non-compliance can damage trust with customers, partners, and investors, hindering the long-term success of DamageBDD.
The Importance of KYC for DamageBDD
Implementing KYC is not just about regulatory compliance; it also enhances the credibility and security of DamageBDD:
Protecting Customers: Ensures that tokens are used by legitimate individuals and businesses.
Building Trust: Demonstrates DamageBDD's commitment to ethical business practices.
Future-Proofing the Business: Prepares DamageBDD for evolving regulations, minimizing the risk of operational disruptions.
Steps for Compliance
To comply with Australian laws, DamageBDD can take the following steps:
-
Token Classification: Work with legal experts to confirm whether Damage Tokens are utility, payment, or security tokens.
-
AML/CTF Registration: Register with AUSTRAC and implement AML/CTF protocols.
-
KYC Process: Use digital identity verification tools to streamline KYC for token buyers.
-
Legal Advice: Continuously engage with legal advisors to stay updated on regulatory changes.
Conclusion
As a registered Australian business, DamageBDD operates in a regulatory environment that prioritizes transparency and the prevention of financial crimes. Selling Damage Tokens without KYC would not only breach Australian laws but also compromise the integrity and sustainability of the DamageBDD project. By embracing KYC and ensuring compliance, DamageBDD can establish itself as a trusted player in the blockchain industry, unlocking long-term growth and success.
AU #Compliance #Regulations
-
@ bc6ccd13:f53098e4
2024-12-03 22:59:45It is well enough that people of the nation do not understand our banking and monetary system, for if they did, I believe there would be a revolution before tomorrow morning.
-Henry Ford
A century later, this quote is still as true as the day it was written. And with all the information available at our fingertips, the overwhelming majority still haven't educated themselves on the function of the banking system. That's a tragedy, given the significant role banking plays in the modern economy, and the corruption at the very base of the industry.
Banking is built on a lie. It's a big lie. Not in the sense of how false it is, but in the sense of the harm caused. It's more of a “weasel words” type of lie, a lie of omission and misdirection, the kind of lie a sleazy lawyer would use to get a guilty client off the hook. My goal is to explain, as clearly as possible, how the modern banking system works. Why you should care will be a topic for another day.
I want to start off with a big thank you to whoever created the website https://banklies.org/. If you aren't familiar with this gem, bookmark it now. There's no better place on the internet to get detailed documentation on this particular subject. Everyone should spend an afternoon reading and listening to the information there. You'll never be able to see the world the same way if you absorb it and understand the implications.
Where Does Money Come From?
There's been a lot of talk since the COVID “pandemic” and associated QE deluge about the Fed and their money printing. Most people have some awareness that “the Fed prints money and that causes inflation.” There's some truth to that idea, but it also misses the real story. Most people don't understand that when someone says “money printing,” the correct response is “which kind of money?”
Banks operate by calling two different things “money,” and hoping everyone treats them the same. The average person might say “I have $100 in my wallet” or “I have $100 in my bank account” without realizing they aren't talking about the same thing at all. They might take the $100 in their wallet and “put it in the bank” without realizing that as soon as they do, that $100 becomes something else entirely.
The $100 bill in your wallet has the words “Federal Reserve Note” printed on it. This is one form of what's known as “base money.” Base money exists in two forms, cash and bank reserves. You can think of bank reserves as electronic cash that only banks can use.
Base money is created by the Federal Reserve. Creating base money is what the Fed does when they “print money.” They create bank reserves electronically by putting the numbers in the ledger at the Fed. The cash is printed by the Treasury, but that's just a technicality, it's printed at the request of the Fed.
The current circulating supply of cash is $2.3 trillion, and bank reserves are about $3.5 trillion. However, if you look at the total amount of US dollars, including money in people’s bank accounts, it’s currently $20.8 trillion dollars. So if base money is $5.8 trillion in total, what is the other $15 trillion? Well, it’s largely made up of bank deposits. So where do bank deposits come from? It can’t be cash people deposit into their accounts, like you might expect from the name, since cash only totals $2.3 trillion and bank deposits are over 6 times larger. The answer is that banks create them.
So as you can see, the largest category of dollars aren’t “printed” by the Fed, they’re created by the banks. And the way banks create dollars is so simple, it almost doesn’t seem real. Banks create money by making loans.
This seems completely counterintuitive to the way most people imagine banks work. That’s understandable, since the way banks work has almost no relation to the way individuals handle their own finances. You might make a loan to someone. Your friend asks to borrow $20 at the restaurant since he forgot his wallet at home. You pull yours out and hand him a $20 bill. In order to make that loan, you had to go to work, accomplish something, get paid, and save that $20 in your wallet. You couldn’t spend the $20, and you can’t spend it now until your friend pays back the loan. Obviously no new money was created to make that loan, work was done and money was saved and then given to the borrower so he can spend it instead of the lender.
Most people assume banks work the same way. They assume that when they deposit some money at the bank, the bank stores that money in a vault somewhere with their name on it. And they assume that when banks make loans, they take some money from a big pile of money stored in a vault somewhere and give it to the borrower. But that isn’t how it works at all.
When someone goes to the bank for a loan, the bank doesn’t draw on some pile of cash they have saved up somewhere. Instead, they use a simple accounting trick. They create a bank account for the borrower, and they type the amount of the loan into the borrower’s account balance. It’s really that simple. That balance becomes a “bank deposit.” Even though that money was never deposited in the bank, and in fact didn’t exist at all until the bank typed those numbers into the computer, it’s still called the same thing as the money you deposit into the bank when you get your paycheck.
So what is a bank deposit? It’s really a promise by the bank to give the account holder money. If you have $100 in your bank account, you expect to be able to go to the bank and withdraw that $100 in cash from your account and put it in your pocket. Remember, that $100 bill is base money, something completely different from the bank deposit in your savings or checking account. The implicit promise by banks is that any money in your bank account, any bank deposit, is as good as cash and can be exchanged for cash at any moment.
But of course that must be a lie, since there are $15 trillion of bank deposits and only $2.3 trillion dollars of cash. That means if everyone in the US went to the bank tomorrow and tried to withdraw their money in cash, the banks would run out of cash while still owing $12.7 trillion dollars to depositors. It’s actually much worse than that, since a lot of the cash is already in peoples’ pockets, much of it circulating in foreign countries outside the US. Banks only hold around $100 billion in their vaults on any given day. So if everyone tried to withdraw their money from their bank accounts, which banks have implicitly promised they can do, each person could get around $0.007 of every dollar on deposit. That’s less than one cent of every dollar. So the promise banks are built on, the promise to give you the money in your account, turns out to be at least 99% a lie.
So how can it continue like this? How do banks keep operating with so little cash and so many promises to give cash? Why does anyone put money in the bank when they keep less than a penny of every dollar you deposit available to withdraw when you need it? The answer is, banks don’t tell you that. And if nobody knows, people won’t all come asking for their money one day. If they did, all the banks would fail instantly. So they do anything in their power to keep that from happening.
How Do Bank Deposits Work?
The reason most people never question the function of their bank, is that banks do everything possible to make their dishonest “bank deposits” function the same as cash, and actually better than cash in a lot of ways. Instead of having to withdraw cash from your bank and give it to someone, you can just exchange bank deposits. You can do this in a lot of super convenient ways, like writing a check or using a debit card, or more recently even right from your smartphone with an app like Venmo or CashApp. This is very convenient for the customer, and even more convenient for the bank. When you pay someone else using your bank deposit, all they have to do is lower the number in your account and raise the number in the other person’s account by the amount of the transaction. Quick, easy and convenient for everyone involved.
And if you happen to be paying someone who doesn’t have an account at your bank, that’s no problem either. Your bank will just pay the other person’s bank, and they can then change the number in the other person’s account. Now of course banks want real money for their transactions, not the fake bank deposits the commoners use. Remember the bank reserves I mentioned earlier that are like cash for banks only? Well that’s how banks settle transactions between themselves. All banks have an account at the Fed, and the Fed settles up between banks by changing the number of bank reserves in their respective accounts at the Fed. In essence, the Fed is just a bank for banks, another entity that works just like your local bank, but only holds accounts with banks and governments and not with ordinary people.
This convenience discourages people from withdrawing cash from their bank, since it’s actually easier to use the bank deposits than the cash. Besides that, banks use a lot of arbitrary policies to make it difficult for people to withdraw cash, even if they want to. If you didn’t know that, you’ve probably never tried to take $5,000 in cash out of your bank account. If you do, you’ll probably be asked some irrelevant questions about what you plan to do with the money. That’s if they let you withdraw it at all. Ask for $20,000 and you’ll almost certainly have to schedule an appointment to withdraw it in a few days, after the next cash delivery comes in. Most community bank branches only keep around $75,000 in cash on hand at any given time, so you can see how few withdrawals it would take to completely drain their vault.
But increasingly now, the biggest threat to banks isn’t from people withdrawing cash, it’s from people withdrawing to a different bank. Remember, banks have to settle with each other at the end of the day. And since they won’t accept each other’s sketchy “bank deposits” in payment, they have to settle by transferring balances between their respective reserve balances at the Fed. As you can see, banks have loaned into existence $11.5 trillion more in bank deposits than they hold in bank reserves, so it doesn’t take much withdrawal from one bank to drain their reserve balance to zero and cause the bank to fail. Bank runs have been a recurring problem ever since the entire dishonest fractional reserve banking system began, and even in 2023 a few US banks suffered bank runs and collapsed in some of the biggest bank failures in history.
Why Banking is Legalized Theft
Now that we’ve explained on the most basic level how banks work, let’s briefly explore a few basic implications.
We’ve established that banks create money when they make a loan. How easy would your life be if you could create money at no cost and loan it to people? Is it any wonder that the financial industry is full of extremely wealthy individuals?
Let’s think through for a second why I would categorize what banks do as theft. First off, you need to understand what money is, and more importantly what it is not. I lay out some fundamental principles in this article.
naddr1qvzqqqr4gupzp0rve5f6xtu56djkfkkg7ktr5rtfckpun95rgxaa7futy86npx8yqq247t2dvet9q4tsg4qng36lxe6kc4nftayyy89kua2
Summarized in one sentence, money is a ledger of productive effort with deferred consumption. It represents work someone did for another person, instead of for their own benefit. In a sense, it’s an abstract representation of, or a claim on, the wealth in a society. Having money indicates that you provided value to someone else in the past, and therefore deserve to receive value from someone in the future if you choose to exercise that claim.
Anyone who has money can loan that money to someone. This is a transfer of your claim on wealth to that person. They can then use the money to buy something, and benefit from that loan. But with that type of loan, there is always a tradeoff. The tradeoff is what’s called opportunity cost. While you have the money, you have the option to exercise that claim at any time and buy something you want. If you loan the money to someone, you incur the cost of giving up that option for as long as it takes until the loan is repaid. You already put in the effort to create the wealth that money represents, now you’re sacrificing your opportunity to benefit from that effort by buying something you want.
Bank loans are different. There is no opportunity cost. The bank doesn’t have the money to begin with, because they haven’t put in any effort or created anything of value to deserve it. They just create the money out of thin air. There is no sacrifice on the part of the bank to make that loan possible. They don’t have to forego spending any money to make the loan because the money didn’t exist in the first place.
So when the bank creates money, they’re creating new claims on wealth. Since the bank hasn’t created any wealth, the claims must be claims on wealth that already exists. These new claims have no immediate effect on the people who hold that wealth. Nothing changes for them, the wealth they hold is still theirs as long as they don’t exchange it for money. As long as they don’t sell their wealth, the increase in claims on that wealth changes nothing.
The people who are negatively effected by this increase in money are those who already have money. Since money is a claim on wealth, the value of each unit of money equals [amount of wealth in existence] divided by [amount of money in existence]. Since the amount of wealth has not changed, but the amount of money has increased, the value of existing money falls. More money spread out over the same amount of wealth means each unit of money will buy less wealth. This is what everyone knows as inflation, and as everyone who has experienced it knows, the money they hold as savings or receive as income becomes less valuable the more inflation occurs.
Who benefits from this? Well, the borrower may benefit in some cases. They receive the newly created money and are able to spend it and acquire wealth they haven’t yet put in the effort to produce. So they get to enjoy unearned rewards now. Also, since it takes time for holders of wealth to realize how much inflation has occurred, they will often exchange their wealth for money at a price lower than the increase in money supply would indicate. So the price of a purchased item will often continue to increase after the borrower acquires it, and they benefit from the increase in prices by paying back their loan with money that is less valuable than it was when they borrowed it. Of course the interest charges negate some of the benefit, but often not all of it, so borrowing money can end up being very beneficial to a borrower in many situations.
The biggest beneficiary is the bank itself. They create the money from nothing, with no opportunity cost or sacrifice necessary. In effect, they are able to use the new money to transfer wealth from holders of wealth to borrowers, at the expense of holders of money. And of course as soon as that transfer is complete, the holders of wealth become new holders of money and begin to suffer the effects of inflation too. Meanwhile the bank requires the borrower to repay the loan, with interest attached.
When an individual makes a loan, the interest charged is payment for the opportunity cost of not being able to enjoy the benefits of spending that money now. However for banks, there is no opportunity cost in making a loan. So the bank receives interest as a reward from the borrower for transferring wealth to them at the expense of holders of money. A kind of sharing of the spoils of theft, if you will. Of course they would never describe it that way, but if you understand what’s actually happening it seems like the only accurate explanation.
So we see who gets rewarded by the banking system, and who gets punished. Those who get rewarded are bankers, who collect interest from loaning out money they didn’t actually have, and are able to enrich themselves by spending that collected interest to purchase real wealth. Sometimes borrowers are also rewarded, meaning the people who consume things they haven’t produced by borrowing the money to buy them get to enjoy immediate gratification, and then over a period of time pay back an amount of money that has lost so much value it would no longer be enough to buy the item they have already been enjoying.
And the people who get punished are those who save and hold money. Those people are the ones who produce value and defer consumption, the ones whose pro-social behavior and delayed gratification make capital formation and modern civilization possible.
The purpose and effect of banking, and creation of new money through bank loans, is to redistribute wealth. The incentive structure means access to wealth is stolen from those with the most socially desirable behavior, the most effective producers and most frugal savers who hold money they’ve earned for future use. The stolen wealth is given to those with the least socially desirable behavior, those who consume more than they produce and live beyond their means, being a net detriment to civilization, and to the parasitic banking class who collect interest as a reward for their theft.
The anti-civilizational outcomes of this perverse incentive structure, and the lie it’s built on (“money in the bank is the same as money in your wallet”) have only become more obvious and harder to ignore over the decades. Without a fundamental change to the basic design and function of the modern financial system, expect this trend to continue.
Forewarned is forearmed.
-
@ 7c765d40:bd121d84
2024-12-03 22:37:00We have crossed another 1,000 blocks!
Time is flying by.
Seems like just yesterday we were in the 872s.
Today we are talking about some of the opportunities ahead in this crazy world of bitcoin.
Let's start with a little exercise.
Woo hoo - just like in grade school.
Take a pen and paper.
Evernote doesn't count.
Think about the industry you work in.
How could bitcoin improve certain aspects of the industry?
Start writing down some ideas on how bitcoin could shake things up.
If you were having a conversation with someone in the industry about bitcoin, what would you tell them?
Think about your suppliers.
Your customers.
Your marketing strategy.
Your investments.
Your capital expenditures.
Your admin team.
Your payroll.
And don't limit your thinking to be payment related.
Bitcoin changes the payment rails but it also changes the mentality, the efficiency, and the time horizons.
Think about the treasury for businesses within the industry.
The wasted resources.
The decision-making process.
The budgets.
My dad and I were talking about a local business and using their services.
We were going to talk to them about bitcoin and how it could improve the way they do business and get new customers.
But then I thought, why bother?
Both of us are very well-versed in this specific industry AND also have the bitcoin knowledge to implement this without friction.
I spend a lot of time on my daily show talking about how we can help other businesses with bitcoin.
But why wouldn't we just do it ourselves instead?
There will be a time and place for both - but when you can do things just as good but have the bitcoin knowledge, it's a no-brainer.
We need to shift the focus from trying to help everyone else.
We need to realize the opportunity here and make some fucking hay.
I know that goes against the bitcoin way of thinking but it's true.
We have to get a little selfish here if we want some influence in the future.
Something to think about anyways.
And if you’re anything like the fella in the photo, you might even need two pens!
PROJECT POTENTIAL - You can now find the expanded audio versions of these on the new podcast - Project Potential! I will be sharing the video versions here for the LITF members but you can also find it for free on Spotify and of course Fountain!
Here is the link to Episode 004 on Fountain: https://fountain.fm/episode/r00ZDxpAdfb7QIQT3TKa
Have a great day everyone! And remember, the only thing more scarce than bitcoin is time!
Jor