-
@ 9f94e6cc:f3472946
2024-11-21 18:55:12Der Entartungswettbewerb TikTok hat die Jugend im Griff und verbrutzelt ihre Hirne. Über Reels, den Siegeszug des Hochformats und die Regeln der Viralität.
Text: Aron Morhoff
Hollywood steckt heute in der Hosentasche. 70 Prozent aller YouTube-Inhalte werden auf mobilen Endgeräten, also Smartphones, geschaut. Instagram und TikTok sind die angesagtesten Anwendungen für junge Menschen. Es gibt sie nur noch als App, und ihr Design ist für Mobiltelefone optimiert.
Einst waren Rechner und Laptops die Tools, mit denen ins Internet gegangen wurde. Auch als das Smartphone seinen Siegeszug antrat, waren die Sehgewohnheiten noch auf das Querformat ausgerichtet. Heute werden Rechner fast nur noch zum Arbeiten verwendet. Das Berieseln, die Unterhaltung, das passive Konsumieren hat sich vollständig auf die iPhones und Samsungs dieser Welt verlagert. Das Telefon hat den aufrechten Gang angenommen, kaum einer mehr hält sein Gerät waagerecht.
Homo Digitalis Erectus
Die Welt steht also Kopf. Die Form eines Mediums hat Einfluss auf den Inhalt. Marshall McLuhan formulierte das so: Das Medium selbst ist die Botschaft. Ja mei, mag sich mancher denken, doch medienanthropologisch ist diese Entwicklung durchaus eine Betrachtung wert. Ein Querformat eignet sich besser, um Landschaften, einen Raum oder eine Gruppe abzubilden. Das Hochformat entspricht grob den menschlichen Maßen von der Hüfte bis zum Kopf. Der TikTok-Tanz ist im Smartphone-Design also schon angelegt. Das Hochformat hat die Medieninhalte unserer Zeit noch narzisstischer gemacht.
Dass wir uns durch Smartphones freizügiger und enthemmter zur Schau stellen, ist bekannt. 2013 wurde „Selfie“ vom Oxford English Dictionary zum Wort des Jahres erklärt. Selfie, Selbstporträt, Selbstdarstellung.
Neu ist der Aufwand, der heute vonnöten ist, um die Aufmerksamkeitsschwelle der todamüsierten Mediengesellschaft überhaupt noch zu durchbrechen. In beängstigender Hypnose erwischt man viele Zeitgenossen inzwischen beim Doomscrollen. Das ist der Fachbegriff für das weggetretene Endloswischen und erklärt auch den Namen „Reel“: Der Begriff, im Deutschen verwandt mit „Rolle“, beschreibt die Filmrolle, von der 24 Bilder pro Sekunde auf den Projektor gewischt oder eben abgespult werden.
Länger als drei Sekunden darf ein Kurzvideo deshalb nicht mehr gehen, ohne dass etwas Aufregendes passiert. Sonst wird das Reel aus Langeweile weggewischt. Die Welt im Dopamin-Rausch. Für den Ersteller eines Videos heißt das inzwischen: Sei der lauteste, schrillste, gestörteste Marktschreier. Das Wettrennen um die Augäpfel zwingt zu extremen Formen von Clickbait.
15 Sekunden Ruhm
Das nimmt inzwischen skurrile Formen an. Das Video „Look who I found“ von Noel Robinson (geboren 2001) war im letzten Jahr einer der erfolgreichsten deutschen TikTok-Clips. Man sieht den Deutsch-Nigerianer beim Antanzen eines karikaturartig übergewichtigen Menschen. Noel wird geschubst und fällt. Daraufhin wechselt das Lied – und der fette Mann bewegt seinen Schwabbelbauch im Takt. Noel steht wieder auf, grinst, beide tanzen gemeinsam. Das dauert 15 Sekunden. Ich rate Ihnen, sich das Video einmal anzuschauen, um die Mechanismen von TikTok zu verstehen. Achten Sie alleine darauf, wie vielen Reizen (Menschenmenge, Antanzen, Sturz, Schwabbelbauch) Sie in den ersten fünf Sekunden ausgesetzt sind. Wer schaut so was? Bis dato 220 Millionen Menschen. Das ist kapitalistische Verwertungslogik im bereits verwesten Endstadium. Adorno oder Fromm hätten am Medienzeitgeist entweder ihre Freude oder mächtig zu knabbern.
Die Internet- und Smartphoneabdeckung beträgt mittlerweile fast 100 Prozent. Das Überangebot hat die Regeln geändert. Um überhaupt gesehen zu werden, muss man heute viral gehen. Was dafür inzwischen nötig ist, spricht die niedrigsten Bedürfnisse des Menschen an: Gewalt, Ekel, Sexualisierung, Schock. Die jungen Erwachsenen, die heute auf sozialen Netzwerken den Ton angeben, haben diese Mechanismen längst verinnerlicht. Wie bewusst ihnen das ist, ist fraglich. 2024 prallt eine desaströse Bildungssituation samt fehlender Medienkompetenz auf eine egomanische Jugend, die Privatsphäre nie gekannt hat und seit Kindesbeinen alles in den Äther ballert, was es festhalten kann. Man muss kein Kulturpessimist sein, um diese degenerative Dynamik, auch in ihrer Implikation für unser Zusammenleben und das psychische Wohlergehen der Generation TikTok, als beängstigend zu bezeichnen.
Aron Morhoff studierte Medienethik und ist Absolvent der Freien Akademie für Medien & Journalismus. Frühere Stationen: RT Deutsch und Nuoviso. Heute: Stichpunkt Magazin, Manova, Milosz Matuschek und seine Liveshow "Addictive Programming".
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ a95c6243:d345522c
2024-12-06 18:21:15Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\ dass wir Vorteile aus ihr ziehen;\ in jedem andern hegt man den Wunsch,\ dass der Unschuldige in Schutz genommen werde.\ Jean-Jacques Rousseau
Politiker beteuern jederzeit, nur das Beste für die Bevölkerung zu wollen – nicht von ihr. Auch die zahlreichen unsäglichen «Corona-Maßnahmen» waren angeblich zu unserem Schutz notwendig, vor allem wegen der «besonders vulnerablen Personen». Daher mussten alle möglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener «Schutzmaßnahmen» den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen – wie erwartet – massive Nebenwirkungen, sondern Maskentragen schadet der Psyche und der Entwicklung (nicht nur unserer Kinder) und «Lockdowns und Zensur haben Menschen getötet».
Eine der wichtigsten Waffen unserer «Beschützer» ist die Spaltung der Gesellschaft. Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persönlichen Erfahrungen als Kritikerin der Maßnahmen berichtete kürzlich eine Schweizerin im Interview mit Transition News. Sie sei schwer enttäuscht und verspüre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit «Geimpften».
Menschen, die aufrichtig andere schützen wollten, werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ärzte, darunter Heinrich Habig, Bianca Witzschel und Walter Weber. Über den aktuell laufenden Prozess gegen Dr. Weber hat Transition News mehrfach berichtet (z.B. hier und hier). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-«Impfung» bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie Alexander Bittner erfahren mussten.
Die eigentlich Kriminellen schützen sich derweil erfolgreich selber, nämlich vor der Verantwortung. Die «Impf»-Kampagne war «das größte Verbrechen gegen die Menschheit». Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn Hunter möglicherweise auch Anthony Fauci begnadigen wird – in diesem Fall sogar präventiv. Gibt es überhaupt noch einen Rest Glaubwürdigkeit, den Biden verspielen könnte?
Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dürfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rücken.
Das Buch «The Real Anthony Fauci» des nominierten US-Gesundheitsministers Robert F. Kennedy Jr. erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der öffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb übrigens Călin Georgescu, der Überraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der Panik im Wertewesten.
In Rumänien selber gab es gerade einen Paukenschlag: Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die für Sonntag angesetzte Stichwahl kurzfristig abgesagt – wegen angeblicher «aggressiver russischer Einmischung». Thomas Oysmüller merkt dazu an, damit sei jetzt in der EU das Tabu gebrochen, Wahlen zu verbieten, bevor sie etwas ändern können.
Unsere Empörung angesichts der Historie von Maßnahmen, die die Falschen beschützen und für die meisten von Nachteil sind, müsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem «Schutz vor Desinformation und Hassrede» (sprich: Zensur) wird es unsere wichtigste Aufgabe sein, Gräben zu überwinden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-11-29 19:45:43Konsum ist Therapie.
Wolfgang JoopUmweltbewusstes Verhalten und verantwortungsvoller Konsum zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
Heute ist also wieder mal «Black Friday», falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
Warum fallen wir auf derartige Werbetricks herein und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
Gedankenlosigkeit und Maßlosigkeit können besonders bei der Ernährung zu ernsten Problemen führen. Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
Kritik am schwarzen Freitag und dem unnötigen Konsum kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
Die EU-Kommission lancierte 2015 den Begriff «Green Friday» im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das Pariser Abkommen unterzeichnet werden sollte.
Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt. Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des «Green New Deal» verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um Valencia dazu sagen?
Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020 eine «grüne Erholung von Covid-19, um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie «verantwortungsvolle Risikobereitschaft» unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ f0c7506b:9ead75b8
2024-12-08 09:05:13Yalnızca güçlü olanların hakkıdır yaşamak.
Güçlü olan ileri gider ve saflar seyrekleşir. Ama üç beş büyük, güçlü ve tanrısal kişi güneşli ve aydınlık gözleriyle o yeni, o vaat edilmiş ülkeye ulaşacaktır. Belki binlerce yıl sonra ancak. Ve güçlü, adaleli, hükmetmek için yaratılmış elleriyle hastaların, zayıfların ve sakatların ölüleri üzerinde bir krallık kuracaklardır. Bir krallık!
Benim aradığım insanların kendileri değil, sesleridir.
Duyguları körelmiş, çeşitli düşüncelere saplanmış kalabalık hiçbir zaman ilerlemenin taşıyıcısı olamaz, kendi küçüklüğünün o küflü içgüdüsüyle kalabalığın kin ve nefretle baktığı bir kişi, bir büyük kişi, iradesinin gösterdiği yolda kimsenin gözünün yaşına bakmaksızın ilahi bir güç ve bir zafer gülümsemesiyle yürüyebilir ancak.
Bizim soyumuz da sonsuz oluşum piramidinin doruk noktasını oluşturmaktan uzaktır. Bizler de mükemmelliğe ulaşmış değiliz. Bizler de henüz olgunlaşmadık.
Şairler sevgiye övgüler döşenir; doğrusu sevginin güçlü bir şey olduğu kesin. Hüneşin bir ışınıdır sevgi, aydınlatıp nurlandırır insanı der bazıları; bazıları da insanı esrikliğe sürükleyen bir zehri kendisinde barındırdığını söyler. Gerçekten de yol açtığı sonuçlar, bir hekimin ağır bir ameliyattan önce korkudan titreyen hastaya teneffüs ettirdiği güldürücü gazınkine benzer, içinde tepinip duran acıyı unutturur hastaya.
Önemli olan, hayatta hiç değilse bir kez kutsal bir ilkbaharın yaşanmasıdır; öyle bir bahar ki, insanın gönlünü ilerideki bütün günleri altın yaldızla kaplamaya yetecek kadar ışık ve parıltıyla doldursun.
Şu hayat denen şey kötü bir işçiliğin ürünü, acemilere göre bir şey. Bu kepaze yaşam uğruna insan nelere katlanmıyor ki!
Kendisine sadakatten ayrılmadığı, yalnızca kendisinin olan bir tek bu var: Yalnızlığı.
Sahildeki üstü tenteli hasır koltuklar arkasındaki yüksek, sessiz kum tepeleri içinde yürürsen, tenteler altındaki insanları göremezsin; ama birinin bir diğerine seslendiğini, bir başkasının gevezelik ettiğini, bir ötekinin güldüğünü işitir ve anlarsın hemen: bu insan şöyle şöyle biridir diyebilirsin. Onun hayatı sevdiğini, bağrında büyük bir özlem ya da acı barındırdığını, bu acının da sesini ağlamaklı kıldığını her gülüşünde hissedersin.
-
@ e79d3f66:41a9bfbe
2024-12-11 08:07:10The customer service industry is undergoing a rapid transformation, driven by technological advancements, evolving customer expectations, and a globalized workforce. As we step into 2025, several trends are poised to reshape the landscape of customer service outsourcing. Let's delve into the top trends that will shape the future of this dynamic industry.
- AI-Powered Customer Service: A New Era of Automation
Artificial Intelligence (AI) is revolutionizing customer service by automating routine tasks and enhancing customer interactions. AI-powered chatbots and virtual assistants are becoming increasingly sophisticated, capable of handling a wide range of customer inquiries, from simple product information to complex troubleshooting. This not only improves efficiency but also frees up human agents to focus on more complex and strategic tasks.
- Hyper-Personalization: Tailoring Experiences to the Individual
Customers today crave personalized experiences that cater to their unique needs and preferences. Customer service outsourcing providers are leveraging data analytics and machine learning to gain deeper insights into customer behavior. This enables them to deliver highly personalized interactions, such as customized product recommendations, tailored messaging, and proactive support.
- Omnichannel Customer Support: Seamless Experiences Across Channels
Customers expect seamless and consistent experiences across all touchpoints, whether it's phone, email, chat, social media, or in-person. Omnichannel customer support is essential to meet these expectations. Outsourcing providers are investing in advanced technologies and training their agents to handle multiple channels effectively. This ensures that customers receive timely and relevant assistance, regardless of the channel they choose.
- Remote and Hybrid Workforces: A New Paradigm
The COVID-19 pandemic accelerated the adoption of remote and hybrid work models. This trend is likely to continue in the customer service industry, as it offers numerous benefits, including increased flexibility, cost savings, and access to a global talent pool. Outsourcing providers are adapting to this shift by investing in robust remote work infrastructure and training their agents to work effectively from anywhere.
- The Rise of the Digital Nomad Agent
The digital nomad lifestyle is gaining popularity, and customer service is no exception. Outsourcing providers are increasingly hiring digital nomad agents who can work remotely from anywhere in the world. This trend can lead to a more diverse and skilled workforce, as well as reduced operational costs.
- Ethical AI and Data Privacy: A Growing Concern
As AI becomes more integrated into customer service, ethical considerations and data privacy are paramount. Outsourcing providers must ensure that AI algorithms are unbiased and transparent. They must also comply with stringent data privacy regulations, such as GDPR and CCPA, to protect customer information.
- The Human Touch: Empathy and Emotional Intelligence
While technology is transforming customer service, the human touch remains essential. Customers still value empathy, understanding, and personalized attention. Outsourcing providers are focusing on training their agents to develop strong emotional intelligence skills. This enables them to connect with customers on an emotional level and provide exceptional support.
By embracing these trends, customer service outsourcing providers can stay ahead of the curve and deliver exceptional experiences to customers. As the industry continues to evolve, the focus will be on leveraging technology to enhance human interaction and build stronger customer relationships.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 09fbf8f3:fa3d60f0
2024-09-10 13:21:23由于gmail在中国被防火墙拦截了,无法打开,不想错过邮件通知。
通过自建ntfy接受gmail邮件通知。 怎么自建ntfy,后面再写。
2024年08月13日更新:
修改不通过添加邮件标签来标记已经发送的通知,通过Google Sheets来记录已经发送的通知。
为了不让Google Sheets文档的内容很多,导致文件变大,用脚本自动清理一个星期以前的数据。
准备工具
- Ntfy服务
- Google Script
- Google Sheets
操作步骤
- 在Ntfy后台账号,设置访问令牌。
- 添加订阅主题。
- 进入Google Sheets创建一个表格.记住id,如下图:
- 进入Google Script创建项目。填入以下代码(注意填入之前的ntfy地址和令牌):
```javascript function checkEmail() { var sheetId = "你的Google Sheets id"; // 替换为你的 Google Sheets ID var sheet = SpreadsheetApp.openById(sheetId).getActiveSheet();
// 清理一星期以前的数据 cleanOldData(sheet, 7 * 24 * 60); // 保留7天(即一周)内的数据
var sentEmails = getSentEmails(sheet);
var threads = GmailApp.search('is:unread'); Logger.log("Found threads: " + threads.length);
if (threads.length === 0) return;
threads.forEach(function(thread) { var threadId = thread.getId();
if (!sentEmails.includes(threadId)) { thread.getMessages().forEach(sendNtfyNotification); recordSentEmail(sheet, threadId); }
}); }
function sendNtfyNotification(email) { if (!email) { Logger.log("Email object is undefined or null."); return; }
var message = `发件人: ${email.getFrom() || "未知发件人"} 主题: ${email.getSubject() || "无主题"}
内容: ${email.getPlainBody() || "无内容"}`;
var url = "https://你的ntfy地址/Gmail"; var options = { method: "post", payload: message, headers: { Authorization: "Bearer Ntfy的令牌" }, muteHttpExceptions: true };
try { var response = UrlFetchApp.fetch(url, options); Logger.log("Response: " + response.getContentText()); } catch (e) { Logger.log("Error: " + e.message); } }
function getSentEmails(sheet) { var data = sheet.getDataRange().getValues(); return data.map(row => row[0]); // Assuming email IDs are stored in the first column }
function recordSentEmail(sheet, threadId) { sheet.appendRow([threadId, new Date()]); }
function cleanOldData(sheet, minutes) { var now = new Date(); var thresholdDate = new Date(now.getTime() - minutes * 60 * 1000); // 获取X分钟前的时间
var data = sheet.getDataRange().getValues(); var rowsToDelete = [];
data.forEach(function(row, index) { var date = new Date(row[1]); // 假设日期保存在第二列 if (date < thresholdDate) { rowsToDelete.push(index + 1); // 存储要删除的行号 } });
// 逆序删除(从最后一行开始删除,以避免行号改变) rowsToDelete.reverse().forEach(function(row) { sheet.deleteRow(row); }); }
```
5.Google Script是有限制的不能频繁调用,可以设置五分钟调用一次。如图:
结尾
本人不会代码,以上代码都是通过chatgpt生成的。经过多次修改,刚开始会一直发送通知,后面修改后将已发送的通知放到一个“通知”的标签里。后续不会再次发送通知。
如需要发送通知后自动标记已读,可以把代码复制到chatgpt给你写。
-
@ 65912a7a:5dc638bf
2024-12-08 05:33:02Chef's notes
This is my late partner's award winning Cajun rice & beans recipe. It's an updated take on the traditional Cajun comfort food.
Chef Darin was a classically trained chef who spent 30+ years in the kitchen perfecting his recipes, and delivering authentic Cajun and Creole food to his patrons. This is a 5-star dish that will earn the respect of the most discerning Cajun afficionado. You won't be disappointed.
I suggest making this recipe exactly as directed the first time, and then make whatever adjustments you want for future batches. Also, don't cheap out on the Andouille. No Johnsonville or Hillshire Farms. Chef Aidelle's is a good choice, as is Silva's from Whole Foods. They cost a few extra bucks, but it's absolutely worth it.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 3 hours
- 🍽️ Servings: 12
Ingredients
- 16oz small red beans, dry
- 2 cups long grain white rice
- 14-16oz andouille sausage, sliced
- 8oz ham, cubed
- 1 large yellow onion, chopped
- 1 green bell pepper, chopped
- 2-3 stalks celery, chopped
- 2 tbsp garlic (12 cloves), minced
- 7 cups water
- ¼ cup olive oil
- 2 large bay leaves
- 1 tbsp parsley, dried
- 1 tsp thyme, dried
- 1 tsp Cajun seasoning
- ½ tsp cayenne pepper, dried
- ¼ tsp sage, rubbed
- 1½ tsp salt (more or less to taste)
Directions
- Soak beans in a large pot of water overnight.
- Heat oil in a large stockpot over medium heat. Cook onion, bell pepper, celery, garlic in olive oil for 3 to 4 minutes (until onion is translucent).
- Add beans, bay leaves, parsley, thyme, salt, MSG, Cajun seasoning, cayenne pepper, Sage, and water. Stir, bring to a boil, and then reduce heat to medium-low (btwn 2-3). Cover and simmer for 2½ hours.
- Remove bay leaves. Mash some of the beans. Stir Andouille and ham into beans, and simmer uncovered for an additional 30 minutes.
- Meanwhile, prepare the rice. Bring water and rice to a boil in a saucepan. Reduce heat, cover, and simmer for 20 minutes.
- Serve beans over steamed white rice.
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ a012dc82:6458a70d
2024-12-11 08:02:59Table Of Content
-
From the Backbench to the Forefront
-
Milei's Bitcoin Connection
-
The Coinx Controversy
-
Argentina's Financial Quagmire
-
Conclusion
-
FAQ
Well, folks, it seems like the winds of change are blowing in Argentina! In a twist that no one saw coming, Javier Milei, the presidential candidate with a penchant for Bitcoin and libertarian economics, clinched the top spot in Argentina's primary. This victory sent shockwaves throughout the nation. Milei and his gang, the La Libertad Avanza (or "Liberty Advances"), managed to snag a whopping 30% of the votes. They beat the second-place contender, Juntos Por El Cambio, by just under 2%, which is quite the feat!
From the Backbench to the Forefront
La Libertad Avanza, founded just a couple of years ago in 2021, was once the little guy in the political arena. In their first legislative elections, they made waves, becoming the third most-voted coalition in Buenos Aires. But this recent victory? It's monumental! It's like David taking on Goliath and emerging victorious. Milei's rise has certainly turned heads and raised eyebrows in the political sphere, making everyone wonder what's next.
Milei's Bitcoin Connection
Javier Milei is not your run-of-the-mill political candidate. He's carved out a unique niche for himself in the world of politics, largely due to his vocal support for cryptocurrencies, especially Bitcoin. When you tune into talk shows and interviews, you'll often find Milei passionately discussing the potential of digital currencies. He doesn't just see them as another financial instrument; to him, they represent a return to a time when the power of money was firmly rooted in the hands of the people, free from excessive governmental control.
His views on Bitcoin go beyond mere admiration. Milei perceives it as a revolutionary tool, one that can challenge traditional financial systems. He often contrasts the decentralized nature of cryptocurrencies with the centralized control of traditional fiat currencies. In his eyes, Bitcoin and its peers are not just alternatives but superior forms of money. He's even made bold claims, suggesting that in many ways, cryptocurrencies are safer investments than traditional precious metals like gold or silver. This is a significant statement, especially in a country like Argentina, where people have historically turned to gold as a hedge against economic instability.
However, as with any public figure with strong opinions, Milei's crypto enthusiasm has its fair share of critics. While he paints a rosy picture of a crypto-driven future, there are those who question his motives and the feasibility of his vision. The crypto world, as many know, is not without its pitfalls. From volatile market swings to regulatory challenges, the journey to mainstream acceptance is fraught with challenges. And Milei's connection to this world has put him under the microscope, with every statement and action being dissected and debated.
The Coinx Controversy
Rumor has it that Milei promoted a Ponzi scheme called Coinx, which allegedly swindled a cool $800,000 in Argentine pesos. Milei, of course, denies any wrongdoing. He even compared their business model to that of a bank. The only difference? They can offer higher interest rates because they're not tied down by the central bank. But not everyone's buying it. Manuel Ferrari, a big shot in the Bitcoin Argentina NGO, remains wary of Milei. This controversy adds another layer to the complex narrative surrounding Milei's rise.
Argentina's Financial Quagmire
Argentina's economic waters are turbulent, to say the least. With a dizzying inflation rate of 135% this year, the peso's value is plummeting, causing widespread distress. Amidst this chaos, many are pinning their hopes on Javier Milei, a figure who has emerged with a pro-Bitcoin stance that's causing quite the stir. Drawing parallels with El Salvador's audacious move to adopt Bitcoin, there's a buzz about whether Argentina might follow suit. But is Milei the savior Argentina has been waiting for? While his support for cryptocurrencies offers a glimmer of hope to some, it also brings with it skepticism and apprehension. The world of crypto, though promising, is still uncharted territory, especially for an economy as volatile as Argentina's.
As debates rage on, it's evident that Argentina stands at a crucial financial juncture. Milei's advocacy for Bitcoin and other cryptocurrencies suggests a potential shift in the country's financial paradigm. But diving into the crypto realm isn't without its risks, and there's a looming question: Are we witnessing the dawn of a new financial era for Argentina, or is it just a leap from the frying pan into the fire? The nation watches with bated breath, waiting to see the path Milei might pave.
Conclusion
Only time will truly reveal the impact of Milei's influence on Argentina's financial future. It's a waiting game now, folks. But if there's one thing we can bank on, it's that with Milei stirring the pot, Argentina's economic and financial landscape is poised for some dramatic shifts. The rollercoaster has just begun, so everyone better buckle up and brace themselves. Keep your eyes peeled and ears to the ground, because the upcoming months promise a whirlwind of changes, debates, and transformations for Argentina. The nation stands at a pivotal juncture, and the world watches with bated breath.
FAQ
Who is Javier Milei? Javier Milei is a presidential candidate in Argentina known for his support of Bitcoin and libertarian economics.
What is La Libertad Avanza? La Libertad Avanza, translated as "Liberty Advances," is the political coalition led by Javier Milei.
How did Milei fare in the recent primaries? Milei clinched the top spot in Argentina's primary, securing over 30% of the votes.
What is the Coinx controversy? Coinx is an alleged Ponzi scheme that Milei is rumored to have promoted. However, Milei denies any wrongdoing.
What is Milei's stance on Bitcoin? Milei is a strong advocate for Bitcoin, viewing it as a return to private sector-controlled money and a safer alternative to traditional assets like gold or silver.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research. *
-
-
@ a95c6243:d345522c
2024-10-19 08:58:08Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
Das Gewissen regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-
@ 3bf0c63f:aefa459d
2024-12-06 20:37:26início
"Vocês vêem? Vêem a história? Vêem alguma coisa? Me parece que estou tentando lhes contar um sonho -- fazendo uma tentativa inútil, porque nenhum relato de sonho pode transmitir a sensação de sonho, aquela mistura de absurdo, surpresa e espanto numa excitação de revolta tentando se impôr, aquela noção de ser tomado pelo incompreensível que é da própria essência dos sonhos..."
Ele ficou em silêncio por alguns instantes.
"... Não, é impossível; é impossível transmitir a sensação viva de qualquer época determinada de nossa existência -- aquela que constitui a sua verdade, o seu significado, a sua essência sutil e contundente. É impossível. Vivemos, como sonhamos -- sozinhos..."
- Livros mencionados por Olavo de Carvalho
- Antiga homepage Olavo de Carvalho
- Bitcoin explicado de um jeito correto e inteligível
- Reclamações
-
@ 4523be58:ba1facd0
2024-05-28 11:05:17NIP-116
Event paths
Description
Event kind
30079
denotes an event defined by its event path rather than its event kind.The event directory path is included in the event path, specified in the event's
d
tag. For example, an event path might beuser/profile/name
, whereuser/profile
is the directory path.Relays should parse the event directory from the event path
d
tag and index the event by it. Relays should support "directory listing" of kind30079
events using the#f
filter, such as{"#f": ["user/profile"]}
.For backward compatibility, the event directory should also be saved in the event's
f
tag (for "folder"), which is already indexed by some relay implementations, and can be queried using the#f
filter.Event content should be a JSON-encoded value. An empty object
{}
signifies that the entry at the event path is itself a directory. For example, when savinguser/profile/name
:Bob
, you should also saveuser/profile
:{}
so the subdirectory can be listed underuser
.In directory names, slashes should be escaped with a double slash.
Example
Event
json { "tags": [ ["d", "user/profile/name"], ["f", "user/profile"] ], "content": "\"Bob\"", "kind": 30079, ... }
Query
json { "#f": ["user/profile"], "authors": ["[pubkey]"] }
Motivation
To make Nostr an "everything app," we need a sustainable way to support new kinds of applications. Browsing Nostr data by human-readable nested directories and paths rather than obscure event kind numbers makes the data more manageable.
Numeric event kinds are not sustainable for the infinite number of potential applications. With numeric event kinds, developers need to find an unused number for each new application and announce it somewhere, which is cumbersome and not scalable.
Directories can also replace monolithic list events like follow lists or profile details. You can update a single directory entry such as
user/profile/name
orgroups/follows/[pubkey]
without causing an overwrite of the whole profile or follow list when your client is out-of-sync with the most recent list version, as often happens on Nostr.Using
d
-tagged replaceable events for reactions, such as{tags: [["d", "reactions/[eventId]"]], content: "\"👍\"", kind: 30079, ...}
would make un-reacting trivial: just publish a new event with the samed
tag and an empty content. Toggling a reaction on and off would not cause a flurry of new reaction & delete events that all need to be persisted.Implementations
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
f
) already support this feature. - IrisDB client side library: treelike data structure with subscribable nodes.
https://github.com/nostr-protocol/nips/pull/1266
- Relays that support tag-replaceable events and indexing by arbitrary tags (in this case
-
@ 349d6b82:12b2a5b1
2024-12-11 07:15:39Утром 11 декабря произошло необычное событие, которое привлекло внимание местных жителей и нашу редакцию. 32-летний местный житель Серова Петр Дибонеев, который стал свидетелем и участником спасательной операции на реке Тура.
По словам спасателя - Утром, во время пробежки вдоль реки, Петр заметил, что человек тонет. Не раздумывая, он бросился в воду и смог вытащить утопающего, который оказался 25-летним студентом - Николай Астрахонский - из соседнего города - Нижний Тагил. Благодаря быстрой реакции Петра, пострадавший был спасен и доставлен в больницу с легкими переохлаждениями.
"Когда я увидел человека, который тонет, у меня не было времени на раздумья. Я просто инстинктивно бросился в воду. В такие моменты ты не думаешь о себе, а лишь о том, как помочь другому. Я рад, что смог спасти его и что он сейчас в безопасности. Это не только моя заслуга — я уверен, что каждый из нас готов прийти на помощь в трудную минуту" - высказался по этому поводу Петр Дибонеев.
Это событие вызвало широкий резонанс в городе. Местные жители организовали акцию благодарности Петру, где он получил грамоту от администрации города за мужество и самоотверженность. А в социальных сетях начали распространяться посты с хештегом #ГеройСерова, где люди делятся своими историями о смелых поступках.
И также мэр города, Ольга Петрова, отметила: "Петр — настоящий герой. Его поступок вдохновляет нас всех. Мы должны помнить о важности взаимопомощи и поддержки друг друга в трудные времена".
Такие события напоминает нам о том, что каждый из нас может стать героем в нужный момент. Петр Дибонеев стал символом мужества и готовности прийти на помощь, что должно вдохновлять на добрые дела и активное участие в жизни сообщества.
-
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ 79d783e8:3b888a6d
2024-12-11 05:33:08The "Netflix Hypothesis" is a name which is intended to illustrate one of the simple mechanisms through which our attention spans have been reduced, our anxiety spiked and our wallets drained. I cannot take full credit for the name, and will give due credit to my close friend in the book surrounding this topic which I am busy working on.
The purpose of this read is to pose that inflation itself has had a profoundly negative impact on the nature of society and our brains. It differs from the general narrative, because yes it touches on inflation's impact on our time preference, but it also discusses the global phenomenon of "Brain-rot" affecting not only my generation, but all of those alive today.
Although the name suggests it, this essay is not focused specifically on Netflix, but rather most of the highly successful companies that operate and thrive today in an inflationary environment. I also would like to add that I am not explicitly and corporatist; I am a staunch anarcho-capitalist. I have contempt for the effects for what these companies have done over the past four decades, however, I view this more from the perspective that they were doing what they could to be successful in an inflationary environment, caused by the US, and other governments globally.
If you have a melting ice cube, would you continue holding it, or rather put it to use to cool down your drink? As, I can assume that the majority of those that will read this are already Bitcoiners, I don't particularly need to explain inflation, but I use the ice cube analogy to highlight the change in time preference. We are more likely to spend our money immediately, rather than saving it and putting it to better use later (hence why I love the term "cold storage" to refer to certain bitcoin wallets).
This phenomenon of spending, rather than saving, means that our natural endless consumption cycle accelerates. In order for companies to be successful in an environment like that benefit from producing cheap, quick and easy solutions as places where we can shove our money. Netflix is one such example, in that the TV industry once produced pilot episodes to gauge interest in any series, but Netflix began the trend of paying to produce a whole season at once, releasing the whole season immediately, instead of taking time with production and staggering the release to one episode per week. This means that the viewer is a lot more likely to watch an entire show in one, or two sittings, regardless of whether it is high quality or not; if they didn't do this, most viewer would likely forget about most of the shows that Netflix pumps out, because frankly most of them are mildly entertaining at best.
The same phenomenon is observed in the fashion industry, with the bulk of the world's population today wearing fast fashion clothing made from low-grade materials in third-world nations under near slave-labour conditions. Companies like Stein, H&M, Cotton:on, Zara and the like, produce clothes that you might wear only once, or at best for a year before they begin to fall apart. This is contrasted to the trades of tailors, seamstresses, cobblers and the like, who would once produce high quality garb which would last for years, and provide mending services in case of damage. Fast fashion has by now been discussed at length by many people, but no campaigns to end it have borne any fruit - because simply, it's fast, easy and convenient.
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ 148755e6:450c107f
2024-12-05 10:09:32突然荒野に行きたくなったので行ってきたエントリーです
まずは練習。高尾山へ
Nostrは古今東西ありとあらゆるオフ会が生えており、
まるで荒野に行きたいという私の意志を完全に汲み取ったかのように「紅葉を見にいこうようオフ」がそこに生えていたので参加した。(しおんさんご主催ありがとうございました)
前半1時間くらいの坂道がマジきつかったです。前半キツすぎて後半足痛かった。。 終始人がいっぱいいて渋谷かと思った。
確かに道がかなり整備されていて、逆にコンクリート故に足が疲れたのかもしれない。隣の人は途中の急な坂道で足を滑らせてて、横で転倒事故が起きるかと思いました。
山頂に行っても人がたくさんいて、迷子になりかけた。あそこはスクランブル交差点や。 そして山頂の先にあるもみじ台まで歩くと人がまばらで、まったりして蕎麦食べたりしながら休憩して下山。
登りは暑くて汗かきましたが、山頂でまったりしてると汗も引いてきて少し冷えました。
下山はスイスイ。16時近くで結構暗かったので、冬の間は早めの登頂・下山がおすすめですね。
登り2時間・下り1時間半で概ね見込み通りって感じでした。
高尾山は登ってると景色が変わります。ちょっと開けた場所に出て下の街が見えたり、草木があったり、階段があったり、参道があったり。。そういう意味では退屈しない2時間でした。
ビギナー山とはいえ、革靴やヒールのある靴で登ってる人がいてびっくり。ツルッと滑ることあると思いますので、スニーカーで登ることをお勧めします。
舐めプしてたとはいえめちゃくちゃキツかったおもひで。
更なる練習。小浅間山へ
さて私は荒野に行きたいワケなのですが、高尾山に荒野はありませんでした。更なる練習として小浅間山へ。
前日(か前々日)に雪が降ったようで、山に雪が残っておりました。
それでも都内の汚れてべちゃっとした感じの雪ではなく、粉砂糖がちょっと積もってるみたいな感じで綺麗だった。
登り前半の30分くらい、景色や道が変わらず、ずっと歩きっぱなしになってしまいました。時間みて休憩しながら行けばよかったなあ。
登るにつれて気温が下がっていくのか、積雪が厚くなっていく。
40分くらいは割と平坦な道が続きますが、突然山頂っぽいものが現れて、「これを登れっていうのかい...?」とビビるほどピーンと急な道が出てきました。(写真だと分かりづらいですね)
ただ、高尾山のコンクリート道に比べると足の疲れはそこまででした。雪道なので気をつけて歩くという意味では疲れましたが、春〜秋とかは快適に登れるんじゃないでしょうか。
山頂に到着するとドーンと浅間山が見えて圧巻。
風が強くて飛ばされる恐怖はありましたが、なんとか無事でいられました。あったかいお茶美味しかった〜。
なぜかギャルの看板があって、謎でした。写真はひとまずありません。
山頂が2箇所あって、それぞれで眺めを満喫していたら結構時間が経ってました。
小さい背丈くらいの木や足元にちょっとした植物があったり、自分的にはかなり理想の荒野に近かったです。(植物に対する解像度が低すぎる) 往復で2時間程度の山らしいんですが、なんやかんやと2時間半強くらいいた気がします。
荒野ビギナーは小浅間山に往け
というわけで、荒野に行きたい人はまずは小浅間山を登ると良いと思います。 また登りたい。
荒野部部長
一緒に高尾山・小浅間山に登ってくれた方、ありがとうございました! 個人的には来年の春までに秩父多摩甲斐国立公園に行き、来年の秋までに大山隠岐国立公園に行くという目標を立ててるんですが、 少々時間が空くので次どこに行こうかしらと考えているところです。
ヒントとしては、火山で、あまり高低差のないところだとビギナーの私にちょうど良さそうです。
とある情報筋によると伊豆大島が良さそうなので、次の機会に行けたらと思っています。
みんなで荒野に行こう!
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ ac8bb9b0:70278acc
2024-12-04 20:30:30Chef's notes
Make Ahead: You can prepare this recipe up to one week in advance. Store it in an airtight container in the refrigerator.
To Freeze: Allow the dish to cool completely before transferring it to a freezer-safe bag. Lay the bag flat in the freezer to ensure even freezing and to save space. Thaw it in the refrigerator overnight before using it.
Details
- ⏲️ Prep time: 5
- 🍳 Cook time: 5
- 🍽️ Servings: 1
Ingredients
- ½ cup soy sauce
- 2 Tablespoons rice vinegar
- 1 Tablespoon sesame oil
- 1/4 cup + 1 Tablespoon light brown sugar
- 1 Tablespoon honey
- 3/4 teaspoon ground ginger
- 1 clove garlic , minced
- 2 teaspoons cornstarch+ 2 tsp water , mixed together to make a cornstarch slurry
- 1/4 teaspoon crushed red pepper flakes
Directions
- Make the teriyaki sauce by adding all of the sauce ingredients to a small saucepan over medium heat.
- Bring to a boil, stirring constantly, and boil for about 1 minute. The sauce should be thick enough to coat the back of the spoon.
- Serve over rice or with a stir-fry. See post above for additional ideas.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 26bb2ebe:70530958
2024-12-02 16:46:10nostterに画像最適化機能つけたよ(サーバー編)
この記事はNostr Advent Calendar 2024 の3日目の記事です。
あまり技術的な話はないので暇つぶし程度に読んでみてください。
どうしてこうなった?
そもそも認証の改善以前にNostrあんまり人が増えてないのが一番課題だよねと思ったのが始まりでした。 Nostrに人が増えないのはオーガニック検索流入が少ないからに違いないと特に根拠もなく思ったのでNostrのまとめサイト(Toggeter)のようなものを作ろうと考えました。
ところでNostrのまとめを行うアプリ自体は鎌倉さんという方がノスリというのを作成されていました。ブログ形式のイベントにTwitterライクな短文投稿をまとめるというものでまさしくToggeterですが、そこまで活用されていません。 そこでその仕組みをありがたくそのまま転用してまとめ記事を何らかの方法で量産しつつ、一つのドメインのサイトにまとめてSEOもなんかうまいことやれば検索流入増えるんじゃねという目論みです。
ところでそのまとめサイトは静的サイトジェネレータで(SSG:Static Site Generator)でつくりたいなと思いました。いや普通に考えてSSRにしてサーバ側でNostrからデータとってきたらSEO的にもよくねって感じなんですが、SSRでサーバーでウェブソケット呼ぶのだる…レイテンシを考慮すると結構不利じゃないかなと思ったわけです。うそです。そこまで考えてなくてほとんど個人的な好みです。(多分ちゃんとキャッシュきかせればそんなにレイテンシ問題にならなさそうな気がする)。ただキャッシュとかも考慮すると結構複雑な気はする。
ということで今年の6月頃にNostrのブログ記事をSSGするサイトをためしに作りました。 去年のアドベントカレンダー記事とか乗っけてます。
全然画像最適化の話になりませんね。もうちょっとです。
SSGのブログといえばGatsby(今は下火かも)とかで作成した経験があります。Gatsbyでは画像用のプラグインが公式に用意されていて生成されたブログに表示される画像はもとの画像データから変換され、表示時のサイズに最適化されたサイズにリサイズすることができます。
それだけではなくサイトの初期表示時には画像の画質を落としてぼやけた画像を表示してその後元画像が読み込まれたらきれいな画像を表示する、みたいなことができます。インラインでデータを持っているのでHTMLの表示と同時に画像の初期表示ができたりします。(その頃はよくわかってなかったがNostrのNIP-92で定義されているblurhashとかを使っていたんでしょう多分)
とにかくSSGは初期表示の速さが良い。というのが自分の頭の中にあるわけです。SSGのブログをNostrで作るとなると当然同じことがやりたい。
しかし、Nostrの画像はただのURLです。(オプショナルで画像のメタデータを定義できるimetaタグはあるが…)
基本的にSSGの画像最適化というのはローカルに存在する画像データをビルド時に変換するという流れで行われます。もしくはリモートURLに画像が置かれる場合は画像ストレージサービスやCDN上で配信されるときに最適化されることになります。
Nostrの画像はただの外部のURLですから(2回目)、ローカルの画像を変換する方法は採用できないわけです。無理やり実行するならビルド時にURLからすべての画像を一旦ダウンロードして変換するとかも考えましたが、ただの外部URLというのはつまりは一体どういうファイルなのかダウンロードしてみるまでわからない、要するに全然信頼できないということですから、よくわからないURLをかたっぱしからダウンロードするようなことは避けたいわけですね。(極端な話100GBの画像URLとかつくって攻撃されたら破綻しますよね)
ここが結構他の中央集権的なSNSと違って辛いところなのかなと思います。X(Twitter)とかであれば画像ストレージサーバは一つなので表示される画像の形式も一つに限定されるのですが、画像のアップロードが外部頼みでただのURLなので(3回目)何が来るかわからないということですね。
サーバ側で画像形式などを制限できない(imetaも信頼できるかわからない)となるとクライアント側でなんとか対応する必要があり、Nostrはクライアント側が大変なプロトコルだなあとということに思いを馳せていましたが、いろいろ考えたり調べた結果として作るべきものは画像最適化のためのプロキシサーバであるということがわかりました。
プロキシサーバというのはここでどういう働きをするのかというと、もとの画像がおいてあるサーバとクライアントのあいだに入って、もとの画像を一旦ダウンロードして圧縮したり縮小したりしてそのあとクライアントに送ってあげるという働きをします。
プロキシがないとき
[画像置き場] -> [クライアント]
プロキシがあるとき
[画像置き場] -> [プロキシ] -> [クライアント]
利点としてはクライアントが実際にダウンロードするのはサイズの小さな画像になるので通信量や画像の表示スピードは改善します。が、一方でサーバを経由する分通信にかかる時間(レイテンシ)が長くなります。というわけなので、当初の目的である表示速度の改善を実現するには、画像をエッジキャッシュするなどの対応が必須となります。平たく言うと一度送った画像はプロキシで保存しておいて次に要求されたらそれをすぐ返すということです。
画像をどれくらいのサイズにするか、画質はどうするかなどはプロキシに指示してあげれば良いのでクライアント側は想定通りの画像を受け取れてハッピーということになります。嘘です。ある程度はハッピーですが、プロキシ自体がエラーを返す可能性もあるし、処理できなくてもとの画像をそのまま返す場合もあります。そんなあれこれの結果、クライアントはフォールバック処理を実装する必要がありました。(それはまた別の記事で)
一方で自分はNostrのモバイルクライアントのヘビーユーザですので、Nostrの通信量の多さも解決したい課題でした。Nostrやってるとすぐギガがなくなります。 通信量の多さのボトルネックはウェブソケットで送られるNostrのイベントの通信量というよりは投稿に添付される画像のダウンロードの方ではないかという話もTLで耳にしたため(特に裏もとらず)、いっちょ画像最適化のプロキシサーバを作ってクライアントに実装してプルリクエスト投げるかと考えました。
そこで私はまずクライアントをAmethystからnostterに乗り換えることから始めました。なぜならばAmethystよりもTypeScriptとSvelteで書かれているnostterのほうがコントリビュートしやすかったという私的な事情です。
解決したい課題
遠回りしてきましたが課題はこれ。
- Nostrの画像の表示改善
- Nostrの通信量の改善
インターフェイス(設計)
画像最適化のプロキシは実装よりもインターフェースを考えるのが大変です。ここはとても苦労しそうな気がしたので、何も考えず cloudflare Imagesのインターフェースをそのまま借用することにしました。
https://developers.cloudflare.com/images/transform-images/transform-via-url/
また何かあってもcloudflare Imageに課金して乗り換えることが可能という利点もあります。
実装
とにかく時間がないので手グセでかけるTypeScriptかJS。かつ課金しないで可用性を維持できる無料枠のサーバレス環境が使いたかったので cloudflare workers に目星をつけて調査したところ、非常に素晴らしい記事を見つけましたのでこのwasmのライブラリをTSから呼び出して使わせていただくことにしました。
自分の実装したところはURLのパースと、キャッシュAPIの呼び出しを行って、最後にこのライブラリを叩くだけです。 ほかはクライアントキャッシュ用のヘッダーを書き換えたりとか細かいことはやっていますが全く大したことはやっておらず、サーバは非常にリーズナブルにやりたいことを実装した形になりました。 大変助かりました。
実装したものがこちらです。
https://github.com/ocknamo/nostr-image-optimizer
実装後の課題
このプロキシただのパブリックAPIなのでDoS攻撃に弱いです。何回もAPIをたたかれたら無料枠をすぐに超えてしまうことが容易に想像できました。 無料枠超えても使えなくなるだけで破産はしないので安心ですが、しかし対策は考える必要があります。
WAF
WAFです。APIに対するリクエスト回数などに対する制限をIPごとにかけています。また攻撃された場合検知できれば特定のIPや地域をブラックリストに入れることも可能です。
細かいことを説明してギリギリを攻めて攻撃されても困るので細かく説明しませんが、当初は全力でDoS攻撃されても無料枠超えないくらいの感じで制限をかけていました。 しかしNostrのTLをちょっと早めに表示するとすぐにWAFに引っかかってエラーになるという状態になることもあり、結局アイコンの表示は画像最適化の対象にしない方針にするなどの影響がありました。
いろいろあって、前提が変わり、もう少し制限をゆるくしたのでアイコンの対応は今後は検討できるかもしれません。
まとめ
割と手抜きで作ったことがわかるかと思います。実装しててNostrへの貢献ではあるはずですが、Nostrのプロトコル(NIPsとか)全然関係ないことやってるなと思いました。
フロントについては来週書きます。
次回のアドベントカレンダーの記事は eyemono.moe さんによる”クライアント自作を通して得られた知見まとめ”ですね!楽しみです!
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ c230edd3:8ad4a712
2024-12-02 03:49:19Chef's notes
This recipe is not my own, but it was great and easy, so I'm moving it here. Cooking as instructed serves 2, but this could easily be adjusted to include stir fry vegetables and rice, to make this a meal for 4.
Details
- ⏲️ Prep time: 15 minutes, 1-24 hours marinating
- 🍳 Cook time: 10-15 minutes
- 🍽️ Servings: 2-4
Ingredients
- 1 Venison Heart (elk would work well, too. recipe would need to be doubled)
- 1/2 Asian Pear, grated
- 2 Cloves Garlic, grated
- 1 Tbsp Ginger, grated
- 3 Tbsp Soy Sauce
- 1 Tbsp Honey
- 1 Tbsp Onion, grated
- 1 Tbsp Toasted Sesame Oil
- 1 tsp Red Pepper Flakes
- 2 Shallots, chopped
- Sesame Seeds
- Cooking Oil
Directions
- Mix all ingredients besides heart, shallots, sesame seeds and cooking oil in a medium bowl.
- Remove arteries and excess fat from heart, cut in half and rinse
- Cut into thin slices or bite size pieces
- Add to marinade, mix and cover. Allow to soak for 1-24 hours.
- Heat oil in large frying pan over med-high to high heat
- Drain excess marinade.
- Place heart in pan and sear on both sides to desired doneness. Medium rare is ideal for heart.
- Remove from pan and garnish with chopped shallots and sesame seeds. Serve with stir fry veggies and rice, if desired.
-
@ 07907690:d4e015f6
2024-12-11 03:45:40Dhruv Bansal, CSO dan Co-Founder Unchained mengeksplorasi prinsip-prinsip dan sejarah yang mengarah pada penciptaan Bitcoin dan mengajukan pertanyaan: "Apa yang telah dilakukan Satoshi"?
Bitcoin sering dibandingkan dengan internet pada tahun 1990an, namun saya yakin analogi yang lebih baik adalah dengan telegraf pada tahun 1840an.[^1]
Telegraf adalah teknologi pertama yang mengirimkan data yang dikodekan dengan kecepatan mendekati cahaya dalam jarak jauh. Ini menandai lahirnya industri telekomunikasi. Internet, meskipun skalanya lebih besar, kontennya lebih kaya, dan many-to-many, bukan one-to-one, pada dasarnya masih merupakan teknologi telekomunikasi.
Baik telegraf maupun internet bergantung pada model bisnis di mana perusahaan mengerahkan modal untuk membangun jaringan fisik dan kemudian membebankan biaya kepada pengguna untuk mengirim pesan melalui jaringan ini. Jaringan AT&T secara historis mengirimkan telegram, panggilan telepon, paket TCP/IP, pesan teks, dan sekarang TikTok.
Transformasi masyarakat melalui telekomunikasi telah menghasilkan kebebasan yang lebih besar namun juga sentralisasi yang lebih besar. Internet telah meningkatkan jangkauan jutaan pembuat konten dan usaha kecil, namun juga memperkuat jangkauan perusahaan, otoritas pusat, dan lembaga lain yang memiliki posisi yang cukup baik untuk memantau dan memanipulasi aktivitas online.
Namun Bitcoin bukanlah akhir dari transformasi apa pun—ini adalah awal dari sebuah transformasi. Seperti halnya telekomunikasi, Bitcoin akan mengubah kebiasaan umat manusia dan kehidupan sehari-harinya. Memprediksi seluruh cakupan perubahan saat ini sama dengan membayangkan internet saat hidup di era telegraf.
Seri ini mencoba membayangkan masa depan dengan memulai dari masa lalu. Artikel awal ini menelusuri sejarah mata uang digital sebelum Bitcoin. Hanya dengan memahami kegagalan proyek-proyek sebelumnya, kita dapat memahami apa yang membuat Bitcoin berhasil—dan bagaimana hal itu menyarankan metodologi untuk membangun sistem desentralisasi di masa depan.
Klaim utama dari artikel ini adalah bahwa Bitcoin dapat dianggap sebagai adaptasi dari proyek B-money Dai yang menghilangkan kebebasan untuk menciptakan uang. Hanya beberapa minggu setelah artikel ini pertama kali diterbitkan, email baru muncul di mana Satoshi mengaku tidak terbiasa dengan B-money, namun mengakui bahwa Bitcoin dimulai “tepat dari titik itu.” Mengingat bukti baru ini, kami yakin klaim utama ini, meskipun tidak akurat secara historis, masih merupakan cara yang bermakna dan bermanfaat untuk memikirkan asal usul Bitcoin.
Bagaimana Satoshi Nakamoto Memikirkan Bitcoin?
Satoshi memang cerdas, tetapi Bitcoin tidak muncul begitu saja.
Bitcoin mengulangi pekerjaan yang ada di bidang kriptografi, sistem terdistribusi, ekonomi, dan filsafat politik. Konsep proof-of-work sudah ada jauh sebelum digunakan dalam uang dan cypherpunk sebelumnya seperti Nick Szabo, Wei Dai, & Hal Finney mengantisipasi dan memengaruhi desain Bitcoin dengan proyek-proyek seperti bit gold, B-money, dan RPoW. Pertimbangkan bahwa, pada tahun 2008, ketika Satoshi menulis white paper Bitcoin[^2], banyak ide penting Bitcoin telah diusulkan dan/atau diimplementasikan:
- Mata uang digital harus berupa jaringan P2P
- Proof-of-work adalah dasar penciptaan uang
- Uang diciptakan melalui lelang
- Kunci publik kriptografi digunakan untuk menentukan kepemilikan dan transfer koin
- Transaksi dikelompokkan menjadi beberapa blok
- Blok dirangkai bersama melalui proof-of-work
- Semua blok disimpan oleh semua peserta
Bitcoin memanfaatkan semua konsep ini, tetapi Satoshi tidak menciptakan satu pun konsep tersebut. Untuk lebih memahami kontribusi Satoshi, kita harus menentukan prinsip Bitcoin mana yang tidak ada dalam daftar.
Beberapa kandidat yang jelas adalah persediaan Bitcoin yang terbatas, konsensus Nakamoto, dan algoritma penyesuaian kesulitan. Tapi apa yang mendorong Satoshi pada ide ini?
Artikel ini mengeksplorasi sejarah mata uang digital dan menyatakan bahwa fokus Satoshi pada kebijakan moneter yang sehat adalah hal yang menyebabkan Bitcoin mengatasi tantangan yang mengalahkan proyek-proyek sebelumnya seperti bit gold dan B-money.
Sistem yang Terdesentralisasi Adalah Pasar
Bitcoin sering digambarkan sebagai sistem terdesentralisasi atau terdistribusi. Sayangnya, kata “desentralisasi” dan “terdistribusi” sering kali membingungkan. Ketika diterapkan pada sistem digital, kedua istilah tersebut mengacu pada cara aplikasi monolitik dapat didekomposisi menjadi jaringan bagian-bagian yang berkomunikasi.
Untuk tujuan kita, perbedaan utama antara sistem terdesentralisasi dan terdistribusi bukanlah topologi diagram jaringannya, namun cara mereka menegakkan aturan. Kami meluangkan waktu di bagian berikut untuk membandingkan sistem terdistribusi dan desentralisasi dan memotivasi gagasan bahwa sistem desentralisasi yang kuat adalah pasar.
Sistem Terdistribusikan Bergantung pada Otoritas Pusat
Dalam hal ini, kami mengartikan “terdistribusi” sebagai sistem apa pun yang telah dipecah menjadi beberapa bagian (sering disebut sebagai "node") yang harus berkomunikasi, biasanya melalui jaringan.
Insinyur perangkat lunak semakin mahir dalam membangun sistem yang terdistribusi secara global. Internet terdiri dari sistem terdistribusi yang secara kolektif berisi miliaran node. Kita masing-masing memiliki simpul di saku kita yang berpartisipasi dan bergantung pada sistem ini.
Namun hampir semua sistem terdistribusi yang kita gunakan saat ini diatur oleh beberapa otoritas pusat, biasanya administrator sistem, perusahaan, atau pemerintah yang saling dipercaya oleh semua node dalam sistem.
Otoritas pusat memastikan semua node mematuhi aturan sistem dan menghapus, memperbaiki, atau menghukum node yang gagal mematuhinya. Mereka dipercaya untuk melakukan koordinasi, menyelesaikan konflik, dan mengalokasikan sumber daya bersama. Seiring waktu, otoritas pusat mengelola perubahan pada sistem, memperbarui atau menambahkan fitur, dan memastikan bahwa node yang berpartisipasi mematuhi perubahan tersebut.
Manfaat yang diperoleh sistem terdistribusi karena mengandalkan otoritas pusat juga disertai dengan biaya. Meskipun sistem ini kuat terhadap kegagalan node-nodenya, kegagalan otoritas pusat dapat menyebabkan sistem berhenti berfungsi secara keseluruhan. Kemampuan otoritas pusat untuk mengambil keputusan secara sepihak berarti menumbangkan atau menghilangkan otoritas pusat sudah cukup untuk mengendalikan atau menghancurkan keseluruhan sistem.
Terlepas dari adanya trade-off ini, jika ada persyaratan bahwa satu partai atau koalisi harus mempertahankan otoritas pusat, atau jika peserta dalam sistem tersebut puas dengan mengandalkan otoritas pusat, maka sistem terdistribusi tradisional adalah solusi terbaik. Tidak diperlukan blockchain, token, atau sistem desentralisasi serupa.
Secara khusus, kasus VC atau mata uang kripto yang didukung oleh pemerintah, dengan persyaratan bahwa satu pihak dapat memantau atau membatasi pembayaran dan membekukan akun, adalah kasus penggunaan yang sempurna untuk sistem terdistribusi tradisional.
Sistem Desentralisasi Tidak Memiliki Otoritas Pusat
Kami menganggap “desentralisasi” memiliki arti yang lebih kuat daripada “terdistribusi”: sistem desentralisasi adalah bagian dari sistem terdistribusi yang tidak memiliki otoritas pusat. Sinonim yang mirip dengan “desentralisasi” adalah “peer-to-peer” (P2P).
Menghapus otoritas pusat memberikan beberapa keuntungan. Sistem terdesentralisasi:
- Tumbuh dengan cepat karena tidak ada hambatan untuk masuk—siapa pun dapat mengembangkan sistem hanya dengan menjalankan node baru, dan tidak ada persyaratan untuk registrasi atau persetujuan dari otoritas pusat.
- Kuat karena tidak ada otoritas pusat yang kegagalannya dapat membahayakan berfungsinya sistem. Semua node adalah sama, jadi kegagalan bersifat lokal dan jaringan merutekan sekitar kerusakan.
- Sulit untuk ditangkap, diatur, dikenakan pajak, atau diawasi karena tidak adanya titik kendali terpusat yang dapat ditumbangkan oleh pemerintah.
Kekuatan inilah yang menjadi alasan Satoshi memilih desain Bitcoin yang terdesentralisasi dan peer-to-peer:
“Pemerintah pandai memotong… jaringan yang dikendalikan secara terpusat seperti Napster, namun jaringan P2P murni seperti Gnutella dan Tor tampaknya masih mampu bertahan.” - Satoshi Nakamoto, 2008
Namun kekuatan ini juga disertai dengan kelemahan. Sistem yang terdesentralisasi bisa menjadi kurang efisien karena setiap titik harus memikul tanggung jawab tambahan untuk koordinasi yang sebelumnya diambil alih oleh otoritas pusat.
Sistem yang terdesentralisasi juga sering dilanda perilaku yang bersifat penipuan dan bertentangan. Terlepas dari persetujuan Satoshi terhadap Gnutella, siapa pun yang menggunakan program berbagi file P2P untuk mengunduh file yang ternyata kotor atau berbahaya memahami alasan mengapa berbagi file P2P tidak pernah menjadi model utama untuk transfer data online.
Satoshi tidak menyebutkannya secara eksplisit, namun email adalah sistem terdesentralisasi lainnya yang menghindari kendali pemerintah. Dan email juga terkenal sebagai spam.
Sistem Desentralisasi diatur Melalui Insentif
Akar masalahnya, dalam semua kasus ini adalah, bahwa perilaku kejahatan (menyebarkan file buruk, mengirim email spam) tidak dihukum, dan perilaku kooperatif (menyebarkan file bagus, hanya mengirim email berguna) tidak dihargai. Sistem desentralisasi yang mengandalkan partisipannya untuk menjadi aktor yang baik gagal untuk berkembang karena sistem tersebut tidak dapat mencegah aktor jahat untuk ikut berpartisipasi.
Tanpa memaksakan otoritas pusat, satu-satunya cara untuk menyelesaikan masalah ini adalah dengan menggunakan insentif ekonomi. Aktor yang baik, menurut definisinya, bermain sesuai aturan karena mereka secara inheren termotivasi untuk melakukannya. Pelaku kejahatan, menurut definisinya, adalah orang yang egois dan licik, namun insentif ekonomi yang tepat dapat mengarahkan perilaku buruk mereka ke arah kebaikan bersama. Sistem yang terdesentralisasi melakukan hal ini dengan memastikan bahwa perilaku kooperatif menguntungkan dan perilaku kejahatan merugikan.
Cara terbaik untuk menerapkan layanan terdesentralisasi yang kuat adalah dengan menciptakan pasar di mana semua pelaku, baik dan buruk, dibayar untuk menyediakan layanan tersebut. Kurangnya hambatan masuk bagi pembeli dan penjual di pasar yang terdesentralisasi mendorong skala dan efisiensi. Jika protokol pasar dapat melindungi partisipan dari penipuan, pencurian, dan penyalahgunaan, maka pelaku kejahatan akan merasa lebih menguntungkan untuk mengikuti aturan atau menyerang sistem lain.
Pasar yang Terdesentralisasi Membutuhkan Barang yang Terdesentralisasi
Namun pasar itu rumit. Mereka harus memberi pembeli dan penjual kemampuan untuk mengirimkan penawaran dan permintaan serta menemukan, mencocokkan, dan menyelesaikan pesanan. Kebijakan tersebut harus adil, memberikan konsistensi yang kuat, dan menjaga ketersediaan meskipun terjadi masa-masa yang tidak menentu.
Pasar global saat ini sangat mumpuni dan canggih, namun menggunakan barang-barang tradisional dan jaringan pembayaran untuk menerapkan insentif di pasar yang terdesentralisasi bukanlah hal yang baru. Setiap penggabungan antara sistem desentralisasi dan uang fiat, aset tradisional, atau komoditas fisik akan menimbulkan kembali ketergantungan pada otoritas pusat yang mengontrol pemroses pembayaran, bank, dan bursa.
Sistem terdesentralisasi tidak dapat mentransfer uang tunai, mencari saldo rekening perantara, atau menentukan kepemilikan properti. Barang-barang tradisional sama sekali tidak terbaca dalam sistem desentralisasi. Hal sebaliknya tidak benar—sistem tradisional dapat berinteraksi dengan Bitcoin semudah aktor lainnya (begitu mereka memutuskan ingin melakukannya). Batasan antara sistem tradisional dan desentralisasi bukanlah sebuah tembok yang tidak dapat dilewati, melainkan sebuah membran semi-permeabel.
Ini berarti bahwa sistem yang terdesentralisasi tidak dapat melaksanakan pembayaran dalam mata uang barang tradisional apa pun. Mereka bahkan tidak dapat menentukan saldo rekening yang didominasi fiat atau kepemilikan real estat atau barang fisik. Seluruh perekonomian tradisional sama sekali tidak terbaca dalam sistem desentralisasi.
Menciptakan pasar yang terdesentralisasi membutuhkan perdagangan barang-barang baru yang terdesentralisasi yang dapat dibaca dan ditransfer dalam sistem yang terdesentralisasi.
Komputasi Adalah Barang Terdesentralisasi yang Pertama
Contoh pertama dari “barang terdesentralisasi” adalah kelas komputasi khusus yang pertama kali diusulkan pada tahun 1993 oleh Cynthia Dwork dan Moni Naor.[^3]
Karena adanya hubungan mendalam antara matematika, fisika, dan ilmu komputer, komputasi ini memerlukan energi dan sumber daya perangkat keras di dunia nyata—hal ini tidak dapat dipalsukan. Karena sumber daya di dunia nyata langka, komputasi ini juga langka.
input untuk komputasi ini dapat berupa data apa pun. Keluaran yang dihasilkan adalah “bukti” digital bahwa pengkomputasian telah dilakukan pada data input yang diberikan. Pembuktian mengandung “kesulitan” tertentu yang merupakan bukti (statistik) dari sejumlah pekerjaan komputasi tertentu. Yang terpenting, hubungan antara data input, pembuktian, dan pekerjaan komputasi asli yang dilakukan dapat diverifikasi secara independen tanpa perlu mengajukan banding ke otoritas pusat mana pun.
Gagasan untuk menyebarkan beberapa data input bersama dengan bukti digital sebagai bukti kerja komputasi dunia nyata yang dilakukan pada input tersebut sekarang disebut “proof-of-work”.[^4] Proof-of-work adalah, jika menggunakan ungkapan Nick Szabo, “biaya yang tidak dapat ditiru”. Karena proof-of-work dapat diverifikasi oleh siapa pun, maka proof-of-work merupakan sumber daya ekonomi yang dapat dibaca oleh semua peserta dalam sistem desentralisasi. Proof-of-work mengubah penghitungan data menjadi barang yang terdesentralisasi. Dwork & Naor mengusulkan penggunaan komputasi untuk membatasi penyalahgunaan sumber daya bersama dengan memaksa peserta untuk memberikan proof-of-work dengan tingkat kesulitan minimum tertentu sebelum mereka dapat mengakses sumber daya:
“Dalam makalah ini kami menyarankan pendekatan komputasi untuk memerangi penyebaran surat elektronik. Secara umum, kami telah merancang mekanisme kontrol akses yang dapat digunakan kapan pun diinginkan untuk membatasi, namun tidak melarang, akses ke sumber daya.” - Dwoak & Naor, 1993
Dalam proposal Dwork & Naor, administrator sistem email akan menetapkan tingkat kesulitan bukti kerja minimum untuk mengirimkan email. Pengguna yang ingin mengirim email perlu melakukan sejumlah komputasi yang sesuai dengan email tersebut sebagai data input. Bukti yang dihasilkan akan dikirimkan ke server bersamaan dengan permintaan pengiriman email.
Dwork & Naor menyebut kesulitan proof-of-work sebagai “fungsi penetapan harga” karena, dengan menyesuaikan kesulitan tersebut, “otoritas penetapan harga” dapat memastikan bahwa sumber daya bersama tetap murah untuk digunakan bagi pengguna yang jujur dan rata-rata, namun mahal bagi pengguna yang mencari untuk mengeksploitasinya. Di pasar pengiriman email, administrator server adalah otoritas penetapan harga; mereka harus memilih “harga” untuk pengiriman email yang cukup rendah untuk penggunaan normal namun terlalu tinggi untuk spam.
Meskipun Dwork & Naor membingkai proof-of-work sebagai disinsentif ekonomi untuk memerangi penyalahgunaan sumber daya, nomenklatur “fungsi penetapan harga” dan “otoritas penetapan harga” mendukung interpretasi yang berbeda dan berbasis pasar: pengguna membeli akses ke sumber daya dengan imbalan komputasi pada tingkat yang sama. harga yang ditetapkan oleh pengontrol sumber daya.
Dalam interpretasi ini, jaringan pengiriman email sebenarnya adalah pengiriman email perdagangan pasar yang terdesentralisasi untuk komputasi. Kesulitan minimum dari proof-of-work adalah harga yang diminta untuk pengiriman email dalam mata uang komputasi.
Mata Uang Adalah Barang Terdesentralisasi yang kedua
Namun komputasi bukanlah mata uang yang baik.
Bukti yang digunakan untuk “memperdagangkan” komputasi hanya valid untuk input yang digunakan dalam komputasi tersebut. Hubungan yang tidak dapat dipecahkan antara bukti spesifik dan input tertentu berarti bahwa proof-of-work untuk satu input tidak dapat digunakan kembali untuk input yang berbeda.
Proof-of-work awalnya diusulkan sebagai mekanisme kontrol akses untuk membatasi email spam. Pengguna diharapkan memberikan bukti kerja bersama email apa pun yang ingin mereka kirim. Mekanisme ini juga dapat dianggap sebagai pasar di mana pengguna membeli pengiriman email dengan komputasi pada harga yang dipilih oleh penyedia layanan email.
Batasan ini berguna – dapat digunakan untuk mencegah pekerjaan yang dilakukan oleh satu pembeli di pasar kemudian dibelanjakan kembali oleh pembeli lain. Misalnya, HashCash, implementasi nyata pertama dari pasar pengiriman email, menyertakan metadata seperti stempel waktu saat ini dan alamat email pengirim dalam data masukan untuk penghitungan bukti kerja. Bukti yang dihasilkan oleh pengguna tertentu untuk email tertentu, tidak dapat digunakan untuk email yang berbeda.
Namun ini juga berarti bahwa komputasi bukti kerja adalah barang yang dipesan lebih dahulu. Dana tersebut tidak dapat dipertukarkan, tidak dapat dibelanjakan kembali,[^5] dan tidak memecahkan masalah kebutuhan yang terjadi secara kebetulan. Properti moneter yang hilang ini mencegah komputasi menjadi mata uang. Terlepas dari namanya, tidak ada insentif bagi penyedia pengiriman email untuk ingin mengakumulasikan HashCash, karena akan ada uang tunai sebenarnya.
Adam Back, penemu HashCash, memahami masalah berikut:
"Hashcash tidak dapat ditransfer secara langsung karena untuk membuatnya didistribusikan, setiap penyedia layanan hanya menerima pembayaran dalam bentuk tunai yang dibuat untuk mereka. Anda mungkin dapat menyiapkan pencetakan gaya digicash (dengan chaumian ecash) dan meminta bank hanya mencetak uang tunai pada penerimaan tabrakan hash yang ditangani. Namun ini berarti Anda harus mempercayai bank untuk tidak mencetak uang dalam jumlah tak terbatas untuk digunakan sendiri." - Adam Back, 1997
Kita tidak ingin menukar komputasi yang dibuat khusus untuk setiap barang atau jasa yang dijual dalam perekonomian yang terdesentralisasi. Kita menginginkan mata uang digital serba guna yang dapat langsung digunakan untuk mengoordinasikan pertukaran nilai di pasar mana pun.
Membangun mata uang digital yang berfungsi namun tetap terdesentralisasi merupakan tantangan yang signifikan. Mata uang membutuhkan unit yang dapat dipertukarkan dengan nilai yang sama yang dapat ditransfer antar pengguna. Hal ini memerlukan model penerbitan, definisi kriptografi kepemilikan dan transfer, proses penemuan dan penyelesaian transaksi, dan buku besar historis. Infrastruktur ini tidak diperlukan ketika bukti kerja hanya dianggap sebagai “mekanisme kontrol akses”.
Terlebih lagi, sistem desentralisasi adalah pasar, jadi semua fungsi dasar mata uang ini harus disediakan melalui penyedia layanan berbayar… dalam satuan mata uang yang sedang dibuat!
Seperti mengkompilasi compiler pertama, permulaan jaringan listrik yang gelap, atau evolusi kehidupan itu sendiri, pencipta mata uang digital dihadapkan pada masalah bootstrapping: bagaimana mendefinisikan insentif ekonomi yang mendasari mata uang yang berfungsi tanpa memiliki mata uang yang berfungsi di dalamnya yang akan mendenominasikan atau membayar insentif tersebut.
Komputasi dan mata uang adalah barang pertama dan kedua di pasar yang terdesentralisasi. Proof-of-work sendiri memungkinkan pertukaran komputasi tetapi mata uang yang berfungsi memerlukan lebih banyak infrastruktur. Butuh waktu 15 tahun bagi komunitas cypherpunk untuk mengembangkan infrastruktur tersebut.
Pasar Terdesentralisasi Pertama harus Memperdagangkan Komputasi untuk Mata Uang
Kemajuan dalam masalah bootstrapping ini berasal dari penyusunan batasan yang tepat.
Sistem yang terdesentralisasi harus menjadi pasar. Pasar terdiri dari pembeli dan penjual yang saling bertukar barang. Pasar terdesentralisasi untuk mata uang digital hanya memiliki dua barang yang dapat dibaca di dalamnya:
- Komputasi melalui proof-of-work
- Unit mata uang yang kita coba bangun
Oleh karena itu, satu-satunya perdagangan pasar yang memungkinkan adalah antara kedua barang tersebut. Komputasi harus dijual untuk satuan mata uang atau setara dengan satuan mata uang harus dijual untuk komputasi. Menyatakan hal ini sangatlah mudah—bagian tersulitnya adalah menata pasar ini sehingga sekadar menukar mata uang untuk komputasi akan mem-bootstrap semua kemampuan mata uang itu sendiri!
Seluruh sejarah mata uang digital yang berpuncak pada white paper Satoshi tahun 2008 adalah serangkaian upaya yang semakin canggih dalam menata pasar ini. Bagian berikut mengulas proyek-proyek seperti bit gold milik Nick Szabo dan B-money milik Wei Dai. Memahami bagaimana proyek-proyek ini menyusun pasar mereka dan mengapa mereka gagal akan membantu kita memahami mengapa Satoshi dan Bitcoin berhasil.
Bagaimana Sistem Desentralisasi Dapat Menentukan Harga Komputasi?
Fungsi utama pasar adalah penemuan harga. Oleh karena itu, komputasi perdagangan pasar untuk mata uang harus menemukan harga komputasi itu sendiri, dalam satuan mata uang tersebut.
Kita biasanya tidak memberikan nilai moneter pada komputasi. Kita biasanya menghargai kapasitas untuk melakukan komputasi karena kita menghargai output dari komputasi, bukan komputasi itu sendiri. Jika keluaran yang sama dapat dilakukan dengan lebih efisien, dengan komputasi yang lebih sedikit, hal ini biasanya disebut “kemajuan”.
Proof-of-work mewakili komputasi spesifik yang keluarannya hanya berupa bukti bahwa komputasi tersebut telah dilakukan. Menghasilkan bukti yang sama dengan melakukan lebih sedikit komputasi dan lebih sedikit pekerjaan tidak akan menghasilkan kemajuan—hal ini akan menjadi bug. Oleh karena itu, komputasi yang terkait dengan Proof-of-work merupakan hal yang aneh dan baru untuk dicoba dihargai.
Ketika bukti kerja dianggap sebagai disinsentif terhadap penyalahgunaan sumber daya, maka bukti kerja tidak perlu dinilai secara tepat dan konsisten. Yang terpenting adalah penyedia layanan email menetapkan tingkat kesulitan yang cukup rendah sehingga tidak terlihat oleh pengguna yang sah, namun cukup tinggi sehingga menjadi penghalang bagi pelaku spam. Oleh karena itu, terdapat beragam “harga” yang dapat diterima dan setiap peserta bertindak sebagai otoritas penetapan harga mereka sendiri, dengan menerapkan fungsi penetapan harga lokal.
Namun satuan mata uang dimaksudkan agar dapat dipertukarkan, masing-masing memiliki nilai yang sama. Karena perubahan teknologi dari waktu ke waktu, dua unit mata uang yang dibuat dengan tingkat kesulitan proof-of-work yang sama—yang diukur dengan jumlah komputasi yang sesuai—mungkin memiliki biaya produksi yang sangat berbeda di dunia nyata, yang diukur dengan waktu, energi, dan/atau modal untuk melakukan komputasi tersebut. Ketika komputasi dijual dengan menggunakan mata uang, dan biaya produksi yang mendasarinya bervariasi, bagaimana pasar dapat memastikan harga yang konsisten?
Nick Szabo dengan jelas mengidentifikasi masalah harga ini ketika menjelaskan bit gold:
"Masalah utamanya...adalah bahwa skema pembuktian kerja bergantung pada arsitektur komputer, bukan hanya matematika abstrak yang didasarkan pada "siklus komputasi" abstrak. ...Jadi, ada kemungkinan untuk menjadi produsen berbiaya sangat rendah (dengan beberapa kali lipat besarnya) dan membanjiri pasar dengan bit gold." - Szabo, 2005
Mata uang terdesentralisasi yang diciptakan melalui proof-of-work akan mengalami kelebihan pasokan dan penurunan pasokan seiring dengan perubahan pasokan komputasi seiring waktu. Untuk mengakomodasi volatilitas ini, jaringan harus belajar menghitung harga secara dinamis.
Mata uang digital awal mencoba memberi harga pada komputasi dengan mencoba mengukur “biaya komputasi” secara kolektif. Wei Dai, misalnya, mengusulkan solusi praktis berikut dalam B-money:
"Jumlah unit moneter yang diciptakan sama dengan biaya upaya komputasi dalam sekeranjang komoditas standar. Sebagai contoh, jika sebuah masalah memerlukan waktu 100 jam untuk diselesaikan pada komputer yang dapat menyelesaikannya dengan cara yang paling ekonomis, dan diperlukan 3 keranjang standar untuk membeli 100 jam waktu komputasi pada komputer tersebut di pasar terbuka, maka setelah solusi terhadap masalah tersebut disiarkan, setiap orang mengkredit rekening penyiar sebanyak 3 unit." - Dai, 1998
Sayangnya, Dai tidak menjelaskan bagaimana pengguna dalam sistem yang seharusnya terdesentralisasi seharusnya menyetujui definisi “keranjang standar”, komputer mana yang memecahkan masalah tertentu “paling ekonomis”, atau biaya komputasi di “pasar terbuka”. Mencapai konsensus di antara semua pengguna mengenai kumpulan data bersama yang berubah-ubah terhadap waktu adalah masalah penting dalam sistem desentralisasi!
Agar adil bagi Dai, dia menyadari hal ini:
“Salah satu bagian yang lebih bermasalah dalam protokol B-money adalah penciptaan uang. Bagian dari protokol ini mengharuskan semua [pengguna] memutuskan dan menyetujui biaya perhitungan tertentu. Sayangnya karena teknologi komputasi cenderung berkembang pesat dan tidak selalu bersifat publik, informasi ini mungkin tidak tersedia, tidak akurat, atau ketinggalan jaman, yang semuanya akan menyebabkan masalah serius pada protokol." - Dai, 1998
Dai kemudian mengusulkan mekanisme penetapan harga berbasis lelang yang lebih canggih yang kemudian dikatakan Satoshi sebagai titik awal idenya. Kita akan kembali ke skema lelang di bawah ini, tapi pertama-tama mari kita beralih ke bit gold, dan pertimbangkan wawasan Szabo tentang masalahnya.
Gunakan Pasar Eksternal
Szabo mengklaim bahwa proof-of-work harus “diberi stempel waktu dengan aman”:
"Bukti kerja diberi stempel waktu yang aman. Ini harus bekerja secara terdistribusi, dengan beberapa layanan stempel waktu berbeda sehingga tidak ada layanan stempel waktu tertentu yang perlu diandalkan secara substansial." - Szabo, 2005
Szabo tertaut ke halaman sumber daya tentang protokol penandaan waktu yang aman tetapi tidak menjelaskan algoritme spesifik apa pun untuk penandaan waktu yang aman. Ungkapan “aman” dan “fesyen terdistribusi” mempunyai pengaruh yang besar di sini, sehingga dapat mengatasi kerumitan dalam mengandalkan satu (atau banyak) layanan “di luar sistem” untuk penandaan waktu.[^6]
Waktu pembuatan unit mata uang digital penting karena menghubungkan komputasi yang dilakukan dengan biaya produksi di dunia nyata.
Terlepas dari ketidakjelasan implementasi, Szabo benar—waktu pembuatan proof-of-work merupakan faktor penting dalam menentukan harga karena terkait dengan biaya komputasi:
"…Namun, karena bit gold diberi stempel waktu, waktu yang dibuat serta tingkat kesulitan matematis dari pekerjaan tersebut dapat dibuktikan secara otomatis. Dari sini, biasanya dapat disimpulkan berapa biaya produksi selama periode waktu tersebut..." - Szabo, 2005
"Menyimpulkan" biaya produksi adalah hal yang penting karena bit gold tidak memiliki mekanisme untuk membatasi penciptaan uang. Siapapun dapat membuat bit gold dengan melakukan perhitungan yang sesuai. Tanpa kemampuan untuk mengatur penerbitan, bit gold sama dengan barang koleksi:
"…Tidak seperti atom emas yang dapat dipertukarkan, tetapi seperti halnya barang-barang kolektor, pasokan dalam jumlah besar selama jangka waktu tertentu akan menurunkan nilai barang-barang tersebut. Dalam hal ini, emas kecil bertindak lebih seperti barang-barang kolektor daripada seperti emas..." - Szabo, 2005
Bit gold memerlukan proses eksternal tambahan untuk menciptakan unit mata uang yang sepadan:
“…[B]it Gold tidak dapat dipertukarkan berdasarkan fungsi sederhana, misalnya, panjang tali. Sebaliknya, untuk membuat unit yang dapat dipertukarkan, dealer harus menggabungkan potongan-potongan bit gold dengan nilai berbeda ke dalam satuan yang lebih besar kira-kira dengan nilai yang sama. Hal ini serupa dengan apa yang dilakukan banyak pedagang komoditas saat ini untuk memungkinkan pasar komoditas bekerja. Kepercayaan masih terdistribusi karena perkiraan nilai dari kumpulan tersebut dapat diverifikasi secara independen oleh banyak pihak lain dengan cara yang sebagian besar atau seluruhnya otomatis." - Szabo, 2005
Mengutip Szabo, “untuk menguji nilai… bit gold, dealer memeriksa dan memverifikasi tingkat kesulitan, masukan, dan stempel waktu”. Dealer yang mendefinisikan “unit yang lebih besar dengan nilai yang kira-kira sama” menyediakan fungsi penetapan harga yang serupa dengan “keranjang komoditas standar” Dai. Unit yang dapat dipertukarkan tidak dibuat dalam bentuk bit gold ketika bukti kerja diproduksi, hanya kemudian ketika bukti tersebut digabungkan menjadi “unit yang kira-kira bernilai sama” oleh dealer di pasar di luar jaringan.
Yang patut disyukuri, Szabo mengakui kelemahan ini:
"…Potensi kelebihan pasokan yang awalnya tersembunyi karena inovasi tersembunyi dalam arsitektur mesin adalah potensi kelemahan dalam bit gold, atau setidaknya ketidaksempurnaan yang harus diatasi oleh lelang awal dan pertukaran ex post bit gold." - Szabo, 2005
Sekali lagi, meskipun belum sampai pada (yang sekarang kita kenal sebagai) solusinya, Szabo menunjukkan solusinya: karena biaya komputasi berubah seiring waktu, jaringan harus merespons perubahan pasokan komputasi dengan menyesuaikan harga uang.
Gunakan Pasar Internal
Dealer Szabo akan menjadi pasar eksternal yang menentukan harga (bundel dari) bit gold setelah penciptaannya. Apakah mungkin menerapkan pasar ini di dalam sistem dan bukan di luar sistem?
Mari kita kembali ke Wei Dai dan B-money. Seperti disebutkan sebelumnya, Dai mengusulkan model alternatif berbasis lelang untuk pembuatan B-money. Desain Satoshi untuk Bitcoin meningkat secara langsung pada model lelang B-money[^7]:
“Jadi saya mengusulkan subprotokol penciptaan uang alternatif, di mana [pengguna]… memutuskan dan menyetujui jumlah B-money yang akan dibuat setiap periode, dengan biaya pembuatan uang tersebut ditentukan melalui lelang. Setiap periode pembuatan uang adalah dibagi menjadi empat tahap, sebagai berikut:
Planning. Para [pengguna] menghitung dan bernegosiasi satu sama lain untuk menentukan peningkatan jumlah uang beredar yang optimal untuk periode berikutnya. Apakah [jaringan] dapat mencapai konsensus atau tidak, mereka masing-masing menyiarkan kuota penciptaan uang mereka dan komputasi makroekonomi apa pun yang dilakukan untuk mendukung angka tersebut.
Bidding. Siapapun yang ingin membuat B-money menyiarkan tawaran dalam bentuk dimana x adalah banyaknya B-money yang ingin dibuatnya, dan y adalah soal yang belum terselesaikan dari kelas soal yang telah ditentukan. Setiap masalah di kelas ini harus memiliki biaya nominal (katakanlah dalam MIPS-years) yang disetujui secara publik.
Computation. Setelah melihat penawaran, pihak yang mengajukan penawaran pada tahap penawaran sekarang dapat menyelesaikan masalah dalam penawarannya dan menyiarkan solusinya. Penciptaan uang.
Money creation. Setiap [pengguna] menerima tawaran tertinggi (di antara mereka yang benar-benar menyiarkan solusi) dalam hal biaya nominal per unit B-money yang dibuat dan memberikan kredit kepada akun penawar sesuai dengan itu."
- Dai, 1998B-money membuat kemajuan signifikan menuju struktur pasar yang tepat untuk mata uang digital. Ini berupaya untuk menghilangkan dealer eksternal Szabo dan memungkinkan pengguna untuk terlibat dalam penemuan harga dengan menawar satu sama lain secara langsung.
Namun menerapkan proposal Dai seperti yang tertulis akan menjadi sebuah tantangan:
- Dalam fase "Planning”, pengguna menanggung beban menegosiasikan “peningkatan optimal jumlah uang beredar untuk periode berikutnya”. Bagaimana “optimal” harus didefinisikan, bagaimana pengguna harus bernegosiasi satu sama lain, dan bagaimana hasil negosiasi tersebut dibagikan tidak dijelaskan.
- Terlepas dari apa yang direncanakan, fase “Bidding” memungkinkan siapa saja untuk mengajukan “tawaran” untuk membuat B-money. Tawaran mencakup jumlah B-money yang akan dibuat serta jumlah bukti kerja yang sesuai sehingga setiap penawaran adalah harga, jumlah perhitungan yang bersedia dilakukan oleh penawar tertentu untuk membeli sejumlah tertentu. dari B-money.
- Setelah penawaran diserahkan, fase “Computation” terdiri dari peserta lelang yang melakukan proof-of-work yang mereka tawarkan dan menyiarkan solusi. Tidak ada mekanisme untuk mencocokkan penawar dengan solusi yang disediakan. Yang lebih problematis adalah tidak jelasnya bagaimana pengguna dapat mengetahui bahwa semua penawaran telah diajukan – kapan fase “Bidding” berakhir dan fase “Computation” dimulai?
- Masalah-masalah ini berulang dalam fase “Money creation”. Karena sifat proof-of-work, pengguna dapat memverifikasi bahwa bukti yang mereka terima dalam solusi adalah asli. Namun bagaimana pengguna dapat secara kolektif menyepakati serangkaian “tawaran tertinggi”? Bagaimana jika pengguna yang berbeda memilih set yang berbeda, baik karena preferensi atau latensi jaringan?
Sistem yang terdesentralisasi kesulitan dalam melacak data dan membuat pilihan secara konsisten, namun B-money memerlukan pelacakan tawaran dari banyak pengguna dan membuat pilihan konsensus di antara mereka. Kompleksitas ini menghalangi penerapan B-money.
Akar dari kompleksitas ini adalah keyakinan Dai bahwa tingkat “optimal” penciptaan B-money harus berfluktuasi seiring waktu berdasarkan “perhitungan makroekonomi” penggunanya. Seperti bit gold, B-money tidak memiliki mekanisme untuk membatasi penciptaan uang. Siapapun dapat membuat unit B-money dengan menyiarkan tawaran dan kemudian melakukan proof-of-work yang sesuai.
Baik Szabo maupun Dai mengusulkan penggunaan pasar pertukaran mata uang digital untuk komputasi, namun baik bit gold maupun B-money tidak menentukan kebijakan moneter untuk mengatur pasokan mata uang di pasar ini.
Tujuan Kebijakan Moneter Satoshi Menghasilkan Bitcoin
Sebaliknya, kebijakan moneter yang sehat adalah salah satu tujuan utama Satoshi dalam proyek Bitcoin. Dalam postingan milis pertama tempat Bitcoin diumumkan, Satoshi menulis:
“Akar permasalahan mata uang konvensional adalah kepercayaan yang diperlukan agar mata uang tersebut dapat berfungsi. Bank sentral harus dipercaya untuk tidak merendahkan mata uang tersebut, namun sejarah mata uang fiat penuh dengan pelanggaran terhadap kepercayaan tersebut.” - Satoshi, 2009
Satoshi selanjutnya menjelaskan masalah lain dengan mata uang fiat seperti perbankan cadangan fraksional yang berisiko, kurangnya privasi, pencurian & penipuan yang merajalela, dan ketidakmampuan melakukan pembayaran mikro. Namun Satoshi memulai dengan isu penurunan nilai oleh bank sentral—dengan kekhawatiran mengenai kebijakan moneter.
Satoshi ingin Bitcoin pada akhirnya mencapai pasokan sirkulasi terbatas yang tidak dapat terdilusi seiring waktu. Tingkat penciptaan Bitcoin yang “optimal”, bagi Satoshi, pada akhirnya akan menjadi nol.
Tujuan kebijakan moneter ini, lebih dari karakteristik lain yang mereka miliki secara pribadi (atau kolektif!), adalah alasan Satoshi “menemukan” Bitcoin, blockchain, konsensus Nakamoto, dll. —dan bukan orang lain. Ini adalah jawaban singkat atas pertanyaan yang diajukan dalam judul artikel ini: Satoshi memikirkan Bitcoin karena mereka fokus pada penciptaan mata uang digital dengan persediaan terbatas.
Pasokan Bitcoin yang terbatas bukan hanya tujuan kebijakan moneter atau meme bagi para Bitcoiner untuk berkumpul. Penyederhanaan teknis penting inilah yang memungkinkan Satoshi membangun mata uang digital yang berfungsi sementara B-money Dai tetap menjadi postingan web yang menarik.
Bitcoin adalah B-money dengan persyaratan tambahan berupa kebijakan moneter yang telah ditentukan. Seperti banyak penyederhanaan teknis lainnya, pembatasan kebijakan moneter memungkinkan kemajuan dengan mengurangi ruang lingkup. Mari kita lihat bagaimana masing-masing fase pembuatan B-money disederhanakan dengan menerapkan batasan ini.
Semua Pasokan 21 Juta Bitcoin Sudah Ada
Dalam b-money, setiap “periode penciptaan uang” mencakup fase “Perencanaan”, di mana pengguna diharapkan untuk membagikan “perhitungan makroekonomi” mereka yang membenarkan jumlah b-money yang ingin mereka ciptakan pada saat itu. Tujuan kebijakan moneter Satoshi yaitu pasokan terbatas dan emisi nol tidak sesuai dengan kebebasan yang diberikan b-money kepada pengguna individu untuk menghasilkan uang. Oleh karena itu, langkah pertama dalam perjalanan dari bmoney ke bitcoin adalah menghilangkan kebebasan ini. Pengguna bitcoin perorangan tidak dapat membuat bitcoin. Hanya jaringan bitcoin yang dapat membuat bitcoin, dan hal ini terjadi tepat sekali, pada tahun 2009 ketika Satoshi meluncurkan proyek bitcoin.
Satoshi mampu menggantikan fase “Perencanaan” b-money yang berulang menjadi satu jadwal yang telah ditentukan sebelumnya di mana 21 juta bitcoin yang dibuat pada tahun 2009 akan dilepaskan ke peredaran. Pengguna secara sukarela mendukung kebijakan moneter Satoshi dengan mengunduh dan menjalankan perangkat lunak Bitcoin Core yang kebijakan moneternya dikodekan secara keras.
Hal ini mengubah semantik pasar bitcoin untuk komputasi. Bitcoin yang dibayarkan kepada penambang bukanlah hal baru yang diterbitkan; itu melainkan baru dirilis ke peredaran dari persediaan yang ada.
Pandangan ini sangat berbeda dari klaim naif bahwa “penambang bitcoin menciptakan bitcoin”. Penambang Bitcoin tidak menciptakan bitcoin, mereka membelinya. Bitcoin tidak berharga karena “bitcoin terbuat dari energi”—tetapi nilai bitcoin didemonstrasikan dengan dijual untuk mendapatkan energi.
Mari kita ulangi sekali lagi: bitcoin tidak dibuat melalui proof-of-work, bitcoin dibuat melalui konsensus.
Desain Satoshi menghilangkan persyaratan untuk fase “Perencanaan” yang berkelanjutan dari b-money dengan melakukan semua perencanaan terlebih dahulu. Hal ini memungkinkan Satoshi untuk membuat kebijakan moneter yang sehat namun juga menyederhanakan penerapan bitcoin.
Bitcoin dihargai Melalui Konsensus
Kebebasan yang diberikan kepada pengguna untuk menghasilkan uang menimbulkan beban yang sesuai bagi jaringan bmoney. Selama fase “Penawaran” jaringan b-money harus mengumpulkan dan membagikan “tawaran” pembuatan uang dari banyak pengguna yang berbeda.
Menghilangkan kebebasan untuk menghasilkan uang akan meringankan beban jaringan bitcoin. Karena seluruh 21 juta bitcoin sudah ada, jaringan tidak perlu mengumpulkan tawaran dari pengguna untuk menghasilkan uang, jaringan hanya perlu menjual bitcoin sesuai jadwal Satoshi yang telah ditentukan.
Jaringan bitcoin dengan demikian menawarkan konsensus harga permintaan untuk bitcoin yang dijualnya di setiap blok. Harga tunggal ini dihitung oleh setiap node secara independen menggunakan salinan blockchainnya. Jika node memiliki konsensus pada blockchain yang sama (poin yang akan kita bahas nanti) mereka semua akan menawarkan harga permintaan yang sama di setiap blok.[^8]
Bagian pertama kalkulasi harga konsensus menentukan berapa banyak bitcoin yang akan dijual. Hal ini diperbaiki oleh jadwal rilis Satoshi yang telah ditentukan sebelumnya. Semua node bitcoin di jaringan menghitung jumlah yang sama untuk blok tertentu:
$ bitcoin-cli getblockstats <block\_height> {... "subsidy": 6250000000, ... } # 6.25 BTC
Bagian kedua dari harga yang diminta secara konsensus adalah jumlah komputasi yang akan menjual subsidi saat ini. Sekali lagi, semua node bitcoin di jaringan menghitung nilai yang sama (kita akan meninjau kembali kalkulasi tingkat kesulitan ini di bagian berikutnya):
$ bitcoin-cli getdifficulty {... "result": 55621444139429.57, ... }
Bersama-sama, subsidi dan kesulitan jaringan menentukan permintaan bitcoin saat ini sebagai mata uang komputasi. Karena blockchain berada dalam konsensus, harga ini adalah harga konsensus.
Pengguna b-money juga dianggap memiliki konsensus “blockchain” yang berisi riwayat semua transaksi. Namun Dai tidak pernah memikirkan solusi sederhana berupa konsensus tunggal yang meminta harga untuk pembuatan b-money baru, yang hanya ditentukan oleh data di blockchain tersebut.
Sebaliknya, Dai berasumsi bahwa penciptaan uang harus berlangsung selamanya. Oleh karena itu, pengguna individu perlu diberdayakan untuk mempengaruhi kebijakan moneter – seperti halnya mata uang fiat. Persyaratan yang dirasakan ini membuat Dai merancang sistem penawaran yang mencegah penerapan b-money.
Kompleksitas tambahan ini dihilangkan dengan persyaratan Satoshi mengenai kebijakan moneter yang telah ditentukan sebelumnya.
Waktu Menutup Semua Penyebaran
Dalam fase “Komputasi” b-money, pengguna individu akan melakukan komputasi yang telah mereka lakukan dalam penawaran sebelumnya. Dalam bitcoin, seluruh jaringan adalah penjual – tetapi siapa pembelinya?
Di pasar pengiriman email, pembelinya adalah individu yang ingin mengirim email. Otoritas penetapan harga, penyedia layanan email, akan menetapkan harga yang dianggap murah bagi individu namun mahal bagi pelaku spam. Namun jika jumlah pengguna yang sah bertambah, harganya masih bisa tetap sama karena kekuatan komputasi masing-masing pengguna akan tetap sama.
Di b-money, setiap pengguna yang menyumbangkan tawaran untuk pembuatan uang selanjutnya harus melakukan sendiri jumlah komputasi yang sesuai. Setiap pengguna bertindak sebagai otoritas penetapan harga berdasarkan pengetahuan mereka tentang kemampuan komputasi mereka sendiri.
Jaringan bitcoin menawarkan satu harga yang diminta dalam komputasi subsidi bitcoin saat ini. Namun tidak ada penambang individu yang menemukan blok yang melakukan komputasi sebanyak ini.[^9] Blok pemenang penambang individu adalah bukti bahwa semua penambang secara kolektif melakukan jumlah komputasi yang diperlukan. Pembeli bitcoin dengan demikian adalah industri penambangan bitcoin global.
Setelah mencapai konsensus harga yang diminta, jaringan bitcoin tidak akan mengubah harga tersebut sampai lebih banyak blok diproduksi. Blok-blok ini harus berisi proof-of-work dengan harga yang diminta saat ini. Oleh karena itu, industri pertambangan tidak punya pilihan jika ingin “melakukan perdagangan” selain membayar harga yang diminta saat ini dalam komputasi.
Satu-satunya variabel yang dapat dikontrol oleh industri pertambangan adalah berapa lama waktu yang dibutuhkan untuk memproduksi blok berikutnya. Sama seperti jaringan bitcoin yang menawarkan satu harga yang diminta, industri pertambangan juga menawarkan satu penawaran—waktu yang diperlukan untuk menghasilkan blok berikutnya yang memenuhi harga yang diminta jaringan saat ini.
Untuk mengimbangi peningkatan kecepatan perangkat keras dan minat yang berbeda-beda dalam menjalankan node dari waktu ke waktu, kesulitan proof-of-work ditentukan oleh rata-rata bergerak yang menargetkan jumlah rata-rata blok per jam. Jika dihasilkan terlalu cepat, kesulitannya akan meningkat. - Nakamoto, 2008
Satoshi dengan sederhana menjelaskan algoritma penyesuaian kesulitan, yang sering disebut sebagai salah satu ide paling orisinal dalam implementasi bitcoin. Hal ini benar, namun alih-alih berfokus pada daya cipta solusi, mari kita fokus pada mengapa penyelesaian masalah sangat penting bagi Satoshi.
Proyek-proyek seperti bit gold dan b-money tidak perlu membatasi nilai tukar pada saat penciptaan uang karena mereka tidak memiliki pasokan tetap atau kebijakan moneter yang telah ditentukan sebelumnya. Periode penciptaan uang yang lebih cepat atau lebih lambat dapat dikompensasikan melalui cara lain, misalnya melalui pajak. Dealer eksternal memasukkan token bit gold ke dalam bundler yang lebih besar atau lebih kecil atau pengguna b-money mengubah tawaran mereka.
Namun tujuan kebijakan moneter Satoshi mengharuskan bitcoin memiliki tingkat pelepasan bitcoin yang telah ditentukan untuk diedarkan. Membatasi laju (statistik) produksi blok dari waktu ke waktu adalah hal yang wajar dalam bitcoin karena laju produksi blok adalah laju penjualan pasokan awal bitcoin. Menjual 21 juta bitcoin selama 140 tahun adalah proposisi yang berbeda dibandingkan membiarkannya dijual dalam 3 bulan.
Selain itu, bitcoin sebenarnya dapat menerapkan batasan ini karena blockchain adalah “protokol cap waktu aman” milik Szabo. Satoshi menggambarkan bitcoin sebagai yang pertama dan terutama sebagai “server stempel waktu terdistribusi secara peer-to-peer,” dan implementasi awal kode sumber bitcoin menggunakan “rantai waktu” dunia, bukan “blockchain” untuk menggambarkan struktur data bersama yang mengimplementasikan pasar proof-of-work bitcoin.[^10]
Tidak seperti bit gold atau b-money, token dalam bitcoin tidak mengalami kelebihan pasokan. Jaringan bitcoin menggunakan penyesuaian kesulitan untuk mengubah harga uang sebagai respons terhadap perubahan pasokan komputasi.
Algoritme penyesuaian ulang kesulitan Bitcoin memanfaatkan kemampuan ini. Blockchain konsensus digunakan oleh peserta untuk menghitung penawaran historis yang dibuat oleh industri pertambangan dan menyesuaikan kembali kesulitan agar bisa mendekati waktu blok target.
Pesanan Terunggul Menciptakan Konsensus
Rantai penyederhanaan yang disebabkan oleh tuntutan kebijakan moneter yang kuat meluas ke fase “penciptaan uang” dari b-money.
Tawaran yang diajukan pengguna di b-money mengalami masalah “tidak ada yang dipertaruhkan”. Tidak ada mekanisme untuk mencegah pengguna mengajukan tawaran dengan sejumlah besar b-money untuk pekerjaan yang sangat sedikit. Hal ini mengharuskan jaringan untuk melacak tawaran mana yang telah diselesaikan dan hanya menerima “tawaran tertinggi…dalam hal biaya nominal per unit b-money yang dibuat” untuk menghindari tawaran yang mengganggu tersebut. Setiap peserta b-money harus melacak seluruh tawaran senilai buku pesanan, mencocokkan tawaran dengan perhitungan selanjutnya, dan hanya menyelesaikan pesanan yang telah selesai dengan harga tertinggi.
Masalah ini merupakan contoh dari masalah konsensus yang lebih umum dalam sistem desentralisasi, yang juga dikenal sebagai “Byzantine generals” atau terkadang masalah “pembelanjaan ganda” dalam konteks mata uang digital. Berbagi urutan data yang identik di antara semua peserta merupakan suatu tantangan dalam jaringan yang saling bermusuhan dan terdesentralisasi. Solusi yang ada untuk masalah ini – yang disebut “algoritma konsensus Byzantine-fault tolerant (BFT)” – memerlukan koordinasi sebelumnya di antara peserta atau mayoritas (>67%) peserta agar tidak berperilaku bermusuhan.
Bitcoin tidak harus mengelola buku pesanan dalam jumlah besar karena jaringan bitcoin menawarkan harga permintaan konsensus tunggal. Ini berarti node bitcoin dapat menerima blok pertama (valid) yang mereka lihat yang memenuhi harga yang diminta jaringan saat ini—tawaran gangguan dapat dengan mudah diabaikan dan merupakan pemborosan sumber daya penambang.
Komputasi harga berdasarkan konsensus memungkinkan pencocokan pesanan beli/jual dalam bitcoin dilakukan secara antusias, dengan sistem siapa cepat dia dapat. Berbeda dengan b-money, pencocokan pesanan yang cepat ini berarti bahwa pasar bitcoin tidak memiliki fase—pasar ini beroperasi terus-menerus, dengan harga konsensus baru dihitung setelah setiap pesanan dicocokkan (blok ditemukan). Untuk menghindari percabangan yang disebabkan oleh latensi jaringan atau perilaku bertentangan, node juga harus mengikuti aturan rantai terberat. Aturan penyelesaian pesanan yang serakah ini memastikan bahwa hanya tawaran tertinggi yang diterima oleh jaringan.
Kombinasi algoritma yang antusias dan serakah ini, dimana node menerima blok valid pertama yang mereka lihat dan juga mengikuti rantai terberat, adalah algoritma BFT baru yang dengan cepat menyatu pada konsensus tentang urutan blok. Satoshi menghabiskan 25% dari white paper bitcoin untuk mendemonstrasikan klaim ini.[^11]
Kita telah menetapkan di bagian sebelumnya bahwa harga permintaan konsensus bitcoin itu sendiri bergantung pada konsensus blockchain. Namun ternyata keberadaan harga permintaan konsensus tunggal inilah yang memungkinkan perhitungan pasar untuk mencocokkan pesanan dengan penuh semangat, dan itulah yang pertama-tama mengarah pada konsensus!
Terlebih lagi, “konsensus Nakamoto” yang baru ini hanya mengharuskan 50% peserta untuk tidak bertentangan, sebuah kemajuan yang signifikan dibandingkan dengan kondisi sebelumnya. Seorang cypherpunk seperti Satoshi membuat terobosan ilmu komputer teoretis ini, dibandingkan dengan akademisi tradisional atau peneliti industri, karena fokus mereka yang sempit pada penerapan uang yang sehat, dibandingkan algoritma konsensus umum untuk komputasi terdistribusi.
Kesimpulan
B-money adalah kerangka kerja yang kuat untuk membangun mata uang digital tetapi tidak lengkap karena tidak memiliki kebijakan moneter. Membatasi b-money dengan jadwal rilis yang telah ditentukan untuk bitcoin mengurangi cakupan dan menyederhanakan implementasi dengan menghilangkan persyaratan untuk melacak dan memilih di antara tawaran pembuatan uang yang diajukan pengguna. Mempertahankan kecepatan sementara dari jadwal rilis Satoshi menghasilkan algoritma penyesuaian kesulitan dan memungkinkan konsensus Nakamoto, yang secara luas diakui sebagai salah satu aspek paling inovatif dalam implementasi bitcoin.
Ada lebih banyak hal dalam desain bitcoin daripada aspek yang dibahas sejauh ini. Kita memfokuskan artikel ini pada pasar “utama” dalam bitcoin, pasar yang mendistribusikan pasokan awal bitcoin ke dalam sirkulasi.
Artikel berikutnya dalam seri ini akan mengeksplorasi pasar penyelesaian transaksi bitcoin dan kaitannya dengan pasar pendistribusian pasokan bitcoin. Hubungan ini akan menyarankan metodologi bagaimana membangun pasar masa depan untuk layanan terdesentralisasi selain bitcoin.
Sumber artikel: HOW DID SATOSHI THINK OF BITCOIN? https://bitcoinmagazine.com/technical/how-did-satoshi-think-of-bitcoin
Diterjemahkan oleh: Abengkris
[^1]: Judul seri ini diambil dari pesan telegraf pertama dalam sejarah, yang dikirimkan oleh Samuel Morse pada tahun 1844: “What hath God wrought?”.
[^2]: Bitcoin: Sistem Uang Elektronik Peer-to-Peer, tersedia di: https://bitcoin.org/bitcoin.pdf
[^3]: Pricing via Processing or Combatting Junk Mail oleh Dwork dan Naor. tersedia di:
https://www.wisdom.weizmann.ac.il/../../pvp.pdf[^4]: Meskipun merupakan pencetus ide tersebut, Dwork & Naor tidak menciptakan “proof-of-work”—julukan tersebut kemudian diberikan pada tahun 1999 oleh Markus Jakobsson dan Ari Juels.
[^5]: Proyek RPoW Hal Finney adalah upaya untuk menciptakan proof-of-work yang dapat ditransfer, tetapi bitcoin tidak menggunakan konsep ini karena tidak memperlakukan komputasi sebagai mata uang. Seperti yang akan kita lihat nanti ketika kita memeriksa bit gold dan b-money, komputasi tidak dapat berupa mata uang karena nilai komputasi berubah seiring waktu sementara unit mata uang harus memiliki nilai yang sama. Bitcoin bukanlah komputasi, bitcoin adalah mata uang yang dijual untuk komputasi.
[^6]: Pada saat ini, beberapa pembaca mungkin percaya bahwa saya meremehkan kontribusi Dai atau Szabo karena kontribusi mereka tidak jelas atau tidak jelas dalam beberapa hal. Perasaan saya justru sebaliknya: Dai dan Szabo pada dasarnya benar dan fakta bahwa mereka tidak mengartikulasikan setiap detail seperti yang dilakukan Satoshi tidak mengurangi kontribusi mereka. Sebaliknya, hal ini seharusnya meningkatkan apresiasi kita terhadap hal tersebut, karena hal ini menunjukkan betapa menantangnya munculnya mata uang digital, bahkan bagi para praktisi terbaiknya.
[^7]: Postingan b-money Dai adalah referensi pertama dalam white paper Satoshi, tersedia di: http://www.weidai.com/bmoney.txt
[^8]: Ada dua penyederhanaan yang dilakukan di sini: 1. Jumlah bitcoin yang dijual di setiap blok juga dipengaruhi oleh biaya transaksi pasar, yang berada di luar cakupan artikel ini, namun tetap menunggu pekerjaan selanjutnya. 2. Kesulitan yang dilaporkan oleh bitcoin bukanlah jumlah perhitungan yang diharapkan; seseorang harus mengalikannya dengan faktor proporsionalitas.
[^9]: Setidaknya sejak masa lalu yang buruk ketika Satoshi adalah satu-satunya penambang di jaringan.
[^10]: Bitcoin is Time klasik dari Gigi adalah pengenalan yang bagus tentang hubungan mendalam antara bitcoin dan waktu, tersedia di: https://dergigi.com/2021/01/14/bitcoin-is-time/
[^11]: Satoshi melakukan kesalahan baik dalam analisis mereka di buku putih maupun implementasi awal bitcoin berikutnya dengan menggunakan aturan “rantai terpanjang” dan bukan aturan “rantai terberat”.
-
@ 3369d0a7:eb020757
2024-11-28 07:41:32Chef's notes
This recipe was a staple at every thanksgiving with family and now I share it with you nostr family. Absolutely one of my favorite side dish during the holiday. The corn pudding in the photo is NOT baked, I will update it. I hate stock photos.
Details
- ⏲️ Prep time: 15-20 min
- 🍳 Cook time: 30-40 min
- 🍽️ Servings: 6-8
Ingredients
- 2 cans of creamed corn
- 2c Milk
- 1 Box of Jiffy Cornbread Mix
- 3 eggs
- 1/4-1/3c sugar
- 1/2- green bell pepper or pepper onion blend
- 1/4TBsp vanilla
- 1/2tsp Salt
- 2TBsp Butter
Directions
- Grab medium saucepan and desired baking dish at least 9x9
- Place saucepan on medium-high heat
- Add butter and sauté pepper onion blend until tender
- Combine milk, eggs, sugar and vanilla, mix well
- Lather warmed (NOT HOT) baking dish with butter
- Sprinkle half a box of Jiffy corn bread mix in the baking dish
- Add both cans of creamed corn to peppers and onions
- Pour wet ingredients into slightly cooled creamed corn mixture
- Sprinkle the other half box of jiffy mix into the baking dish
- Incorporate the wet and dry ingredients in dish so there are no dry lumps
- Let set for 10 min before placing in a 325 degree oven for 30-40 minutes, until the center is solid and the edges are golden brown.
-
@ 32e18276:5c68e245
2023-12-06 15:29:43I’m going to be on an ordinals panels as one of the people who is counter arguing the claim that they are good for bitcoin. I decided to brush up on the technicals on how inscriptions work. I am starting to see luke’s perspective on how it is exploiting a loophole in bitcoin’s anti-data-spam mechanisms.
Storing data in Bitcoin, the “standard” way
The standard way you add “data” to bitcoin is by calling the OP_RETURN opcode. Bitcoin devs noticed that people were storing data (like the bitcoin whitepaper) in the utxo set via large multisig transactions. The problem with this is that this set is unprunable and could grow over time. OP_RETURN outputs on the other-hand are provably prunable and don’t add to utxo bloat.
Here’s an excerpt from the march 2014 0.9.0 release notes that talks about this:
On OP_RETURN: There was been some confusion and misunderstanding in the community, regarding the OP_RETURN feature in 0.9 and data in the blockchain. This change is not an endorsement of storing data in the blockchain. The OP_RETURN change creates a provably-prunable output, to avoid data storage schemes – some of which were already deployed – that were storing arbitrary data such as images as forever-unspendable TX outputs, bloating bitcoin’s UTXO database. Storing arbitrary data in the blockchain is still a bad idea; it is less costly and far more efficient to store non-currency data elsewhere.
Much of the work on bitcoin core has been focused on making sure the system continues to function in a decentralized way for its intended purpose in the presence of people trying to abuse it for things like storing data. Bitcoin core has always discouraged this, as it is not designed for storage of images and data, it is meant for moving digital coins around in cyberspace.
To help incentive-align people to not do stupid things, OP_RETURN transactions were not made non-standard, so that they are relayable by peers and miners, but with the caveat:
- They can only push 40 bytes (later increased to 80,83, I’m guessing to support larger root merkle hashes since that is the only sane usecase for op_return)
Bitcoin also added an option called -datacarriersize which limits the total number of bytes from these outputs that you will relay or mine.
Why inscriptions are technically an exploit
Inscriptions get around the datacarriersize limit by disguising data as bitcoin script program data via OP_PUSH inside OP_IF blocks. Ordinals do not use OP_RETURN and are not subjected to datacarriersize limits, so noderunners and miners currently have limited control over the total size of this data that they wish to relay and include in blocks. Luke’s fork of bitcoin-core has some options to fight this spam, so hopefully we will see this in core sometime soon as well.
Inscriptions are also taking advantage of features in segwit v1 (witness discount) and v2/taproot (no arbitrary script size limit). Each of these features have interesting and well-justified reasons why they were introduced.
The purpose of the witness discount was to make it cheaper to spend many outputs which helps the reduction of the utxo set size. Inscriptions took advantage of this discount to store monke jpegs disguised as bitcoin scripts. Remember, bitcoin is not for storing data, so anytime bitcoin-devs accidentally make it cheap and easy to relay data then this should be viewed as an exploit. Expect it to be fixed, or at least provide tools to noderunners for fighting this spam.
Where do we go from here
The interesting part of this story is that people seem to attach value to images stored on the bitcoin blockchain, and they are willing to pay the fee to get it in the block, so non-ideologic miners and people who don’t care about the health and decentralization of bitcoin are happy to pay or collect the fee and move on.
Data should not get a discount, people should pay full price if they want to store data. They should just use op_return and hashes like opentimestamps or any other reasonable protocol storing data in bitcoin.
After going through this analysis I’ve come to the opinion that this is a pretty bad data-spam exploit and bitcoin devs should be working on solutions. Ideological devs like luke who actually care about the health and decentralization of the network are and I’m glad to see it.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ c1e6505c:02b3157e
2024-11-28 00:02:26Chef's notes
Leftover ground beef? Not sure what to do with it?
Here’s what I do with mine. I call it…
The Beef Panzone
It’s like an omelette, a calzone, and a quesadilla had a baby. I called it that for now, but hey, if you’ve got a better name, lemme hear it!
The beef’s already cooked and seasoned with sea salt, but feel free to spice it up however you like.
Watch the video here: https://video.nostr.build/ad4856d2704ab0626a1907f5da8fedcb776495080bbaa92f4472db402c9f689d.mp4
Details
- ⏲️ Prep time: 5
- 🍳 Cook time: 10
- 🍽️ Servings: 1-2
Ingredients
- ground beef
- 2-3 eggs
- water
- sea salt
- honey
- coconut oil
Directions
- Leftover ground beef – Chop it into small pieces. Trust me, the smaller, the better—it’ll cover more surface area in the pan.
- Two eggs, whipped with a dash of water.
- Heat up a small pan.
- Add coconut oil (around a tablespoon).
- Once the oil’s warmed up, throw in the beef.
- Stir it around.
- I like to add local honey here—sweeten it up to your taste.
- Mix it all around.
- Pour in the egg mixture, making sure it spreads out evenly. I use chopsticks here because they make it easier to maneuver.
- Use those chopsticks to poke through the egg and let the uncooked top flow to the pan. This speeds up cooking time.
- Cover it for 1–3 minutes.
- Optional step: Cut it down the middle.
- Fold it over like a calzone.
- Plate it up, either by flipping the pan over onto the plate or scooping it out.
- PANZONE!
-
@ 617f0a85:b403d1ed
2024-11-27 00:35:41Chef's notes
I got this recipe from a friend in college. I'm not sure where she came across it, but I don't think she'd mind me posting it here.
Details
- ⏲️ Prep time: 15 min
Ingredients
- 2.5 cups unbleached all-purpose flour
- 1 tsp salt
- 2 tbsp sugar
- 12 tbsp cold unsalted butter
- 0.5 cup lard
- 0.25 cup vodka
- 0.25 cup cold water
Directions
- Process 1.5 cups flour, salt, and sugar in food processor until combined, about 2 one-second pulses. Add butter and shortening and process until homogeneous dough just starts to collect in uneven clumps, about 15 seconds (dough will resemble cottage cheese curds and there should be no uncoated flour). Scrape bowl with rubber spatula and redistribute dough evenly around processor blade. Add remaining cup flour and pulse until mixture is evenly distributed around bowl and mass of dough has been broken up, 4 to 6 quick pulses. Empty mixture into medium bowl
- Sprinkle vodka and water over mixture. With rubber spatula, use folding motion to mix, pressing down on dough until dough is slightly tacky and sticks together. Divide dough into two even balls and flatten each into 4-inch disk. Wrap each in plastic wrap and refrigerate at least 45 minutes or up to 2 days.
-
@ 9f51b59f:75e7c3a2
2024-11-26 20:04:51Chef's notes
Use bone in or boneless short rib. This recipe also works with ox tail and pork shoulder or any kind of meat that’s ideal for braising low and slow.
Details
- ⏲️ Prep time: 30 mins
- 🍳 Cook time: 2.5-3.5 hours
- 🍽️ Servings: 6-8
Ingredients
- 3 Tablespoons natural cooking oil (I use tallow or ghee)
- 2 lbs boneless short ribs (bone-in also works)
- Salt & Pepper
- 1 small red onion, diced
- 5 garlic cloves rough chopped
- 1 bell or poblano pepper, seeded & diced
- 2 teaspoon chili powder
- 1 teaspoon ancho chili powder
- 1 tablespoon smoked paprika
- 1 tablespoon dark coco powder
- 2 teaspoon cumin
- 1 tablespoon graham masla
- 1 teaspoon dried oregano
- 3 tablespoons apple cider vinegar
- 1/2 cup tomato puree
- 3 tablespoons chipotle adobo sauce
- 3 bay leaves
- 1.5 cups stock or water
- 2 fresh limes, juiced
- Banana leaves, optional
- Avocado, sour cream, lime juice
- Shaved red cabbage with lime juice
Directions
- Preheat oven to 315 degrees F. Using a Dutch oven or braising pan, begin heating oil over high heat on the stove top.
- Season beef with salt and pepper and begin searing in the pot. Once browned on all sides set the beef aside and add the onions, garlic, and peppers to the same pan and reduce the heat.
- Season and cook the veggies 5 to 8 minutes until they start to caramelize. Add the chili pepper, paprika, coco, cumin, marsala, and dried oregano.
- Briefly toast the spices and deglaze with the vinegar and immediately add the tomato puree.
- Add the adobo sauce, broth, and using a stick blender or blender buzz the cooking liquid. (if using banana leaves remove the cooking liquid from the pan or use a new pot with lid. Line the pot with the leaves shingled over one another, return the cooking liquid over the leaves.)
- Return the beef to the pot and cover with lid or foil (fold leaves over the meat then cover).
- Place the pot in the oven and cook for 2 hours before checking, the meat should be fork tender when done.
- Mash the avocado into the sour cream and season with lime juice or hot sauce. Serve on tortillas with the crema and cabbage.
-
@ 4dc2e570:7b8126f9
2024-11-25 17:39:37Chef's notes
Pickled pearl onions can usually be found at a middle eastern grocery store.
Details
- ⏲️ Prep time: 30 - 45 minutes
- 🍳 Cook time: 2 hours and 30 minutes
- 🍽️ Servings: 6
Ingredients
- 2.5 lbs stew meat
- 4 cloves Garlic
- 2 onions
- 6oz Bacon, chopped
- 4 Carrots (cut in 1/2 in pieces)
- 3 celery sticks (cut in 1 in pieces)
- 5 or so small gold potatoes, quartered
- 3ish tbps Flour
- 4 tbsp tomato paste
- 14 oz Guinness Beer
- 3 cups chicken stock
- 1 tsp Thyme
- 2 bay leaves
- Ghee
- Salt and pepper
Directions
- Pat dry then salt and pepper the beef. Melt 1/2 tbsp ghee over high med-high heat. Brown the beef on each side well, makes the stew tasty. This takes patience. Do some breath work while you're at it. :) Add ghee as necessary so browny bits on bottom dont burn. Put meat aside.
- In same pan, sauté onion and garlic for a few min. Throw in bacon till browned. Put in carrot and celery.
- Add 3tbsp flour (or a bit more, basically till oil is soaked up) and stir for a minute. Add tomato paste. Stir a couple more minutes.
- Add thin layer of beer and scrape yummy bits from bottom of pan. Mix everything well. Add rest of beer, broth, and herbs.
- Carmelize the pickled pearl onion on low med heat with a lil olive oil and stirring occasionally.
- Simmer covered for 2 hours. Add potatoes. Simmer for a further 30 minutes uncovered to let the sauce reduce a bit. Salt and pepper as you like. Add in some pearl onions. Enjoy.
-
@ de496884:72617b81
2023-11-20 13:54:02Hola nostriches. Hoy quiero hacer una publicación a modo de acercamiento al surgimiento de las categorías de género y feminismo. Así que si te interesa el tema haz un esfuerzo, quédate y lee hasta el final.
El «nuevo» feminismo surge en los años 60 en aquellos países desarrollados que acordaron el reconocimiento a los derechos humanos contenidos en la declaración respectiva de la ONU. Entonces, como extensión a dicho reconocimiento es que se gesta el movimiento feminista. A partir de entonces, se vuelve a plantear la relación entre naturaleza y cultura y se llega a la conclusión de que las diferencias sociales van más allá de las diferencias biológicas, lo cual tiene que ver con que hasta la satisfacción de las necesidades elementales como son la alimentación, la vivienda o el vestuario, están condicionadas por construcciones sociales.
Pues resulta que una de las primeras propuestas identificó la subordinación femenina producto de una organización patriarcal, tomando la categoría patriarcado de Max Weber. Es así como la visión de patriarcado se extendió al discurso político y académico. Sin embargo, no existía información acerca del desarrollo histórico de dicha categoría, sistematización, variaciones, etc., debido a que era algo que recién se percibía en sociedad.
Sin embargo, la misma categoría de patriarcado junto a la de relaciones de poder para explicar fenómenos sociales contemporáneos, constituye uno de los principales aportes del feminismo. Es así como han logrado primero visibilizar y luego deconstruir y desmontar una serie de patrones existentes en la cultura que hacían a la mujer subordinarse al hombre, y que estaban presentes en el sistema sexo/género.
Imagen relativa a la lucha contra el patriarcado
Hasta ese momento, en las investigaciones de corte sociológico se podía observar un androcentrismo excesivo al dar cuenta de que el discurso científico giraba en torno al hombre como sujeto y objeto de la investigación. Incluso para muchos positivistas como el mismo Weber, los problemas relativos a las mujeres quedaban en un segundo plano y eran achacados a una supuesta pasividad en el ámbito doméstico-familiar. Dicha pasividad partía de la supuesta inferioridad biológica del género femenino.
El patriarcado entonces era una categoría vacía en sí misma, sin valor explicativo. Desde el punto de vista político pudo ser útil para la movilización pero no resistió la polémica de los críticos del feminismo ni problematizó los conflictos a ser resueltos. Pero por otro lado, un grupo de mujeres -académicas principalmente- se puso manos a la obra en una tarea más pequeña pero con mayores resultados a la larga. Se propusieron generar conocimientos sobre las condiciones de vida de la mujer, buscar en el pasado y el presente los aportes de las mujeres a la sociedad, hacerlas visibles en la historia. Es así como surgen centros académicos, ONG, proyectos, centros de estudios sobre la mujer, etc.
Convendría distinguir entonces dos posturas que acompañaron a la investigación sobre las mujeres: uno que toma como objeto de estudio a la mujer; condiciones de vida, trabajo, cultura, y otra que privilegia a la sociedad como generadora de la subordinación de las mujeres. Mientras la primera perspectiva generaba conocimiento sobre las mujeres en el estudio de las relaciones mujer-hombre y mujer-mujer, la segunda tenía una visión más holística ya que planteaba que hay que estudiar la sociedad ya que la subordinación de las mujeres es producto de la organización de esta, y que no se avanzará solamente estudiando a las mujeres, pues el estudio debe ser más amplio y en diferentes niveles, ámbitos y tiempos.
Es en esta búsqueda donde nace y se desarrolla el concepto de género como categoría social. Es así que los sistemas de género/sexo fueron entendidos como conjuntos de prácticas, símbolos, representaciones, normas y valores sociales que las sociedades construyen a partir de la diferencia anatomofisiológica y que dotan de sentido a los impulsos sexuales, la reproducción y en general a las relaciones de las personas. Por tanto, este sistema pasó a ser el objeto de estudio para comprender la subordinación de la mujer al hombre. Al ser el reconocimiento de una dimensión de la desigualdad social hasta entonces desconocida, se considera la ruptura epistemológica más importante de la segunda mitad del siglo pasado.
Imagen representativa del binarismo de género
Hay que decir que los fenómenos sociales se definen por la relación que guardan entre sí. Es así que la contextualización adquiere gran importancia. Varones y hembras tenemos la capacidad de producir con el cuerpo, pero solo los cuerpos de las hembras pueden gestar y por tanto asegurar la especie humana. Todo grupo humano que pretenda sobrevivir debe asegurarse cierto número de hembras que lo hagan posible. De ahí un poder particular del cuerpo de las hembras que además es económicamente útil. Dicho poder no es en tanto entidad biológica, sino que es la sociedad la que le otorga este poder. En este punto es importante preguntarnos históricamente ¿quiénes han controlado la capacidad reproductiva de las mujeres?, ¿quiénes han tenido la preferencia en el acceso sexual? Para asegurar un control efectivo sobre la reproducción es necesario asegurar el acceso a la sexualidad.
Ello también lleva a dirigir el trabajo que hacen porque de lo contrario, las mujeres pudieran tener espacio para representar una amenaza al dominio de los hombres. Es importante atender a las etapas del desarrollo de las mujeres, que permitirá ver cómo se moldean para aceptar la desigualdad y las jerarquías según el género en las distintas sociedades y culturas.
Otro contexto a delimitar es el ámbito doméstico donde históricamente ha estado ubicada la subordinación femenina. Se ha puesto al descubierto que en mujeres que comparten la misma posición de clase y raza, la condición femenina se redefine a lo largo de la vida y que algunas mujeres gozan de poder sobre otras aún en contextos de alta dominación masculina, donde se les inviste de autoridad, creando el sistema zonas de incertidumbre que las divide como género e impide alianzas y se legitima la dominación. Foucault decía que «el poder se ejerce, no se posee», siempre está en peligro de perderse y no basta con normas, leyes, amenazas o castigos. De ahí que los espacios de subordinación sean también espacios de poder de las mujeres. Es en estos espacios donde aparece la inseguridad, la tensión, la confrontación y por ejemplo, las mujeres pueden reclamar la anticoncepción.
Para terminar, es importante tener en cuenta que el género es una forma de desigualdad social que siempre está articulado con otras formas de desigualdad ya sea clase, raza, grupo etario, etc. Hay que pensar la dominación masculina con un comienzo vago en el tiempo, pero que permite desligar la subordinación de las mujeres de la evolución «natural» de la humanidad y entenderla como un proceso histórico. En ese sentido es necesario destacar que, respecto a la raza, en sociedades plurales hay que atender al contexto étnico-cultural ya que en dependencia de las relaciones entre personas de razas distintas, estarán condicionadas las relaciones entre los géneros.
Imagen de mujeres de distintas razas
Por otro lado, si bien es sabido que históricamente el sistema de género social imperante ha contribuido a invisibilizar a la mujer, asociar necesariamente dicha categoría únicamente a ella, lo que hace es nuevamente recrear el absolutismo histórico que tanto daño ha hecho, ahora como lo antagónico al hombre. En la construcción social participan todos los individuos presentes en el sistema género.
Hasta aquí la publicación de hoy, de la cual aun se puede ahondar mucho más, sobre todo en lo referido al origen de la dominación o de la jerarquización del binomio «hombre/mujer» desde un punto de vista antropológico, pero eso quedará pendiente para otro momento. ¡Así que hasta la próxima!, ¡nos vemos en Nostr!
........................................
English version
Hello nostriches. Today I want to make a post by way of an approach to the emergence of the categories of gender and feminism. So if you are interested in the topic make an effort, stay and read to the end.
The "new" feminism emerged in the 60's in those developed countries that agreed to recognize the human rights contained in the respective UN declaration. Then, as an extension of that recognition, the feminist movement was born. From then on, the relationship between nature and culture was raised again and the conclusion was reached that social differences go beyond biological differences, which has to do with the fact that even the satisfaction of elementary needs such as food, housing or clothing are conditioned by social constructions.
It turns out that one of the first proposals identified female subordination as a product of a patriarchal organization, taking Max Weber's category of patriarchy. This is how the vision of patriarchy was extended to political and academic discourse. However, there was no information about the historical development of this category, systematization, variations, etc., because it was something that was only recently perceived in society.
However, the same category of patriarchy, together with that of power relations to explain contemporary social phenomena, constitutes one of the main contributions of feminism. This is how they have first made visible and then deconstructed and dismantled a series of existing patterns in the culture that made women subordinate to men, and that were present in the sex/gender system.
Image relating to the fight against patriarchy
Up to that time, in sociological research, an excessive androcentrism could be observed as scientific discourse revolved around men as the subject and object of research. Even for many positivists such as Weber himself, the problems related to women remained in the background and were blamed on a supposed passivity in the domestic-family sphere. This passivity was based on the supposed biological inferiority of the female gender.
Patriarchy was then an empty category in itself, with no explanatory value. From the political point of view, it could be useful for mobilization, but it did not resist the polemic of feminism's critics, nor did it problematize the conflicts to be resolved. But on the other hand, a group of women - mainly academics - set to work on a smaller task but with greater results in the long run. They set out to generate knowledge about women's living conditions, to search in the past and present for women's contributions to society, to make them visible in history. This is how academic centers, NGOs, projects, women's studies centers, etc., came into being.
It would be convenient to distinguish then two postures that accompanied the research on women: one that takes women as the object of study; living conditions, work, culture, and the other that privileges society as the generator of women's subordination. While the first perspective generated knowledge about women in the study of woman-man and woman-woman relations, the second had a more holistic vision, since it proposed that society must be studied, since the subordination of women is a product of its organization, and that progress will not be made only by studying women, since the study must be broader and at different levels, spheres and times.
It is in this search that the concept of gender as a social category was born and developed. Thus, gender/sex systems were understood as a set of practices, symbols, representations, norms and social values that societies construct on the basis of anatomophysiological differences and that give meaning to sexual impulses, reproduction and, in general, to people's relationships. Therefore, this system became the object of study to understand the subordination of women to men. As the recognition of a hitherto unknown dimension of social inequality, it is considered the most important epistemological breakthrough of the second half of the last century.
Representative image of gender binarism
It must be said that social phenomena are defined by their relationship with each other. Thus, contextualization acquires great importance. Males and females have the capacity to produce with their bodies, but only the bodies of females can gestate and therefore ensure the human species. Any human group that intends to survive must ensure a certain number of females to make it possible. Hence a particular power of the female body, which is also economically useful. This power is not as a biological entity, but it is society that gives it this power. At this point it is important to ask ourselves historically, who has controlled the reproductive capacity of women, who has had the preference in sexual access? To ensure effective control over reproduction, it is necessary to ensure access to sexuality.
Allegorical image of pregnancy
This also leads to directing the work they do because otherwise, women may have room to pose a threat to men's dominance. It is important to pay attention to the stages of women's development, which will allow us to see how they are shaped to accept inequality and gender hierarchies in different societies and cultures.
Another context to delimit is the domestic sphere where female subordination has historically been located. It has been discovered that in women who share the same class and race position, the feminine condition is redefined throughout life and that some women enjoy power over others even in contexts of high male domination, where they are invested with authority, creating the system of uncertainty zones that divide them as a gender and prevent alliances and legitimize domination. Foucault said that "power is exercised, not possessed", it is always in danger of being lost and norms, laws, threats or punishments are not enough. Hence, the spaces of subordination are also spaces of women's power. It is in these spaces where insecurity, tension, confrontation appear and where, for example, women can demand contraception.
To conclude, it is important to keep in mind that gender is a form of social inequality that is always articulated with other forms of inequality, be it class, race, age group, etc. It is necessary to think of male domination with a vague beginning in time, but which allows us to separate the subordination of women from the "natural" evolution of humanity and to understand it as a historical process. In this sense, it is necessary to emphasize that, with respect to race, in plural societies it is necessary to pay attention to the ethno-cultural context since, depending on the relations between people of different races, the relations between genders will be conditioned.
Image of women of different races
On the other hand, although it is known that historically the prevailing social gender system has contributed to make women invisible, to necessarily associate this category only to women is to recreate the historical absolutism that has done so much damage, this time as antagonistic to men. All individuals present in the gender system participate in the social construction.
So much for today's publication, of which we can still go much deeper, especially with regard to the origin of domination or the hierarchization of the binomial "man/woman" from an anthropological point of view, but that will be left for another time. So until next time, see you in Nostr!
Créditos | Credits
Bibliografía consultada | Consulted bibliography:
-
Barbieri, T. (1993). Sobre la categoría género. Una introducción teórico-metodológica. Debates en Sociología. (18). 1-19. https://doi.org/10.18800/debatesensociologia.199301.006
-
Echevarría, D. (2020). Desigualdades de género e interseccionalidad. Análisis del contexto cubano 2008-2018. Facultad Latinoamericana de Ciencias Sociales (Programa-Cuba). https://www.clacso.org.ar/libreria-latinoamericana-cm/libro_detalle_resultado.php?id_libro=2346&campo=cm&texto=248
Traducción | Translation:
DeepL
-
-
@ 662f9bff:8960f6b2
2024-12-11 02:53:14By popular request I have put together one single list of the most important books that I have read and recommend that you should read too. I am happy to receive your comments, reviews and suggestions - just reach out and let's discuss.
They are more or less in alphabetical order of title and they are all recommended.
- George Orwell's 1984 - spot the drumbeat of hostile distant foreign empires and perpetual war - not to mention everything else that he foresaw. Read it and look around you today.
- Murray Rothbard's Anatomy of the State - this is foundational to so many of the books and insights related to government, finance and current affairs. This is a short read (one hour) also available as free audiobook. It is required knowledge - you have no excuse.
- Animal farm - by George Orwell - note how the pigs end up living in the farmhouse exceeding all the worst behaviour of the farmer and how the constitution on the wall changes. Things did not end well for loyal Boxer.
- Awaken The Immortal Within by Jason Breschears - This book is for those who have searched for the truth all their life and know they have not found it. The rest of you are warned away.
- The Basic Code of the Universe by Massimo Citro - This is not an easy read (maybe because of being translated from Italian) but the content is fascinating since he combines and draws from many of the other sources we have been considering recently - including Rupert Sheldrake on Morphic fields, Ervin Laszlo on the Akashic field, David Bohm and Karl Pribram on Holographic Paradigm, and Masaru Emoto on the memory of water and homeopathy.
- Brave New World by Aldous Huxley - A World State, inhabited by genetically modified citizens and an intelligence-based social hierarchy. The novel anticipates large scale psychological manipulation and classical conditioning that are combined to make a dystopian society which is challenged by just one individual who does not take the Soma.
- Lyn Alden's Broken Money - gives you the complete A-Z of how money works and all the bad choices that governments can (and did) make. You will also understand how money really should work for a peaceful and prosperous society.
- The Dream by David Icke - this gets my "Book of the Year 2023" award. You will be shocked and appalled at how accurate his predictions were for what happened with Covid and that is only Chapter One. He goes MUCH FURTHER. He may or may not be right on everything he says, but even if he is right on 10-20% the implications should make you think very differently on many things. Anyone with a bit of critical thinking in their head should be able to see many of the points he makes - the evidence is all around you.
- Saifedean Ammous' The Fiat Standard - explains how national currencies work today and how they are fundamentally broken, inevitably favouring those at the top, nearest to the money printer and disadvantaging everyone else. He outlines the many negative consequences of the current system. Look around you and you will recognise all that he describes.
- The Falsification of History by John Hammer - full review in Newsletter 114
- The Fourth turning is Here by Neil Howe - full review in Newsletter 118
- Going Postal by Terry Pratchett- a fascinating find and so much learning on the origins and corruption of money.
- Guards! Guards! by Terry Pratchett - The story follows a plot by a secret brotherhood, the Unique and Supreme Lodge of the Elucidated Brethren of the Ebon Night, to overthrow the Patrician of Ankh-Morpork and install a puppet king, under the control of the Supreme Grand Master.
- The Hitchhikers' Guide to the Galaxy series - in particular the Restaurant at the End of the Universe. There is a theory which states that if ever anyone discovers exactly what the Universe is for and why it is here, it will instantly disappear and be replaced by something even more bizarre and inexplicable. There is another theory which states that this has already happened.
- Michael Talbot's "The Holographic Universe" presents a revolutionary theory that the universe itself may be akin to a giant hologram. This idea, inspired by the work of physicist David Bohm (who as a protégée of Albert Einstein) and neuroscientist Karl Pribram, suggests that our reality is not as it appears on the surface. The holographic paradigm proposes that every part of the universe contains the whole, much like how every piece of a hologram contains a complete picture.
- The Kybalion by Three Initiates - Hermeticism is a philosophical and spiritual tradition that is based on the teachings attributed to Hermes Trismegistus, a legendary figure who is often associated with the Egyptian god Thoth and the Greek god Hermes, pre-dating all modern religions. This will lead you to the Lament of Hermes (aka Thoth's Prophesy) that I suggest is rather relevant to current times.
- The Mandibles – by Lionel Shriver - The plot: In 2029, the United States is engaged in a bloodless world war that will wipe out the savings of millions of American families. Overnight, on the international currency exchange, the “almighty dollar” plummets in value, to be replaced by a new global currency, the “bancor.” In retaliation, the president declares that America will default on its loans. “Deadbeat Nation” being unable to borrow, the government prints money to cover its bills. What little remains to savers is rapidly eaten away by runaway inflation.
- Mistborn - The Final Empire - by Brandon Sanderson. You really ought to recognise and understand the importance of learning from wisdom of prior generations.
- Morphic Resonance by Rupert Sheldrake. This book is about the hypothesis of formative causation, which proposes that nature is habitual. All animals and plants draw upon and contribute to a collective memory of their species. Crystals and molecules also follow the habits of their kind. Cosmic evolution involves an interplay of habit and creativity. This hypothesis is radically different from the conventional assumption that nature is governed by eternal laws. Also, keep in mind the Akashic Records - not a topic for today but one that we will certainly return to.
- Mythos read by Stephen Fry is a "must do". This has got to be one of the best books I have ever read! Fabulously interesting and insightful - I had always wondered what the Greek Gods got up to and could never have imagined so much! BTW - this will also give you a grounding in the stories that you need to know for much more than you likely realise.
- The Octopus of Global Control by Charlie Robinson explains the eight tentacles of control that are wrapped around humanity, namely: the Military, Government, Covert, Physical, Financial, Media, Spiritual, and Scientific. The book tackles topics such as uncovering the Deep State, false flag terror events, the media’s role in manufacturing wars, the 9/11 deception, the fraud of central banking, our broken education system, the use of religion to shape society, and the corrupted medical industry. Recommend to get this also as audiobook, read by him.
- The Power of Now by Eckhard Tolle - full review in Newsletter 65
- Principles of Economics by Saifedean Ammous. This is a university-level text book, written to replace the nonsense that students have been taught for the last 70 years. Also available as audiobook. You will understand how things really work. A nice summary of the course is here.
- Pyramids by Terry Pratchett - Conservatives vs progressives was, even in this version of ancient Egypt, a hot topic and Pratchett ridicules the arguments of antiquated minds by exaggerating their prime goals and authorities in general.
- The Reveal by David Icke - this gets my "Book of the Year 2024" award.* This is written as a standalone book so you do not need to have read his earlier books. Just do it! This book is required reading for all who are awake to what is going wrong around them and want more background and substantiation.
- Secrets of the Federal Reserve by Eustace Mullins independently corroborates all that you read in The Creature from Jekyll Island and listen to the book club discussion on it here. Eustace also wrote "Murder by Injection" - needless to say, this is particularly relevant to explain what happened in recent years.
- Snow Crash – by Neal Stevenson. The story takes place in some post-crisis world where trust in governments and countries has broken down and the world is made up of territories controlled by various corporations - each of which has their own "passport" and rules. The inhabitants of the world spend their time "living" in the Metaverse (yes - he did coin that term). Of course there is some sort of computer virus that strikes and threatens to end everything - you can imagine how things develop.
- William Rees-Mogg's The Sovereign Individual - foresaw very clearly what is currently happening - do get your own copy (book, kindle or audio). Chapters 10 and 11 relate to what's happening now and what's next.
- Sherlock Holmes - Ultimate Collection - I absolutely love this complete collection read by Stephen Fry. At nearly 63 hours of audio you get your money's worth. It is all of the books read in a sensible sequence with Stephen's expert commentary and guidance interspersed between the readings.
- The UnCommunist Manifesto by Aleks Svetski and Mark Moss - a message of Hope, Responsibility and Liberty for all. This is a book that you can read in a day or so but you will want to go back and re-read things and reflect further.
- When Money Dies by Adam Fergusson - The Nightmare of Deficit Spending, Devaluation, and Hyperinflation in Weimar, Germany. Yes it recounts the story of a hundred years ago but you will be surprised to see how relevant this is today, albeit on a bigger scale. We discussed this back in Issue 7 in February 2022.
For lots more like this, do follow our journey: Letter from ...around the world
-
@ 4dc2e570:7b8126f9
2024-11-25 17:39:08Chef's notes
Pickled pearl onions can usually be found at a middle eastern grocery store.
Details
- ⏲️ Prep time: 30 - 45 minutes
- 🍳 Cook time: 2 hours and 30 minutes
- 🍽️ Servings: 6
Ingredients
- 2.5 lbs stew meat
- 4 cloves Garlic
- 2 onions
- 6oz Bacon, chopped
- 4 Carrots (cut in 1/2 in pieces)
- 3 celery sticks (cut in 1 in pieces)
- 5 or so small gold potatoes, quartered
- 3ish tbps Flour
- 4 tbsp tomato paste
- 14 oz Guinness Beer
- 3 cups chicken stock
- 1 tsp Thyme
- 2 bay leaves
- Ghee
- Salt and pepper
Directions
- Pat dry then salt and pepper the beef. Melt 1/2 tbsp ghee over high med-high heat. Brown the beef on each side well, makes the stew tasty. This takes patience. Do some breath work while you're at it. :) Add ghee as necessary so browny bits on bottom dont burn. Put meat aside.
- In same pan, sauté onion and garlic for a few min. Throw in bacon till browned. Put in carrot and celery.
- Add 3tbsp flour (or a bit more, basically till oil is soaked up) and stir for a minute. Add tomato paste. Stir a couple more minutes.
- Add thin layer of beer and scrape yummy bits from bottom of pan. Mix everything well. Add rest of beer, broth, and herbs.
- Carmelize the pickled pearl onion on low med heat with a lil olive oil and stirring occasionally.
- Simmer covered for 2 hours. Add potatoes. Simmer for a further 30 minutes uncovered to let the sauce reduce a bit. Salt and pepper as you like. Add in some pearl onions. Enjoy.
-
@ df478568:2a951e67
2024-11-25 02:36:34Details
- ⏲️ Prep time: 10 minutes
- 🍳 Cook time: 30 minutes
- 🍽️ Servings: 4
Ingredients
- rice
- 2 lb. ground beef
- 8 oz. sliced mushrooms
- 1 stalk of geeen onions, chopped
- 1/4 tsp. garlic salt
- 1 10.5 oz. can of cream of mushroom soup
- 1 cup sour cream
- peas
Directions
- Cook the rice
- Brown ground beef. Remove and set aside.
- Saute mushrooms and green onions
- Cook peas(I usually use the microwave)
- Return beef to Dutch oven. Add cream of mushroom and sour cream
- Cooknon low heat for 12 minutes.
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ fd78c37f:a0ec0833
2024-12-11 01:32:23Bitcoin, as a decentralized digital currency, is reshaping the global financial landscape, sparking innovation and transformation across various sectors. In South America, Bitcoin communities are emerging as crucial drivers of economic empowerment, financial inclusion, and local technological advancement. This issue will highlight 21 Bitcoin communities from South America, exploring their missions, growth trajectories, and recent developments. By examining these grassroots initiatives, we aim to show how Bitcoin is being leveraged to create sustainable economic ecosystems, foster social progress, and expand access to education and financial tools. Thank you, YakiHonne decentralized media client on Nostr to support people in owning their voice. #iOS #Android, for supporting the publication of the Bitcoin Community Newsletter. Most of the content has been reviewed and confirmed by the South American communities. If there are any omissions, please feel free to reach out to me.
1.Mi Primer Bitcoin nostr:npub17cyatz6z2dzcw6xehtcm9z45m76lde5smxdmyasvs00r4pqv863qrs4ml3 * Introduction My First Bitcoin is a Bitcoin education initiative rooted in the principles of independence, fairness, and community leadership. Originating in El Salvador, it aims to empower individuals and communities by providing open-source educational resources and fostering a decentralized network. Through a commitment to high-quality education, resistance to external influence, and the creation of a global collaborative network, it seeks to spread Bitcoin education to every corner of the world, offering a transparent and transformative model for reshaping traditional financial systems. * Latest Updates Recently, MyfirstBitcoin successfully hosted the fourth Bitcoin Educators Unconference, featuring guests such as nostr:npub1zfgx8v2g0faswd0ry2qn3ay4pvx4jr6q4fw9d0yqalpkyv9hhp0sjccnj5 nostr:npub1rhh9pkmf6l6z7298yg6fgp95rzkmx4j9uxpekn8j73p5k95ck7gsvce7vj attracting around 170 participants and receiving positive feedback. They also held the graduation ceremony in Ilopango, El Salvador, and continued to organize their regular monthly Bitcoin education meetups and Bitcoin game nights. Additionally, MyfirstBitcoin’s Bitcoin Educators Node Network welcomed four new projects from Canada, Nigeria, and the United States. In partnership with Bitcoin Boma, they are launching a free online Bitcoin education course for Malawi in January 2025, aimed at enhancing local Bitcoin knowledge.
- Introduction Bitcoin Beach is a groundbreaking initiative in El Salvador aimed at fostering sustainable local economic development through Bitcoin. The project provides financial services to the community, particularly for those without access to traditional banking. By using Bitcoin for payments, residents can cover everyday expenses such as utility bills, medical costs, and food. Bitcoin Beach leverages the Lightning Network and community collaboration to promote the adoption of Bitcoin both within El Salvador and globally.
- Latest Updates Recently, Bitcoin Beach attended the conference at Bitcoin Lake, where they hosted the Bitcoin Beach Meetup and Bitcoin Beach Festival to support local businesses with Bitcoin. They also invited notable figures such as nostr:npub1q0al05h2uvtj0fp8ww7etl0pdjnkum638ynz9tmku3e522fyvlmqjq04mt Hermann Buhr-Vivier, nostr:npub164xhe3pgcqaj70ls7ls5e4hwlnvl4ttuu8wns99jmwp5z6lwhutsa27wle as podcast guests. The discussions covered a range of impactful topics, including how Bitcoin mining can truly light up rural Africa, how to use Bitcoin to transform small towns in South Africa, and integrating Bitcoin into state-level policies across the United States, among other key areas.
3.Praia Bitcoin Brazil nostr:npub1m3tu3l6y59g2tmackq23v5vgn59u7hu66gxg8xajghz59tqm6xnqk2m888 * Introduction Praia Bitcoin Brazil, located in Jericoacoara, Brazil, is dedicated to creating the country's first Bitcoin circular economy, empowering local residents with financial inclusion. Founded by Fernando Motolese, the project promotes Bitcoin adoption through education, technology, and community-driven initiatives. It has integrated over 40 local businesses into the Bitcoin ecosystem and raised more than 12 BTC through Bitcoin-only crowdfunding. Praia Bitcoin offers self-sovereign financial services and runs programs like the "Bitcoin Smiles" initiative and educational support for children. * Latest Updates Recently, Praia Bitcoin Brazil launched several innovative projects, including the first stage lighting course and free acoustic guitar course funded entirely through Bitcoin crowdfunding. Additionally, Praia Bitcoin successfully hosted the Praia Bitcoin Conference 2024, attracting 10 volunteers, 100 local residents, and 10 new merchants. The conference also sponsored the first music performance paid in Bitcoin and introduced three local courses, all funded via Bitcoin crowdfunding. These initiatives highlight Praia Bitcoin's ongoing efforts to drive Bitcoin adoption and foster local community development.
4.Bitcoin Lake / Lago Bitcoin Guatemala nostr:npub1a4excy7uf9z3mcafvm9cwdr549dl5lpazuvpr2nc550vf27n5a4scqq5k2 * Introduction Bitcoin Lake aims to create a circular economy powered by Bitcoin, providing a novel and accessible solution for unbanked as well as banked merchants in Guatemala. * Latest Updates The Bitcoin Lake community has been actively preparing and promoting a series of innovative initiatives. On November 30 and December 1, Bitcoin Lake successfully hosted its 2024 conference, inviting industry experts such as Ronny Avendaño, co-founder and CEO of the Bitcoin hardware store, and prominent Bitcoin advocate Roman Martínez (chimbera). During the conference, the community also organized creative activities like the coffee workshop and “Be Captain of the Bitcoin Boat”, offering participants an opportunity to dive deeper into Bitcoin and the local economy. Additionally, through partnerships with local merchants, Bitcoin Lake is actively advancing the development of the Bitcoin economy, fostering economic growth and financial inclusion in the community.
5.Bitcoin jungle nostr:npub14f26g7dddy6dpltc70da3pg4e5w2p4apzzqjuugnsr2ema6e3y6s2xv7lu * Introduction Bitcoin Jungle is an open-source community project built on the Bitcoin Lightning Network with the goal of creating a circular Bitcoin economy. The project provides education, resources, and technology to both individuals and businesses. Starting from the Golden Triangle area in Costa Rica (Dominical, Uvita, Ojochal, Platanillo, Tinamaste), it is developing a shining example of what a Bitcoin community can represent. * Latest Updates Recently, the Bitcoin Jungle community has been actively promoting the adoption and use of Bitcoin in Costa Rica, participating in various projects and events. Community members attended the Adopting Bitcoin conference in El Salvador, further advancing global Bitcoin adoption. At the same time, they have been actively supporting children's charity projects and Bitcoin diploma courses, continuously driving Bitcoin education, social responsibility, and community development.
6.Bitcoin Berlín sv * Introduction Bitcoin Berlín sv aimed at creating a financially sovereign town in Berlín, El Salvador, through the implementation of a Bitcoin circular economy. The project seeks to integrate Bitcoin into the local economy by educating residents and businesses about its benefits, promoting the adoption of Bitcoin-based payment systems, and empowering local entrepreneurs with financial education. It also focuses on environmental sustainability, encouraging the use of renewable energy and waste reduction. * Latest Updates Recently, the Bitcoin Berlín sv has been actively promoting the use of Bitcoin by sharing informative articles and supporting the graduation of podcast producer Joel through the BlinkBTC QR code platform, allowing contributions in sats. This initiative not only supports the growth and development of community members but also furthers Bitcoin’s adoption and usage within the community. Additionally, on November 23rd, the community successfully hosted a cultural festival celebrating the local heritage. During the event, all vendors accepted Bitcoin payments, showcasing its practical application in Berlín’s economy. The festival attracted numerous tourists and residents eager to experience Bitcoin payments, further advancing its integration into daily life.
7.Bitcoin embassy San Salvador * Introduction Bitcoin embassy San Salvador is more into promoting Nostr in the region. * Latest Updates Recently, the Bitcoin Embassy San Salvador has been actively promoting the use and adoption of Bitcoin within the community, organizing various events. One of the highlights was the Christmas Toy Drive x Cuarteto Salvación, where toys were purchased using Sats to bring holiday cheer to children in need. The event, held on December 1 at Cuscatlán Park, also featured a special Music Night, attracting a large audience. Additionally, the Embassy hosted an educational gathering for food vendors, aimed at promoting Bitcoin payment systems. During the event, vendors accept Bitcoin payments through tiankii_Tech and blinkbtc platforms, further encouraging local businesses to embrace and adopt Bitcoin payments.
8.ONG Bitcoin Argentina * Introduction ONG Bitcoin Argentina is dedicated to advancing the development and application of decentralized technologies, particularly in the fields of Bitcoin, cryptocurrencies, and blockchain. As a leading organization in this space, the community promotes user protection and the healthy growth of the crypto ecosystem through education, training, and public advocacy. Its mission is to help individuals, businesses, and decision-makers understand and leverage decentralized, transparent, and secure technologies to bring more opportunities and progress to society. ONG Bitcoin Argentina has become a leading force in promoting decentralized technology in Argentina and Latin America. * Latest Updates Recently, ONG Bitcoin Argentina has been actively preparing for the “Moon Party | Despedimos el año ATH (A Todo Hodler)” celebration, set to take place on December 5, 2024. Bitcoin enthusiasts will gather to enjoy exciting activities, including a Lightning Network demonstration and the Fish Bowl Manizesto Bitcoiner art exhibition. In addition, the community has hosted and will host a series of conferences and workshops covering a range of topics, including local digital asset services, Bitcoin as a strategic reserve in the U.S., the reconversion of the Bitcoin and cryptocurrency economy and financial systems, the role of crypto economics in financial system reform, the impact of Bitcoin ETFs on markets, and Bitcoin's influence on global issues, fostering in-depth discussions and development within the crypto industry.
9.La bitcoineta * Introduction La Bitcoineta is an initiative launched by the Argentine community in 2018, designed to promote the adoption and understanding of Bitcoin through a unique and powerful tool: a van and a group of volunteers. This traveling educational project has visited hundreds of towns across Latin America, Africa, and Europe, reaching thousands of people and covering hundreds of thousands of kilometers with the aim of spreading its mission and activities.With its innovative and mobile approach, Bitcoineta has become a globally recognized educational project.
10.Motiv Peru * Introduction Motiv is a non-profit organization founded in 2020, focused on addressing systemic poverty through Bitcoin and innovative projects, aiming to provide better opportunities for survival and prosperity to underserved communities. Its founders, Rich Swisher and Vali Popescu, witnessed firsthand the tragic impact of poverty and lack of basic living conditions in a remote village in the Andes Mountains of Peru, where children were dying due to preventable causes. This inspired them to create Motiv, with the goal of empowering vulnerable populations. By leveraging global support and partnerships, Motiv uses Bitcoin to help local communities break free from poverty and improve their lives, striving to bring positive change and hope to those in need. * Latest Updates Recently, MOTIV Perú has made significant progress in promoting Bitcoin and the circular economy. The organization continues to transform communities across Peru through various initiatives. For example, in the Comas district of Lima, entrepreneurial women are paying for their classes with Bitcoin and learning how to make delicious desserts, further advancing the local circular economy. Additionally, MOTIV Perú held its first Bitcoin training in Carabayllo-Lima, helping Peruvians understand the nature of money and the advantages of Bitcoin. MOTIV is also assisting communities in areas like Tarapoto and Ancon, where locals are using Bitcoin for daily transactions, driving financial freedom and economic empowerment.
11.Montanha bitcoin * Introduction Building a circular economy in Sao thome, Brazil. * Latest Updates Recently, The community has had no recent updates. The latest event dates back to June 2024, highlighting a water contamination incident.
12.Amityage honduras * Introduction Amityage Honduras is the first Bitcoin education center in Honduras, located on Roatán Island in the Prosperá zone. The center's mission is to educate the local community about Bitcoin and spread this knowledge throughout Central America and the Caribbean. It is dedicated to helping businesses on the island adopt Bitcoin as a payment method, teaching children financial literacy, and empowering individuals to achieve financial sovereignty through Bitcoin. The center aims to empower the local community through education and innovation, fostering economic independence and sustainable development. * Latest Updates Recently, Amityage Honduras is actively promoting Bitcoin education by participating in various international Bitcoin events and organizing local courses to help more people understand Bitcoin. Community members took part in significant events such as AdoptingBTC 2024 and BitcoinUnconference, and hosted workshops around the theme of “How to Enter the World of Bitcoin Education.” In Haidmühle, Germany, AmityAge completed a four-day Bitcoin Educators Academy, where the curriculum included topics like using simple analogies to explain Bitcoin and public speaking exercises. Additionally, the community hosted Bitcoin education courses on Roatán Island and provided a free Bitcoin event for beginners at the Crawfish Rock community, further spreading Bitcoin knowledge.
13.Lima - Orange Pill Perú nostr:npub1fw8m5g6nfywmsgqjc66j47jax7jrv8lq46zf7grydjqppc54a8eql47qrx * Introduction Orange Pill Peru is a community-driven initiative dedicated to empowering Peruvians through Bitcoin education. With a focus on transforming the financial landscape, Orange Pill Peru provides resources for individuals to learn about Bitcoin, connect with like-minded enthusiasts, and grow their knowledge through various events and workshops. The community serves as a hub for both beginners and professionals, offering a supportive environment to explore the fundamentals of Bitcoin, its history, and its potential to shape the future of finance. * Latest Updates Recently, there have been no major updates. They actively engage in Bitcoin education and industry updates by sharing and reposting Bitcoin-related content. They support MOTIV Perú's financial freedom education project in the Ancon community in Lima, emphasizing the empowerment of women through Bitcoin. Additionally, the community has shared information about the upcoming Bitcoin Medellin Conference scheduled for January 2025.
14.La Antigua Bitcoin * Introduction La Antigua Bitcoin is a community-based initiative in La Antigua Guatemala, focusing on promoting Bitcoin adoption in local businesses. The community works to create awareness and facilitate the use of Bitcoin as a payment method in various establishments throughout the city. By encouraging merchants to accept Bitcoin, La Antigua Bitcoin aims to integrate cryptocurrency into the everyday economy, driving financial innovation and expanding access to decentralized financial systems within the region. * Latest Updates Recently, the Antigua Bitcoin community has had few updates, with a focus on organizing its first meetup in collaboration with “Run with Bitcoin” on November 24, 2023. The event garnered significant attention within the community, featuring interactions with a special guest. The aim of the event was to further promote Bitcoin adoption in Antigua, Guatemala, and encourage exchange and collaboration between Bitcoin enthusiasts and the local community.
15.Horizonte Bitcoin nostr:npub1wl8u4wfqsdz5m9ey0vvzh4y05mcpk2lm2xhhpw3uzs3878c2mw9sr2ksxk * Introduction Project that aims to contribute to the Bitcoinization of the economy and encourage Entrepreneurship and Decentralization. * Latest Updates Recently, The community has had no recent updates. The latest event dates back to Oct 2024, which shared a message encouraging women to learn more about Bitcoin and connect with others in the field, highlighted a meetup, Satoshe's Lounge, for women, providing a space to learn, discuss, and share knowledge about Bitcoin.
16.Escuelita Bitcoin nostr:npub1awggmqvlw8pa0kp9qq5law8zsvp2a8suztk0357j7e0nt746suwspt7lwx * Introduction Educational Project for Little School. * Latest Updates Recently, the Escuelita Bitcoin team has grown to five members and is actively advancing Bitcoin education and community development. Team members have hosted several workshops in Paraguay and Mexico, spreading Bitcoin knowledge within local communities and encouraging merchants to accept Bitcoin payments, particularly in Ciudad del Este, Paraguay. The team is raising funds through platforms like Geyser. fund and Kuno.anne.media to support the expansion of their educational initiatives and help locals better understand and use Bitcoin. Escuelita Bitcoin also emphasizes privacy education, promoting the use of tools like CakeWallet and Monero. Through collaborations with other organizations and individuals, the team is extending the reach of Bitcoin education, fostering the adoption of Bitcoin in Latin America and emerging markets.
17.Bitcoin é aqui! Rolante/Riozinho-RS-BRASIL nostr:npub168dqt5c8ue3uj8ynlk0lhwalnp7uy39lvzf9tm09wy3htxwmw7qq5nerj4 * Introduction Bitcoin é Aqui! Rolante is located in Rolante, Brazil, and is dedicated to creating a lifestyle and tourism destination where 40% of businesses now accept Bitcoin as a payment method, showcasing the community's success in integrating Bitcoin into the local economy. Residents and visitors can use it to pay for all services, including accommodation, tours, local goods, medical services, and even construction and solar energy equipment. This reflects the practical application and convenience of its use in everyday life, aiming to create a digitally-driven environment powered by Bitcoin. * Latest Updates Recently, the Bitcoin é Aqui! Rolante has been actively promoting the adoption and use of Bitcoin in Brazil and beyond. The community has organized several educational events aimed at spreading basic Bitcoin knowledge and its practical applications in daily life, particularly through online videos and lectures. These efforts help people understand how Bitcoin plays a crucial role in the global financial system. The community has also been actively involved in promoting Bitcoin payments, supporting their adoption by local businesses and in the tourism industry.
18.Bitcoin Forte * Introduction Bitcoin Forte is a voluntary initiative aimed at introducing Bitcoin as a currency to Praia do Forte in Bahia, Brazil. The project provides valuable information about Bitcoin’s importance and encourages local merchants to adopt it as a payment method. By highlighting Bitcoin's international use, simplicity, and security, Bitcoin Forte aims to facilitate its adoption among both tourists and businesses.The community promotes Bitcoin as a stable and controlled currency, helping to avoid systemic price inflation. Bitcoin Forte simplifies the process for businesses by offering tools such as QR codes and the “Satoshi POS Wallet” app, which connects to a merchant’s primary wallet for seamless transactions. * Latest Updates Recently, the community has had no recent updates. The latest event dates back to July 2024, introducing Airbtc, a platform similar to Airbnb, but it only accepts Bitcoin as payment.
19.Bitcoin Paraguay * Introduction Bitcoin Paraguay is a community dedicated to connecting individuals in Paraguay who are interested in Bitcoin, promoting its adoption, and fostering the development of local circular economies. The community’s mission is to increase Bitcoin adoption by collaborating with local businesses and nonprofit organizations, helping to create a more sustainable local economy. Through regular events, talks, and resource sharing, Bitcoin Paraguay provides education and support to its members while actively exploring Bitcoin's application across various sectors in Paraguay. * Latest Updates Recently, the Bitcoin Paraguay community has made significant progress in promoting Bitcoin adoption. On November 5, they successfully hosted the fifth Bitcoin meetup in Asunción, attracting 110 attendees. The event included two Spanish-language presentations and a Lightning Network onboarding training session, with food and drinks available for purchase using Bitcoin. The event was made possible with strong support from sponsors Blink Wallet and Hacking Lives. On November 13, Josef Tetek visited Bitcoin Paraguay to help promote the adoption of Vexl in the country. The community also shared their progress through articles, with Jake, a community member, publishing an article in the Asunción Times on how Bitcoin Paraguay is improving people's lives.
20.Bitcoin Amantikir * Introduction They are starting the first community in the Serra da Mantiqueira to use and extol people about the bitcoin economy. * Latest Updates Recently, the Bitcoin Amantikir community has made significant progress in promoting Bitcoin as a payment method and fostering a circular economy in Santo Antônio do Pinhal. Various businesses, including a pet store, transportation service providers, a hotel, a fruit shop, and a tourist attraction, have started accepting Bitcoin payments. Additionally, the community is organizing a Bitcoin financial education course on December 2nd at Munay Pousada, aimed at helping young people aged 14-18 acquire essential financial knowledge and understand the importance of Bitcoin.
21.La Crypta nostr:npub1rujdpkd8mwezrvpqd2rx2zphfaztqrtsfg6w3vdnljdghs2q8qrqtt9u68 * Introduction La Crypta is an open-source community dedicated to advancing the adoption of the Nostr protocol and Bitcoin through developer-friendly tools and resources. By providing an integrated open-source stack, La Crypta empowers developers to sync with multiple relays, showcase profiles with badges, and facilitate seamless messaging, making it easier to build and utilize decentralized social platforms. Events like hackathons further enhance collaboration and attract new members, fostering innovation in decentralized social media. * Latest Updates LaWallet, their open-source wallet, integrates Bitcoin, Lightning, and Nostr to provide a seamless learning experience. With over 8,000 NFC cards distributed across conferences in regions like Argentina, Brazil, and Spain, LaWallet enables easy adoption while prioritizing user privacy. The wallet’s functionality is now supported by Alby’s official browser extension, further boosting accessibility.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ df478568:2a951e67
2024-11-25 02:36:04Chef's notes
Easy Beef Stroganoff(Fast AF Beef Stroganaff)
This is an easy weaknight meal.
Details
- ⏲️ Prep time: 10 minutes
- 🍳 Cook time: 30 minutes
- 🍽️ Servings: 4
Ingredients
- rice
- 2 lb. ground beef
- 8 oz. sliced mushrooms
- 1 stalk of geeen onions, chopped
- 1/4 tsp. garlic salt
- 1 10.5 oz. can of cream of mushroom soup
- 1 cup sour cream
- peas
Directions
- Cook the rice
- Brown ground beef. Remove and set aside.
- Saute mushrooms and green onions
- Cook peas(I usually use the microwave)
- Return beef to Dutch oven. Add cream of mushroom and sour cream
- Cooknon low heat for 12 minutes.
-
@ 468f729d:5ab4fd5e
2024-12-11 00:00:35 -
@ de75eb1d:710c3014
2024-11-24 20:28:46Chef's notes
Traditional Victorian recipe made better with the addition of chocolate, fills x6 one lb jars and each jar makes approximately 15 pies or one large tart.
Store in a cool dry place for 12 months for an even deeper flavour.
Unlike supermarket mincemeat, this recipe is naturally palm oil free when made using traditional ingredients (NOT Atora!), you could swap the animal fat for ghee or solid cocoa butter.
Go wild on the dried fruit, anything and everything works. This is a great area to play around and make extra special versions - like Cherry Brandied Chocolate! You can also swap or omit the nuts
Details
- ⏲️ Prep time: 30 mins
- 🍳 Cook time: 3 hours
Ingredients
- 1 lb cooking apples, cored and diced
- 1.5lb mixed dried fruit
- 1lb unrefined sugar (or honey)
- 1/2lb beef suet
- 1/2lb candied citrus peel
- 2oz chopped or flaked almonds
- 4tsp mixed spice
- 1tsp ground cinnamon
- 1/2tsp ground nutmeg
- 1/2lb dark chocolate roughly chopped
- 6tbspn brandy or rum
- zest and juice of 2 oranges & lemons
Directions
- Combine all of the ingredients except the chocolate and alcohol in a large oven proof bowl, cover and leave overnight to infuse
- Next day cover the bowl with foil and bake slowly for 3 hours in a preheated oven at 120c
- As the mincemeat cools periodically stir in the fat and when completely cold add the alcohol and chocolate chips
- Pack into sterilised jars and cover with a wax disk or 1tsp melted suet, screw the lids on tight and it will keep for 3-5 years
-
@ 21b41910:91f41a5e
2024-11-23 12:00:26Chef's notes
Based on assorted recipes and refined over time, this round of beef tastes great as a result of the sweet and savory marinade.
Details
- ⏲️ Prep time: 5 minutes (+ 1 day)
- 🍳 Cook time: 20 minutes
Ingredients
- 2 pounds lean beef (may be labeled as London Broil)
- 1/3 cup olive oil
- 1/4 cup soy sauce
- 1/4 cup malt vinegar
- 1/4 cup lemon juice
- 1 tbsp sweetener of choice (honey, molasses, syrup, 4 packets of duck sauce, etc)
- 2 tsp old bay seasoning
- 1 tsp garlic powder
- 1 tsp sea salt
- 1/2 tsp black pepper
Directions
- Day Before: Mix all ingredients except the beef in a bowl to form a marinade. Place the cut of beef in a gallon sized Ziploc bag. Pour marinade over beef, ensure fully covered. Remove any excess air from the bag and seal. Place back in refrigerator for up to 24 hours before cooking.
- Cooking: Bring beef out of refrigerator (still in bag), and allow to rise to room temperature (about 30-40 minutes). Preheat broiler for about 15 minutes (your oven will vary). Broil for about 7-8 minutes on one side, then flip over. Continue broiling for another 7-10 minutes until temperature reads 140°F. Remove from broiler and let rest for 10 minutes before slicing thinly.
-
@ 3c7dc2c5:805642a8
2024-12-10 21:43:25🧠Quote(s) of the week:
'It takes 40 years to mine the last Bitcoin. 40 fucking years. For one Bitcoin. None of us understand.
It means if you are a whole coiner your children or grandchildren (if they are smart) will inherit the equivalent of 40 years’ worth of energy used to secure the Bitcoin network. NO ONE is prepared for this.' -FractalEncrypt
🧡Bitcoin news🧡
On the 3rd of December:
➡️'Bitcoin is still just 0.2% of global asset value.
Here is the latest update of this chart, which you may have seen in Saylor's presentations. With Bitcoin's price over $90k, it may feel like you're late to Bitcoin... but it is still a tiny bucket in the global asset ocean. As a ~$2T asset, it's incredibly early for Bitcoin.' - Jesse Myers
Bitcoin is “0.2% right now, at 1% of the total global assets, Bitcoin's a $9 Trillion asset, and worth about $450,000, at 3% is worth $1.3 Million per BTC. One of the most crucial and easiest charts to understand.
Oh and regarding the volatility, let me quote Joe Burnett: "Bitcoin is volatile because it’s a $450T asset trading for only $2T growing at a 70% CAGR. MSTR packages this volatility, sells it, and buys more Bitcoin. Do you see the reflexivity yet?
➡️'An estimated ~2.5 Million bitcoin ($240 billion) are lost forever.
Don’t let your stack be next. Here are the 5 most common self-custody mistakes people make (and how to avoid them):' Great thread by River:
TLDR: Avoid these mistakes to keep your Bitcoin safe: 1. Practice restoring your wallet before sending funds to it. 2. Send test transactions before the full amount. 3. Air-gap your wallet for large amounts. 4. Keep inheritance plans simple & secure. 5. Manage your UTXOs smartly. Here are the 5 most common self-custody mistakes people make (and how to avoid them)'
➡️Canadian publicly traded company Bitcoin Well Inc. adoptsBitcoinas a treasury reserve asset and is raising $2 million to buy more BTC.
➡️BlackRock’s Bitcoin ETF surpasses the 500K Bitcoin benchmark, currently worth over $48 billion.
➡️Mashinsky to plead guilty in Celsius fraud case.
➡️Virgin Voyages announces it is the first cruise line to accept Bitcoin as payment.
➡️The US government has transferred nearly 20K $BTC valued at $1.92 billion. Meanwhile, Coinbase CEO Brian Armstrong agrees with US Space Force major Jason Lowery that the US gov't should NEVER sell its Bitcoin holdings, citing it as a strategic mistake that makes no sense at any price point.
➡️Total balance on exchanges drops to around 2.8M BTC, down from 3M in February.
➡️MARA's convertible note offering just upsized from $805 MILLION to $1 BILLION at 0% interest due to massive demand.
➡️Japanese House of Representatives member Taro Kono posts a picture of his friend mining Bitcoin with a Bitaxe.
On the 4th of December:
The impact of truth evolves as more people acknowledge it. Here’s another milestone:
➡️Russia's President Putin says, “For example, Bitcoin, who can prohibit it? Nobody. Who can prohibit the use of other electronic means of payment? Nobody. Because these are new technologies and no matter what happens to the dollar, these tools will develop one way or another because everyone will strive to reduce costs and increase reliability.”
➡️Donald Trump officially nominates pro-Bitcoin Paul Atkins as next SEC Chair.
➡️And on the same day, Jerome Powell calls Bitcoin a competitor of gold, not the dollar. '“It’s just like gold only it’s virtual. It’s digital. People are not using it as a form of payment or as a store of value. It’s highly volatile. It’s not a competitor for the dollar. It’s a competitor for gold.”
Great thread on how Bitcoin will disrupt all markets.
➡️On that statement made by Powell: Powell: "Bitcoin is not a store of value. It's too volatile" Reality: Bitcoin is not only the best-performing asset in history (and certainly in 2024), it has a HIGHER Sharpe ratio (risk-adjusted return) than the S&P, Treasuries, and gold. - ZeroHedge
➡️'Missing just the 2 best 24-hour periods of Bitcoin returns each year since 2014 would've completely wiped out the 12,964% gains you’d have made by simply HODLing.' - Wicked
This is why you shouldn't trade Bitcoin, just avoid trading. Just imagine you just had the balls to HODL aka. patience aka. low time preference. Full disclosure, in the past I had no balls.
➡️One of the largest bitcoin miners in the world launches a ‘Strategic Bitcoin Reserve’. Hut 8!
➡️Saylor presents a “Trump Max” plan for a U.S. Strategic Bitcoin Reserve, proposing the government acquire 4 million Bitcoin and convert 75% of surpluses into BTC. By 2045, this strategy projects a value of $81 trillion.
➡️Pete Rizzo: Someone just activated an 11-year-old wallet with 2,700 Bitcoin worth $254 MILLION. They HODL'ed from $600 to $96,000.
On the 5th of December:
➡️There it is! The price of Bitcoin hit USD 100,000 for the first time! 100,000 infinitely printable US government tokens per glorious Nakamoto-grade orange coin. And a crucial and painful conclusion is that few traditional investors will have enjoyed it! Ps.: 80% of all dollars were created in the last 5 years.
Daniel Batten: 'On the day Bitcoin broke 100K, Bitcoin critics cannot even say "but it boils the oceans" anymore without looking utterly ignorant, as a 6th sustainability magazine covers how Bitcoin helps green energy adoption and grid stabilization.'
➡️El Salvador is now $333 MILLION in profit on its Bitcoin investment. IMF in tears.
Other countries go full retard. ➡️Central Bank of Chile has ruled out adding Bitcoin as a reserve asset, citing non-compliance with IMF standards for foreign reserves. 'The International Monetary Fund (IMF) has extended various financial arrangements to Chile over the years, primarily as precautionary measures to bolster the country’s economic resilience. These arrangements include the Flexible Credit Line (FCL) and the Short-term Liquidity Line (SLL).' -Fiatextractor In other words, Chile is not a sovereign country. It's like a fentanyl junkie in San Fran! That FIAT line of credit is just too good to give up.
➡️ The German government sold 50,000 Bitcoin at $55,000. Bitcoin is up 85% since then. Missed out on a cool $2.35 BILLION profit...Verdammt nochmal!
➡️Semler Scientific just bought another $29.3m Bitcoin. Since adopting a Bitcoin Treasury Strategy in May 2024 the Company has bought $147.1 million Bitcoin. MicroStrategy playbook!
➡️Bitcoin sets a NEW ALL-TIME HIGH against gold. It now takes 39 ounces to buy one Bitcoin.
On the 6th of December:
➡️Czech Republic scraps capital gains tax on Bitcoin held +3 years! The Czech Republic has enacted a new law eliminating capital gains tax on Bitcoin held for more than three years and prohibiting banks from discriminating against Bitcoin businesses.
➡️El Salvador bonds rally as Bitcoin jumps past $100,000" — Bloomberg 'What this means is buying Bitcoin has been such a HUGE success that El Salvador is now able to refinance its debt at much lower interest rates, and can use the savings to buy even more Bitcoin!' -Bitcoin Archive
➡️The City of Newport rejects the offer of James Howells, who in 2013 lost a hard drive containing 8K Bitcoin ($~800M), now buried in a local landfill, equal to 25% of the funds recovered in a change of search permission for him and his data recovery team
➡️On the Schwab Network: "If you don't have at least 10% of your portfolio in Bitcoin or Bitcoin-related assets, you're going to fall significantly behind."
➡️$891 MILLION of leveraged crypto positions liquidated in just 24hrs. REKT!!
➡️Bloomberg terminal now shows the Bitcoin price as $0.1m instead of in thousands.
➡️'The US spot ETFs have just passed Satoshi in total Bitcoin held, now hold more than 1.1m, more than anyone in the world, and they're not even a year old yet, literally babies still. Mind-blowing.' -Eric Balchunas (foto)
The time it took for Bitcoin to add a zero to its exchange price:
On the 7th of December:
➡️U.S. Treasury says Bitcoin's primary use case is "digital gold". Meanwhile, Bernstein researched, Bitcoin to replace gold as the leading store of value within the next ten years - Bernstein research
Dennis Porter: 'The U.S. Treasury just declared that Bitcoin is digital gold and yet some people still think $100,000 bitcoin is too expensive. We are going much higher.'
If your goal is to accumulate as much gold as possible, well the best strategy is to be saving in Bitcoin.
Bitcoin replacing gold is the logical base case. Replacing every de facto Medium of Saving is the logical base case. Gold is the first asset in the domino stack to experience what it feels like when Bitcoin starts to suck away its monetary premium, reducing its market value to its utility value. Replacing fiat is a much larger and more speculative leap. But it will come, in due course.
➡️'Bitcoin miners in the aggregate have seen a significant reduction in the total Bitcoin held in wallets linked to mining activities. On-chain analytics platform Santiment revealed a decline of 85,503 BTC over 48 hours, representing the largest drop since February 2024.' -Bitcoin News
➡️Holding Bitcoin has been profitable for over 99.8% of its history!
➡️'Bitcoin Cycles Timeline. I don't make the rules.
2016-2020
Halving to Peak: 525 days
Peak to Bottom: 364 days
Bottom to Halving 518 days
2020-2024
Halving to Peak: 532 days
Peak to Bottom: 371 days
Bottom to Halving: 532 Days
The next halving date is March 26, 2028. Look how accurately the above timeline would put us at the halving...
Will the pattern continue?' -Brett
On the 8th of October:
➡️Microsoft could make history in two days, on the 10th of December, as shareholders vote on whether to add Bitcoin to the balance sheet. A decision that could ripple across corporate America.
➡️Joe Burnett: 'Median new US home price in bitcoin
2012 - 50,616 BTC
2013 - 19,127 BTC
2014 - 351 BTC
2015 - 901 BTC
2016 - 697 BTC
2017 - 323 BTC
2018 - 24 BTC
2019 - 84 BTC
2020 - 46 BTC
2021 - 10 BTC
2022 - 20 BTC
2023 - 14 BTC
2024 - 4.3 BTC'
Great anecdote by someone called BTCbeardman on Twitter: 'I bought my home in March 2023. The price was $495,000, which was 22.5 BTC. Today the value is $560,000, which is 5.6 BTC. In a little less than 2 years my home value increased 13% in dollars. But it lost 75% of its value in Bitcoin. Real estate is COLLAPSING in front of us.'
➡️On this day, someone sent 1,000 BTC, today worth $100 million, around the world for a $10 fee. Now try that with Fiat or with Gold. That's the beauty of Bitcoin.
➡️'MicroStrategy has bought $17.5 billion Bitcoin this year, and $13b of that in the last just 6 weeks. Some thought the 2027 target of $18b was a fantasy, but he's about to smash that this week with another buy. How much will Saylor buy this week? Another $1b, $2b... $5b?' -Bitcoin Archive
On the 9th of December:
➡️So far today:
- MicroStrategy bought $2.1 BILLION Bitcoin. Freaking conviction by Saylor. Although, I don't like that MicroStrategy is holding more than 2% of all Bitcoin to ever exist.
- UAE holding its first-ever Bitcoin conference.
- Public company Riot is raising $500 million to buy Bitcoin.
➡️'Bitcoin has just closed its first daily AND weekly candle above $100k. Congrats to all the HODLers! Iran to embrace Bitcoin with regulatory framework instead of banning them, says Minister of Economic Affairs First Russia, then China...now Iran.' -Bitcoin Archive
➡️Publicly traded AI firm Genius Group buys an additional $2.2 million.
➡️Amazon shareholders have submitted a request for the $2.3 Trillion company to explore adding Bitcoin to its treasury. Amazon shareholders request that the Board conduct an assessment to determine if adding Bitcoin to the Company's treasury is in the best long-term interests of shareholders. foto)
➡️IMF tells El Salvador that Bitcoin acceptance by businesses must be voluntary to unlock a $1.3b loan.
They're scared of success...
💸Traditional Finance / Macro:
On the 2nd of December: 👉🏽'This is the strongest stock market in decades: The S&P 500 is up 26.5% this year and on track for its best annual performance in 26 years. If the S&P 500 rises another 3.5%, it would mark the first annual gain of 30% or more since 1997. Additionally, the S&P 500 has hit 53 all-time highs year-to-date, the 3rd highest this century.
This is only below the 70 and 62 all-time highs seen in 2021 and 2017. Since the October 2023 low, the S&P 500 is now up an incredible 47%.' TKL As mentioned in the previous Weekly Recap the Mag 7 is unprecedented. The rest of the SP500 and economy are just bloated on printed money barely outpacing inflation. Oh, by the way, the last time U.S. stocks were this overvalued versus the rest of the world was... well, never.
👉🏽'Buffett’s cash allocation is at 30% of Berkshire Hathaway’s total assets Such an elevated cash position has NEVER been seen. His cash pile has just hit a RECORD of $325 billion. Warren Buffett's cash pile just hit another ATH, reaching $325 billion That’s $325 billion sitting on the sidelines at Berkshire Hathaway. Well, the last time Buffett maintained elevated cash levels was between 2004 - 2007 During these 3 years, his cash allocation consistently exceeded 20%.' -Bravos Research This could get ugly…
🏦Banks: 👉🏽 No news
🌎Macro/Geopolitics:
On the 3rd of December:
👉🏽'The US government brings in about $5 trillion annually in revenue from taxes, fees, and tariffs. The US government is on pace to spend about $1.4 trillion for interest payments on the $36 trillion debt in 2025. That will be about 28% of all govt revenue going to interest payments.' - WallStreet Mav And that 28% is increasing almost exponentially due to all those short-term bonds rolling over from low to high rates… Again no gloom and doom, just facts. Total US debt is now up ~$13 TRILLION since 2020 and at a record $36 TRILLION.
Another source: 'The US is projected to spend $3.8 billion PER DAY on interest expense in 2025. The US net interest payments on national debt hit a $1.12 trillion annual rate in Q3 2024, a new record. This is TWICE the amount seen in 2021, according to the Bureau of Economic Analysis data. As a result, interest as a % of government revenue hit 18%, the highest in 30+ years. Interest expense now exceeds government spending on R&D, infrastructure, and education COMBINED.' -TKL
👉🏽South Korean parliament votes 190-0 to lift President Yoon's martial law declaration. According to Odaily, the South Korean government has pledged to provide UNLIMITED LIQUIDITY to the market if needed. And there it is: just need a little martial law for BRRRRR.
“If we exclude the tech sector, EU productivity growth over the past 20 years would be broadly at par with the US” - Draghi
If we exclude the industry that makes loads of money and is integral to the world, and to our future, then the EU is on a par with the US. Sure just exclude the most productive sector in the last 20 years. Let’s see what we can regulate in the EU next.
“If my grandmother had wheels, she would have been a bike”.
"If you exclude athletic ability and technical skills, I am broadly at par with Ronaldo (R9)."
Oh well, you get the picture!
'Anyway, the US to European equity valuations have risen to 3.6x in November, a record. This ratio has DOUBLED in 8 years. To put this into perspective, the long-term average is 3 TIMES lower, at ~1.2x. This comes as the US stock market has outperformed Europe in 12 out of the last 15 years. This year alone, the US has returned ~21% more than Europe, the largest difference since 1976. US stocks are dominating the market.'
A sobering EU thread, worth your time and read: https://x.com/0x_ale/status/1864731334327066683
👉🏽IMF Fiscal Monitor: Fiscal consolidation measures reduce output and household consumption; cuts in public investment are particularly detrimental. "If taxes are progressive, raising them leads to smaller output losses." Source: https://www.imf.org/en/Publications/FM/Issues/2024/10/23/fiscal-monitor-october-2024
👉🏽Mark Zuckerberg's Meta joins Amazon and Google to back nuclear energy to power AI data centers - Axios
On the 4th of December:
👉🏽France's government collapses after losing a no-confidence vote in parliament. Macron just landed from a trip to Saudi Arabia without a government. Putaaaaiiinnn. To put things into perspective! France's creditworthiness is now comparable to Greece's rather than being on the same level as Germany.
👉🏽October payrolls revised from 233K to 184K, the biggest negative revision since May 2023. As a feature, downward revisions. Classic. Just a casual 20% negative adjustment.
'The Household survey showed significant weakness, with the number of employed people falling by -355,000 in November. Meanwhile, the US lost -111,000 full-time jobs and -268,000 part-time jobs. There are now 1.7 million people in long-term unemployment, up from 1.2 million last year. All while the US government added +33,000 jobs last month ALONE. Something doesn't add up here.' -TKL
👉🏽The normally fiscally conservative Germans want more debt to deal with an ailing economy. German Bank president Joachim Nagel urges Berlin to relax rules to address defense and infrastructure shortfalls. "If you put major increases in tariffs on top of current forecasts, the economy might broadly stagnate for even longer".
How to tides have changed, innit? 'Flashback to the Eurozone crisis of 2011-2012, when Germany's finance minister Schäuble demanded austerity in Southern Europe, claiming that "too high deficits and debt levels" had caused the crisis: "You can't cure an alcoholic by giving him alcohol." The discourse was out of control.'- Phillip Heimberger
👉🏽Last week I mentioned how the EU bit by bit is rolling out their digital agenda. Dr. Jan Wústenfeld: The EU proposal to scan all your WhatsApp chats is back on the agenda. The transparent citizen. Meanwhile, the ECB says the digital euro will set the privacy "gold standard". Something does not add up. Watch what they do, not what they say."
Full Disclosure: "On December 6, 2024, the European Pirate Party reported that the European Council Committee stopped the proposal (yet again) as more governments joined the list of countries against it."
Source: https://www.techradar.com/computing/cyber-security/the-eu-proposal-to-scan-all-your-whatsapp-chats-is-back-on-the-agenda
On the 6th of December:
👉🏽Germany's industrial downturn shows no signs of easing. Industrial production dropped by 1% in October MoM, starting the final quarter w/an unexpected decline & raising concerns about a potential winter recession. Compared to last year, industrial production was down ~5%. Industrial production in Germany - now more than 17% lower than at the end of 2017.
👉🏽'Total world debt officially hit a record $323 trillion in Q3 2024. Over the last 3 quarters, global debt has skyrocketed by $12 TRILLION, according to the Institute of International Finance (IIF). In just two decades, global debt has TRIPLED. Moreover, global debt-to-GDP now stands at 326% and remains above pre-pandemic levels. Furthermore, debt in emerging markets reached a near-record $105 trillion, or 245% of GDP. Debt is skyrocketing around the globe.' -TKL
Now imagine the burden of interest expenses, imagine that the entire world is based on borrowed money (future generations' time & productivity).... 323 trillion and rising vs. 21 million BTC (max.).
👉🏽President Nayib Bukele revealed that El Salvador has discovered up to $3 TRILLION in unmined gold, and he is now moving quickly to repeal the mining ban regulation so that miners can get to work.
"We've also found gallium, tantalum, tin, and many other materials needed for the 4th and 5th industrial revolution." -Bukele
And this is why Bitcoin is going to outcompete gold. We'll never find a hidden stash of 3 trillion dollars of Bitcoin that no one knew about.
👉🏽'As long as Asia builds almost 1.000 new coal power plants, it doesn’t really matter what we in the West do to fight climate change Even if we moved the UK, Germany or Spain back to the Middle Ages as left green degrowth freaks dream of, it would have barely any impact on climate.' -Michael A. Arouet
Now don't get me wrong. The problem isn't China. The thing is, in Germany (Europe, the West) we believe that we alone can save the climate no matter what the rest of the world is doing.
Next to that, 'We're not only fighting climate change in the West... we're also lighting candles, planting trees, drinking vegan bio milk extracted by hand from virgin cows, and singing kumbayah around the campfire.' - Triangleforces.
And even that isn't the real problem. The real problem is the absolute increase of Chinese CO2 between 2022 and 2023 is larger than the total that Germany has. For example, the elimination of Germany from the planet would equal Chinese growth of one year. But who manufactures for the rest then if we close all the coal plants in China? The EU and the US together consume almost half of the world’s resources, while only making up 10% of the world’s population. The ecological crisis goes way beyond emissions. We have a spending and a consumerism problem.
🎁If you have made it this far I would like to give you a little gift:
What Bitcoin Did is back! $100K BITCOIN, MICROSTRATEGY AND THE BULL MARKET with Checkmate.
Checkmate is an on-chain analyst and founder of Checkonchain. In this interview, they discuss the relaunch of 'What Bitcoin Did,' Bitcoin breaking 100K and the growth in institutional demand.We also get into the the Strategic Bitcoin Reserve, the impact of options on Bitcoin's market dynamics, and the MicroStrategy playbook as a volatility product.
https://www.youtube.com/watch?v=Wvf6NV23rqw
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly. Use the code BITCOINFRIDAY
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple.⠀⠀⠀⠀⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with sats.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe -Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 8cd9d25d:69e9894d
2024-11-23 04:45:03Chef's notes
Note that youtube recipe is asking for 1tablespoon of salt, which is waaaaaay too much. Recipe works fine with a teaspoon,, but your mileage may vary. Play around with it.
You don't need to prove modern packet yeasts in my experience... just yolo it.
If you want an extra crispy crust, add a second baking pan to the base of the oven as you pre-heat. Then once you've placed the dough in, to the oven, take some boiling water and pour into the second baking tray. This gives you a steam oven on a budget :)
Details
- ⏲️ Prep time: 15min (not including time for dough rises)
- 🍳 Cook time: 30mins
- 🍽️ Servings: 4-5
Ingredients
- 500 grams wholemeal spelt flour
- 1 packet baker's yeast (10grams)
- 350 ml lukewarm water
- 350 ml lukewarm water
- 1 teaspoon salt 🧂
Directions
- Preheat your oven to Preheat oven to 430°F and put a baking tray in at the same time to heat up.
- Add all ingredients to a bowl (best to use a stand mixer to save time, but you can do by hand too. Mix and knead until the dough comes together. After about 5 mins you should have a moist dough that doesn't stick to your hands... if it is a bit sticky, just add a bit more flour (different flours like differenent amounts of water)... If too dry, add a bit more water... etc.
- Remove dough from bowl & form into a ball (smooth on top, never mind if not perfectly smooth on its base). Put back in a bowl and cover with a damp cloth. Allow to rest for 30mins/1hr until dough has roughly doubled in size. Time will depend on the ambient temp where you are. In the tropics, 30mins is just fine.
- Take risen dough out of bowl and put on a floured surface and press the gas out of it... flatten the dough with your hands, and then fold each edge in until you have a rectangle (video makes this bit clear). Then roll the rectangle up into a cylinder. This gives you a nice tight dough for baking. Pinch the ends of the cylinder to seal the dough.
- Place dough onto a baking sheet/ piece of parchment paper etc... cover with damp towlel and let rise for 15/30mins
- Score the risen dough (a razer blade, clean box cutter, or serrated knife works well) , this lets steam escape from the loaf as it bakes without slpititng it in ways you wouldn't like.
- Take your hot baking tray out of the over and transfer your dough onto it. Put into oven.
- Bake at 430°F (220°C) for 15mins, then reduce oven temp to 350°F (180°C) for the final 15mins. Total bake time 30mins.
- Remove from oven and allow to cool for 20-30mins.
-
@ 765da722:17c600e6
2024-12-10 20:49:34The mercies, blessings, and kindnesses of God are many and constant. From the very air we breathe to the Word we read, the Spirit of God overflows us with divine goodness. Our greatest good is salvation in Christ Jesus.
Each one has his own reasons to give thanks. God deals with us as individuals. Many of our reasons overlap, but each day reveals specific and individual moments of attention from the Almighty.
In all he does, the Lord wants us to see and know him. He created us for that reason. He brought us into being for love.
It is probably good to have a specific day to give thanks. We ought to be reminded that it is our first task every single day of our lives.
You are good and do only good; teach me your decrees. Psalm 119.68 NLT.
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ a17fb4ed:c53f7e91
2024-12-10 19:21:22Every now and then I take a step back and read this classic. I keep it taped to the back of my office door as a reminder. I'll leave it here on Nostr for all of you to read as needed.
Cheers, Yooper
“Father Forgets”
Listen, son: I am saying this as you lie asleep, one little paw crumpled under your cheek and the blond curls stickily wet on your damp forehead. I have stolen into your room alone. Just a few minutes ago, as I sat reading my paper in the library, a stifling wave of remorse swept over me. Guiltily I came to your bedside.
There are the things I was thinking, son: I had been cross to you. I scolded you as you were dressing for school because you gave your face merely a dab with a towel. I took you to task for not cleaning your shoes. I called out angrily when you threw some of your things on the floor.
At breakfast I found fault, too. You spilled things. You gulped down your food. You put your elbows on the table. You spread butter too thick on your bread. And as you started off to play and I made for my train, you turned and waved a hand and called, “Goodbye, Daddy!” and I frowned, and said in reply, “Hold your shoulders back!”
Then it began all over again in the late afternoon. As I came up the road I spied you, down on your knees, playing marbles. There were holes in your stockings. I humiliated you before your boyfriends by marching you ahead of me to the house. Stockings were expensive‐and if you had to buy them you would be more careful! Imagine that, son, from a father!
Do you remember, later, when I was reading in the library, how you came in timidly, with a sort of hurt look in your eyes? When I glanced up over my paper, impatient at the interruption, you hesitated at the door. “What is it you want?” I snapped. You said nothing, but ran across in one tempestuous plunge, and threw your arms around my neck and kissed me, and your small arms tightened with an affection that God had set blooming in your heart and which even neglect could not wither.
And then you were gone, pattering up the stairs. Well, son, it was shortly afterwards that my paper slipped from my hands and a terrible sickening fear came over me. What has habit been doing to me?
The habit of finding fault, of reprimanding‐this was my reward to you for being a boy. It was not that I did not love you; it was that I expected too much of youth. I was measuring you by the yardstick of my own years.
And there was so much that was good and fine and true in your character. The little heart of you was as big as the dawn itself over the wide hills. This was shown by your spontaneous impulse to rush in and kiss me good night. Nothing else matters tonight, son. I have come to your bedside in the darkness, and I have knelt there, ashamed!
It is feeble atonement; I know you would not understand these things if I told them to you during your waking hours. But tomorrow I will be a real daddy! I will chum with you, and suffer when you suffer, and laugh when you laugh. I will bite my tongue when impatient words come. I will keep saying as if it were a ritual: “He is nothing but a boy‐a little boy!”
I am afraid I have visualized you as a man. Yet as I see you now, son, crumpled and weary in your cot, I see that you are still a baby. Yesterday you were in your mother’s arms, your head on her shoulder. I have asked too much, too much.
-W. Livingston Larned
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 65912a7a:5dc638bf
2024-11-22 21:37:16Details
- ⏲️ Prep time: 5 min
- 🍳 Cook time: 30 min
- 🍽️ Servings: 12
Ingredients
- 12-14oz fresh cranberries
- 1⅓ cup packed brown sugar
- 1 cup raisins
- 1 orange, peeled & chopped
- 1 cup water
Directions
- Using medium sauce pan, simmer cranberries and water for 5-6 min. Cranberries will start to pop.
- Add brown sugar, raisins, and chopped orange to the berries.
- Bring to a simmer and continue to cook for 20 min. Stir often to prevent sticking. Remove from heat.
- Let set until room temp. Mixture will thicken as it cools.
- Put in a covered container and keep refrigerated. Lasts for about 2 weeks.
-
@ 9bc2d34d:d19d2948
2024-11-22 17:26:28Chef's notes
Hot Dogs? Check. Cheese? Check. Jalapeno? Definitely (unless you can't handle the spice)
Details
- ⏲️ Prep time: 1 minute
- 🍳 Cook time: 3-5 minutes
- 🍽️ Servings: 1-4
Ingredients
- 3 Hot Dogs (Sliced Thinly or Cut into Chunks)
- Handful of Shredded Cheese Blend
- 1/4 Jalapeno minced (add less or more)
- Optional: Any toppings you like on nachos, such as tomatoes, onions, sour cream, beans, etc
Directions
- Microwave 3 hot dogs for 2-3 minutes (some hot dogs will expand)
- Top with cheese
- Microwave for 1-2 minutes (until cheese is melted)
- Sprinkle all your favorite toppings on top
- Serve
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ deba271e:36005655
2024-12-10 16:39:14Overall this was such a great experience, but as always there are couple things that could be better. Don't hate me. Complaining about experience is in my job description.
- Internet at feria: There are connection issues hampering the experience for both sellers and buyers.
- Having a wifi for the sellers would greatly improve the situation - but I also understand that none of this can be imposed by outsiders - I'm happy to help [REDACTED].
- Another option is to create geyser.fund campaign specifically for this - "Get internet for bitcoin merchants at Uvita farmers market". I'm using the words in this title carefully to be catchy in the right way.
- Then one of the best ways is just get the wifi access QR code (often can be generated in the access point interface), print it and give that to the sellers. No need to hassle with the password, etc.
- Teaching bitcoin to buyers at feria: At the feria there were many people buying the produce that have no idea what is bitcoin. Since the ferias are the flagship experience of Bitcoin Jungle, this would be a great opportunity to teach the buyers about bitcoin.
- I think it would be great to have some (sensible) billboard/banner that explains how to use bitcoin, how to download the app, get colones on it and then pay at the feria.
- This could actually be incentivized by some campaign like "Get 5000 CRC to use at feria if you install lightning wallet for the first time" (again this could be funded by geyser campaign if you don't have funds for this). The sellers can just point to the banner if someone asks them.
- Maybe there is a chance to have a small bitcoin booth at the corner of the feria that could give away some basic printed info about bitcoin and how to use it. It could sell books (Gladstein, Lyn Alden, the El Salvador classbook, etc), some tote bags (useful for the market) or similar useful bitcoin branded merch.
- Help all sellers accept bitcoin: There were 2 sellers that didn't accept bitcoin and that's ok, but it would be great to mitigate the gap in experience for the buyers. One option is for the ask the seller next to them to accept the bitcoin for them and give them colones (I have seen this happen in one case - it worked great). And so this just needs a small bit of education.
- Allow pre-configuring items in the POS: The selers that have fixed price items (i.e. not weighted) were still adding the numbers on calculator or similar, it was a bit tricky for them, prone to mistake.
- (I haven't actually seen the Bitcoin Jungle wallet POS, so maybe this is already solved - if yes, then ignore)
- Consider providing features to pre-configure the items in the POS, so the seller can just tap on items and it adds those up. One benefit of this for the selers is that this can give them precise tracking for how many pineapples they sold, etc.
- This is something that actually works quite nicely in the Breez wallet. See the screenshot bottom right: https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcafc3cd0-adb3-47be-bdcd-9d3ba57fe967_1614x906.png
- Keep btcmap.org up to date: Currently I don't think https://btcmap.org/map#15/9.16567/-83.73844 lists the feria and maybe other places. This is something that many bitcoiners coming to the are will use and so keeping the btcmap.org up to date would go a long way. It's fairly simple to add new items to the map and there are many communities in each country that keep those up to date (e.g. I know people that are calling the restaurants and verifying that they still accept bitcoin).
- Try including some ready to eat food seller at the feria: Currently the selection of produce was nice, but one thing that was a bit missing is the one stand that sells ready to eat local food.
- This could be some sandwiches, quesadillas, etc…
- Have a board for people offering services: This is just an idea - not sure how well would it work and also this may already be handled somewhere else in Uvita?
- One thing that could be useful and I was actually looking for is to have some form of a big board where people can offer their services - cooking, cleaning pools, taking care of kids, fixing roofs, teaching surfing, etc. It could be a board where people can pin their notes with WhatsApp numbers like this. Do you want some work done at your house or garden? You would just come to check this board.
- Internet at feria: There are connection issues hampering the experience for both sellers and buyers.
-
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ ac8bb9b0:70278acc
2024-11-21 15:14:11Chef's notes
If you’d like to make this soup part of your rotation and want to shave off a little time for the next time around, double the recipe for the meatballs and freeze half. That way, all you’ll have to do is make the soup and add the meatballs as directed in the recipe. (They may take a few extra minutes to warm through if you add them directly from the freezer.)
The soup can be frozen for up to 3 months but wait until you reheat the soup to add the pasta. Defrost the soup in the refrigerator for 12 hours and then reheat it on the stovetop over medium heat until simmering, add the pasta, and cook until the pasta is tender.
Details
- ⏲️ Prep time: 50
- 🍳 Cook time: 30
- 🍽️ Servings: 8
Ingredients
- 1 large egg
- 3 tablespoons finely chopped fresh chives
- 2 teaspoons finely chopped fresh sage
- 2 cloves garlic, minced
- ¾ lb 85 or 90% lean ground beef
- ½ lb sweet or hot Italian sausage, removed from the casings
- ½ cup grated Parmigiano Reggiano
- ⅓ cup Italian seasoned bread crumbs
- ¼ teaspoon salt
- 2 tablespoons extra virgin olive oil
- 1 medium yellow onion, diced
- 2 large carrots, diced
- 2 stalks celery, diced
- 6 cups high-quality chicken broth
- 2 cups high-quality beef broth
- 2 cups water
- ½ cup dry white wine
- 1 bay leaf
- ½ teaspoon salt
- ¼ teaspoon white pepper (okay to use black pepper)
- 1 cup small dittalini pasta
- 4 oz fresh spinach, stems trimmed and roughly chopped (once prepped, you should have about 3 packed cups)
- Parmigiano Reggiano, for serving
Directions
- Make the meatballs: Preheat the oven to 350°F. Line a baking sheet with aluminum foil and set an oven-proof roasting rack over top. Spray the rack generously with nonstick cooking spray.
- In a large bowl, beat the egg with the chives, sage and garlic. Add the remaining meatball ingredients and mash with your hands until evenly combined. Roll the mixture into tablespoon-size balls, about 1 inch in diameter (it will make approximately 50 meatballs), and place on the prepared rack. Bake for 15 to 18 minutes, or until lightly browned and cooked through. Set aside.
- Meanwhile, start the soup. In a large soup pot or Dutch oven over medium heat, heat the olive oil. Add the onions, carrots, and celery and cook, stirring frequently, until the vegetables are softened, about 8 minutes. Add the chicken broth, beef broth, water, wine, bay leaf, salt and pepper and bring to a boil. Add the pasta and cook, uncovered, at a gentle boil until the pasta is al dente, 8 to 10 minutes (or according to package directions). Taste the soup and adjust the seasoning, if necessary. Reduce the heat to low and add the spinach and meatballs. Simmer for a few minutes, until the spinach is wilted and the meatballs are warmed through. Ladle into bowls and serve with grated Parmigiano Reggiano.
-
@ eaef5965:511d6b79
2024-12-10 14:33:54Bit late this quarter, but here now for the latest release on the most irreducible form of money, the monetary base. Data comes from the top 50 currencies in the world, their countries of which represent 96% of global GDP and 84% of global population (not very fair, right there). Gold and silver is analogous to this money supply. As is the stock of bitcoins.
This is quarterly release #26, for 2024 Q3.
If you have followed my work before, then you know that the constant hymn I've sung while speaking publicly about Bitcoin is that the only, economically comparable money supply in the fiat world to 21 million bitcoins is what economists call the "monetary base," or "base money." This is a corporeal money supply that has existed across all of modern economic and central banking epochs. For an apples-to-apples, ontological comparison with Bitcoin, look no further then Base money.
So what is it?
It is central bank money, comprised of two supplies:
- Physical currency: Notes and coins, or “cash;”
- Bank reserves: The “Master account” that each commercial bank holds with its central bank.
Now, why do I refer to this as, "Central bank money?" This is because, unlike all other money supplies in the fiduciary banking world (like M1/M2/M3), the Monetary base is the sole and ultimate money supply controlled by the central bank. It is, literally, the printing press.
What follows won't be a lesson in reserve ratios or monetary economics. The point is that you simply understand that there is a money supply that central banks solely control, and of course (of course!) this is what Bitcoin's 21 million are up against.
The monetary base is to the core of the entire fiat financial system, as 21 million bitcoins are to the core of the Bitcoin protocol.
One is open and permissionless, and one is not.
By the way, the monetary base is essentially (though not entirely) analogous to the total liabilities of a central bank, so we can (basically) say that the monetary base is the "balance sheet" of each central bank.
On cash. Quick notes on the above. Certainly you understand what "cash" is, and it is indeed an instrument that has been fully monopolized by each central bank in each nation around the world--only they can print it. Even though it is true that banks in more free banking societies in the past could freely print and strike notes and coins, the central bank (or state) monopoly has been around for a long time. Kublai Khan was the first to do it 750 years ago.
On bank reserves. Don't stress your brain on this too much, but this is the main "settlement money" that banks use between each other, when they want to settle their debts. It is digital now (Fedwire in US, CHAPS in UK), but it doesn't technically have to be, and of course before modern technology took over even a few decades ago, it was not.
These two stacks of retail and wholesale cash, stacks of central bank money, are what makes up the Monetary base. This is the printing press. Only this compares to 21 million bitcoins.
And gold, and silver by the way.
Final note, central bank digital currencies, or CBDCs, which are simply LARPing on Bitcoin's success, are indeed created by central banks, and they are indeed classified as Base money. They are going to be a "third rail." They are thankfully incredibly small, pilot projects today. We will see how far democracies will be tested, as autocracies no doubt will mainstream them; but for now, consider them, at least economically, to be inconsequential to the update below.
With that review out of the way, onward to Q2 update for 2024.
Bitcoin is the 6th largest money in the world.
In February 2024, it surpassed the monetary base of the United Kingdom, that is its value was larger than the Bank of England's balance sheet, and it remains so to this day.
As of 30 September 2024, it is only the balance sheets of the big four central banks that are larger than Bitcoin. They are:
- Federal Reserve (dollar): $5.59 trillion
- People's Bank of China (yuan): $5.40 trillion equivalent
- European Central Bank (euro): $5.28 trillion equivalent
- Bank of Japan (yen): $4.69 trillion equivalent
If we remove gold from the equation (we shouldn't), then Bitcoin could be considered the 5th largest money in the world.
However, the all-important monetary metal throughout history that even a child knows about--gold--is still king at around $16.5 trillion in value, or 6.1 billion ounces worldwide. Note, this does not include gold lost/recycled through industry; in that case, it is estimated that about 6.9 billion ounces of gold have been mined throughout humanity.
Update #26 Executive Summary
Silver, for what it's worth, is still a big "monetary" metal; though it is true, much more silver is gobbled up in industry compared to gold. There are about 31 billion ounces of non-industrial silver floating around the world (most of it in jewelry and silverware form) that is valued in today's prices at nearly $1 trillion. Bitcoin bigger.
State of the Print: $27.0 trillion.
If we add up the Big Four central banks already mentioned above (again, Bitcoin being larger than the Bank of England's monetary base), as well as the next 46 central banks, we get to a total, USD equivalent value of $27.0 trillion in base money across the world.
If we consider $27.0 trillion as the Big Boss of central bank money, then Bitcoin at $1.25 trillion network value (September, quarter-end figure!) indeed has some way to go. But as we can see from the last month leading up to this publishing, that can change quickly. We have just surpassed $100 thousand per bitcoin, which brings the network value to $2 trillion. We can also imagine how the Pareto distribution occurs even in money, if Bitcoin after only 15 years is already larger than every central bank money in the world except for four of them. Wild to ponder.
Supply inflation: 12.7% per year.
It is also true that for two years they have been trying to "normalize" their balance sheets after the 2020-22 Covid madness, stimulus, and money printing. Of course, they have been trying all along to normalize since the 2008 global finance crisis (GFC), but I digress.
When I first started my website, I vowed never to use such a non-corporeal thing as CPI to discuss how much things cost. A "general increase in the level of consumer prices," or CPI, as measured by planning boards around the world, is not a real thing. It may be calculated by people with the best of intentions, but it has been manipulated and volumes have been written about it. I don't use it.
I have always defined inflation as the classical economists did: Inflation is an increase in the "stock" of money. If we know the all-time stock of euros printed by the European Central Bank now, and we know the all-time stock of euros printed by the ECB 12 months ago, then it is very easy to calculate the annual inflation of the euro. Not only is it easy, but it is real. It is corporeal. Watch what they do, not what they say.
I have been tracking this since 2018, and though this figure has evolved slightly (mostly increasing from massive COVID stimulus of 2020-2021, the high-signal, important to remember figure of all-time compound annual growth (CAGR) of the global base money supply since 1969 is 12.7%. That is 12.7% compounded, per year. It is a doubling time of 5.8 years.
Growth rate of the monetary base
It is highly valuable to understand that, ceteris paribus, if the demand for cash balances does not keep up with this monetary supply increase, then prices will rise. This erodes purchasing power. I do not attempt to measure the demand for cash balances in this research. Regardless, 12.7% is a useful figure to understand.
Let's compare.
For the rest of this report, I want to do something different and simply spend some time looking at the compound annual growth rates of various corporeal things around the world, in order that we can compare those to the growth of the fiat monetary base, and Bitcoin.
Remember, most things in the financial and economic world grow exponentially. This simply means that they grow constantly. The financial term here is compound growth, or compound interest. This rate of growth can indeed change year to year (interest rates can go up, or down), but over the years we can observe a strong trend, and that is what I want to summarize here for you.
Population.
The world has grown exponentially at 1.7% per year over the last 75 years. However, despite all the overpopulation myths you've probably heard, this rate of growth is actually falling, well below trend, and we only grow at 0.9% per year at the moment.
GDP.
The United States has grown its economy at 5.2% compounded per year since the founding of the republic. We are at the higher end of this trend right now, $28.8 trillion output per year, growing at 5.3% per year. As this is exponential growth, if I put it on log scale, it will become a straight line.
Stocks.
Stocks grow exponentially as well, don't let anyone tell you otherwise. The growth rate is 7.3% per year for the S&P 500, the main US index that tracks more than 80% of total market caps. Showing this one on linear scale on the left-hand axis, just so you can see how it typically scales.
Stocks. With Dividends.
If you reinvest those dividends into the same stock market, you'll earn more. The all-time compound annual growth increases by 2% higher to 9.3% per year for the S&P. Also displaying this one on linear scale.
Bonds.
Bonds are supposedly safer than stocks (bondholders get paid back first), and more cash flowing. If you look at the longest running bond index in the US, it grows at 7.1% per year, compounded. Notice how, in a rising interest rate environment (which we are at the moment), bonds will suffer, if viewing the price (or index, as in this case, using the Bloomberg Aggregate Bond Index). This has kept the bond market returns at the lower end of the range, since the global financial crisis in 2008.
Base Money.
As we've discussed, base money grows across the world at a weighted average of 12.7% compounded per year. However, this trendline analysis looks at it differently than my headline figure. It simply looks at the USD value of the global monetary base (again, $27.0 trillion), and draws an exponential trendline on that USD equivalent growth for 50+ years. In other words, this is going to be after all currency fluctuations have played themselves out.
Do you think the growth rate here will be higher or lower? Actually, it is lower, at 10.3% per year. But there is a big asterisk here, in that the series is not consistent across time. I typically just display it for visual effect. As more and more central bank balance sheets were added to this analysis across the 1970s and 1980s, it is not technically rigorous to run an exponential trendline analysis across these totals. Better to use my headline figure of 12.7% CAGR. Again, the 12.7% figure is rigorously calculated, measuring the native growth rate of each monetary base across every month recorded, then weighting that across every other monetary base in that monthly basket, then averaging all months for an all-time figure, and then raising that all-time monthly weighted average to the power of 12.
What is interesting, however, is that the 10.3% derived CAGR using the exponential regression below is lower than my native headline figure of 12.7% . Remember, the 10.3% exponential regression does not account for all the new money supplies coming in during the 1970s and 1980s (which should push the regression slope higher as new supplies are added), and it is after all currency fluctuations have been factored in, to arrive at a USD equivalent. The lower 10.3% CAGR can only mean that central bank balance sheets actually lose value against the US-dollar faster than they can print!
Note, I am showing this one in linear scale. The trendline projects out to $83 trillion by December 2033. The current global supply of base money ($27 trillion) is about $6.5 trillion less than the current trendline ($33.5 trillion).
Silver.
This is total ounces ever mined. They trend upward at 1.4% per year.
Gold.
This is total ounces ever mined. Gold trends upward at 1.7% per year. Faster than silver. Surprised? Notice the R-squared (goodness of fit) for both silver and gold production increase.
Bitcoin.
Bitcoins grow according to a basic logarithmic curve. Trying to draw percentiles is pointless here, and even measuring a trendline is relatively pointless, as everyone knows the bitcoins prescribed into the future, per the protocol. Better to just quote the trailing 12-month growth figure, and it is 1.5% per year and falling, as of quarter end Sep-2024. Less than gold.
Silver price.
Since 1971 it's trended at 3.4% per year. Silver bug?
Gold price.
Since 1971 it's trended at 5.1% per year. Gold bug?
Bitcoin price.
Now, we have finally arrived at something that grows differently than exponential. As I've observed since 2018, Bitcoin grows according to a power trend. Did you notice that the prior exponential trends displayed themselves as straight lines on log scale? Well, with Bitcoin, the power trendline gradually falls across time, but the growth is still well larger than anything we've covered thus far.
Why? It's being adopted, of course.
Bitcoin's power trendline has grown 167% per year since Bitcoin Pizza Day in 2010. Note that this is something akin to a "Lifetime Achievement" figure, and it will continue to fall every day. Over the prior 12 months ending 30 September 2024, Bitcoin grew 134.6% over the year. Well higher now at $100k. The compound growth of the power trend today is 44% per year. By 2030 it will fall to "only" 36% per year.
Oh yes, and it is free (as in speech), open, and permissionless money.
To summarize.
That was a lot of data across a lot of charts. I've compiled it all in a helpful table here for you to review at any time. This is the monetary and major asset world at third quarter end, 2024:
Base money concluded
The following table gives you a complete summary of the fiat currencies, gold, silver, and Bitcoin figures used in this analysis, for this quarter. Please print it out if you like, it is meant to be a helpful, in-depth companion when fiat friends come asking.
Thank you for reading! If you enjoyed, please consider zapping, and you can also donate to my BTCPay on my website if you'd like to help keep this research going.
-
@ 349d6b82:12b2a5b1
2024-12-10 13:59:40В кинотеатре "Родина"__ пройдет показ __отечественного фильма "Зимняя мечта" 16 декабря, приуроченный к празднику "День Киноискусства", который отмечает достижения российских кинематографистов. Этот праздник был учрежден в честь выдающегося режиссера Александра Невзорова, известного своими глубокими и эмоциональными фильмами: "Ад" (1995), "Лошадь распятая и воскресшая" (2008), "Записки отельера Гельвеция" (2020).
Сюжет нового фильма Александра Невзорова рассказывает историю о том, как группа друзей, переживших утрату, отправляется в зимний поход в горы, чтобы восстановить свои отношения и найти смысл жизни. На фоне снежных пейзажей они сталкиваются с внутренними демонами и находят поддержку друг в друге, открывая новые горизонты для своих жизней. Фильм сочетает элементы драмы и комедии, подчеркивая важность дружбы и поддержки в трудные времена.
В рамках праздника "День Киноискусства" будут организованы мероприятия, в котором Александр Невзоров проведет обсуждение своего нового фильма и ответит на вопросы зрителей. А участники смогут поучаствовать в мастер-классах по сценарному мастерству и режиссуре. И будет представлена выставка фотографий и реквизита из предыдущих работ Невзорова.
Александр Невзоров прокомментировал: "Я рад, что "Зимняя мечта" будет показана в Серове в рамках "Дня Киноискусства". Это событие не только подчеркивает важность отечественного кино, но и создает пространство для обсуждения глубоких тем, которые затрагивает мой фильм. Мы живем в эпоху, когда искусство должно __вызывать вопросы, провоцировать на размышления и, возможно, даже идти наперекор устоявшемся представлениям.__ Я надеюсь, что зрители смогут не просто увидеть историю, но и ощутить ее эмоциональную глубину. __Искусство__ — это не только развлечение, но и возможность для диалога о том, что действительно важно".
Это культурное событие - возможность для зрителей погрузиться в мир киноискусства, оценить достижения отечественного кинематографа и отметить вклад Александра Невзорова в развитие этой сферы.
-
@ 07804b78:c375c543
2024-11-21 11:37:37Chef's notes
- The Premium Juku Curry comes individually packaged in single-serving portions, so it's convenient for using small amounts like in this recipe.
- Use your favorite spicy level of hot bean-curd soup base/curry roux.
Details
- 🍽️ Servings: 4
Ingredients
- 1 box of “Cook Do®” (Chinese seasoning mix) for Szechuan-style Mapo Tofu
- 2 servings of Premium Juku Curry
- 500g tofu
- 400g cut tomatoes
- 200g minced meat
- 80g garlic sprouts
- 100ml water
- 1 tablespoon sesame oil
- Cooked rice, enough for the number of people
Directions
- Slice the garlic shoots diagonally into 3-4cm pieces. Cut the tofu into bite-sized pieces.
- Heat the sesame oil in a frying pan and fry the minced meat over a medium heat.
- When the meat is about 80% cooked, add the garlic shoots and continue to fry, stirring, until the meat is fully cooked.
- Turn off the heat and add the Cook Do® Sichuan-style Mapo Tofu seasoning, and mix well.
- Turn the heat back on to medium, add the cut tomatoes and water, and bring to the boil, stirring gently.
- When it comes to a boil, turn the heat down to low, add the Premium Juku Curry, and stir well to dissolve.
- Once the curry has dissolved, add the tofu and cook until the tofu is warmed through.
-
@ 4870d550:110d6208
2024-12-10 13:51:18From Trey Walsh, Executive Director of The Progressive Bitcoiner
As most of you know by now, either by personally holding it or seeing it in the news, Bitcoin recently crossed the much anticipated threshold of $100,000 per coin. While this is an incredible feat and shows the obvious interest and resilience of this 16 year old technology and network, particularly when cycle after cycle those in media say Bitcoin is dead or useless, this is just one small part of Bitcoin’s incredible story, use case, and reason for existing really.
As many of us advocating for Bitcoin say, Bitcoin is Freedom Go Up.
Bitcoin’s trojan horse is its price movement via supply and demand mechanisms. Because there will only ever be 21 million bitcoins, this brings scarcity and a deflationary design to Bitcoin, which plays a huge part in its price movements and value. One of the things that clicked early on for me, particularly after hearing from human rights activists like Alex Gladstein, Farida Nabourema, and early bitcoin educators like Andreas Antonopoulos, is that one thing we can rely on in this world, that is often seen as a negative (particularly from folks on the left like myself), is greed and self-interest. Even those that come to Bitcoin with purely greed and self-interest at heart help to benefit the network, protocol, and growth of this Bitcoin movement and protocol which empowers individuals. I’ll provide a couple of examples.
I’m not suggesting all bitcoin miners are filled with purely greed and self-interest. But even if they are…hear me out. Bitcoin mining is a tricky and competitive business, and each 4 year cycle sees a further crunch on the economics of those looking to mine bitcoin as the bitcoin subsidy/reward (new bitcoins “minted” if you will) gets cut in half (currently at 3.125 bitcoins every 10 min roughly). So Bitcoin miners are constantly searching for the cheapest electricity and most efficient ways to run their operations. Here are ways bitcoin miners bring about incredible societal benefits:
Renewable Energy — More and more the cheapest forms of electricity are found in renewable energy sources due to technological advancements and the ability for bitcoin miners to be location and time agnostic. Bitcoin miners also take advantage of the excess energy often created by renewables (at off peak times when the energy is literally being wasted). Bitcoin miners also help contribute to expanding renewable energy projects. For example, Gridless builds renewable energy mini-grids in rural Africa and uses Bitcoin mining to monetize excess electricity, making the projects financially sustainable. The Bitcoin mining provides a steady demand for power, creating profits that subsidize infrastructure costs and lower electricity prices for local communities
Grid Stabilization — Bitcoin miners are uniquely suited to respond to grid conditions because they can quickly adjust their energy consumption. This flexibility can help stabilize grids during periods of high demand or low supply and reduce the need for fossil-fuel-powered peaker plants, which are often used during energy demand spikes. Miners like Riot Platforms also participate in demand response programs, temporarily reducing their energy use when grid demand is high, supporting overall grid reliability.
There are endless examples of the benefits bitcoin mining can bring to society, communities, renewable energy expansion in our battle against climate change, and more. I’d encourage you all to follow the work of Daniel Batten, Margot Paez, Troy Cross, and Elliot David to learn more about bitcoin mining and the environment.
As an open, permissionless, decentralized network that anyone can participate in, Bitcoin is an empowering tool for every individual on the planet regardless of your location, economic status, age, gender, religion, and on and on. It is the ultimate tool for financial inclusion, and those seeking to hold a money/asset that cannot be debased by governments, nor confiscated by bad actors (if it is held in self-custody- not your keys, not your bitcoin!)
In fact, even dictators like Vladimir Putin know that Bitcoin cannot be stopped by anyone, including himself. Just last week, he had this to say about Bitcoin:
Via our podcast we’ve had numerous conversations about Bitcoin for human rights with activists, nonprofits, philosophers, and beyond which we encourage you to check out. Quite literally almost every episode we’ve done includes a component of this because we know how important and critical this is to Bitcoin’s story and purpose.
The examples of empowerment and human rights are endless, including as a way to preserve wealth under hyperinflation and fight government chokeholds in places like Venezuela, Nigeria, and Afghanistan, fund movements and protests that have faced challenges due to de-banking under the traditional financial system including in Hong Kong and even Canada with the trucker protests, and further enable donations to hard to reach parts of the world in a frictionless way like what the Human Rights Foundation does to get funding to developers, projects and activists around the world.
So remember, particularly for our U.S. based audience, the next time you see Bitcoin in the news mostly dominated by narratives about the rich getting richer on wall street, President Trump and politics, a bitcoin strategic reserve for the U.S. government, or politicians railing against Bitcoin as useless and just for criminals…there is another side to all of this, the global picture of Bitcoin as a tool for human rights, everyday people, building a brighter, more hopeful future that empowers individuals and communities.
Still don’t believe me? Well here’s a hopeful message from Bitcoin advocate and Progressive Congressman form California Ro Khanna at The Bitcoin Conference this past summer in Nashville.
Originally published at https://progressivebitcoiner.substack.com.
-
@ ac8bb9b0:70278acc
2024-11-20 16:28:11Chef's notes
Optional: Creamy Cilantro-Basil Ranch: In a blender, blend 1/2 cup plain Greek yogurt or sour cream, 1/3 cup mayo, 2 tablespoons buttermilk, 1 cup fresh cilantro, 1/2 cup fresh basil, 1/4 cup fresh chopped chives, 2 teaspoons Worcestershire, 1 teaspoon garlic powder, 1 teaspoon onion powder, 1/4 teaspoon cayenne, and a pinch each of kosher salt and black pepper. Blend until creamy.
Details
- ⏲️ Prep time: 15
- 🍳 Cook time: 15
Ingredients
- 4 (4-6 ounce) salmon filets, cut into bite-size chunks
- 6 tablespoons extra virgin olive oil
- 1 teaspoon smoked paprika
- salt and black pepper
- 1 bunch asparagus, ends trimmed
- 1/2 cup honey
- 2-3 tablespoons hot sauce
- 1-3 teaspoons cayenne pepper
- 3/4 teaspoon chipotle chili powder
- 1/2 teaspoon garlic powder
- 1/2 teaspoon onion powder
- 3-4 cups cooked rice
- 2 avocados, diced
- 1 serrano or jalapeño, sliced
- 1/2 cup fresh cilantro, chopped
- 2 tablespoons chopped fresh dill
- 1/2 cup crumbled feta cheese
- 2 tablespoons extra virgin olive oil
- 1 tablespoon lemon juice
- 1/3 cup toasted seeds, pumpkin, sesame, sunflower, etc.
Directions
-
- Preheat the oven to 450° F.
-
- On a baking sheet, toss the salmon pieces with 3 tablespoons olive oil, paprika, salt, and pepper. Arrange in a single layer. On the other side of the pan, add the asparagus. Toss with 1 tablespoon olive oil, salt, and pepper. Roast 10-15 minutes or until the salmon is just undercooked to your liking.
-
- Meanwhile, make the hot honey. In a sauce pot, warm together the honey, hot sauce, cayenne, chili powder, onion powder, and garlic powder, plus a pinch of salt.
-
- Spoon some of the hot honey over the salmon. Switch the oven to broil and broil until lightly charred and crispy. Spoon over additional hot honey, to your taste.
-
- To make the avocado salsa. Combine avocados, serrano or jalapeño, cilantro, dill, feta cheese, extra virgin olive oil, lemon juice, and toasted seeds in a bowl and season with salt, gently tossing.
-
- Arrange the salmon and asparagus over bowls of rice. Top with salsa.
-
@ 349d6b82:12b2a5b1
2024-12-10 13:37:2710 декабря состоялась акция, организованная социальной компанией "Доброе сердце", приуроченная к празднику "День благодарности". Этот новый праздник был учрежден для того, чтобы выразить признательность ветеранам за их мужество и жертвы, принесенные ради мира и свободы.
В этот день волонтеры компании "Сердце ветерана" посетили ветерана, Генерала Майора Александра Ивановича Птицына, который отметил свой 95-й день рождения. Акция началась с теплых слов благодарности и поздравлений. Волонтеры вручили Александру Ивановичу большой подарок — корзину с продуктами, в которую вошли его любимые угощения: домашние пироги, конфеты и фрукты.
Александр Иванович в молодости. 25 лет. 1974 год.
Волонтеры подготовили небольшую концертную программу. Они исполнили несколько известных военных песен, среди которых были "День Победы" и "Тёмная ночь". Песни трогали сердца присутствующих, создавая атмосферу уважения и памяти о героических подвигах.
Акция стала частью более широкой программы "Забота о ветеранах", реализуемой компанией "Сердце ветерана". За последние два года в рамках этой программы было организовано более 50 мероприятий, направленных на поддержку ветеранов и их семей.
"Я хочу выразить искреннюю благодарность всем, кто пришел сегодня поздравить меня и других ветеранов. Это очень трогательно, когда молодое поколение помнит о нас и о том, что мы сделали для нашей страны. Я надеюсь, что такие мероприятия будут проходить чаще, чтобы молодое поколение знало о нашей истории и ценило мирное небо над головой. Еще раз спасибо всем вам за внимание и заботу. Это очень важно для нас! И спасибо большое за подарки" - проговорил Александр Иванович.
Такое внимание к ветеранам поддерживает их физическое состояние и создает чувство значимости и признательности со стороны общества.
-
@ ac8bb9b0:70278acc
2024-11-20 16:25:18Details
- ⏲️ Prep time: 25
- 🍳 Cook time: 20
- 🍽️ Servings: 6
Ingredients
- 1 tablespoon extra virgin olive oil
- 1 medium yellow onion chopped (about 1 1/2 cups)
- 2 teaspoons kosher salt, divided
- 3 tablespoons red curry paste
- 2 tablespoons grated fresh ginger (from a 3-inch piece)
- 3 medium cloves garlic, minced (about 1 tablespoon)
- 4 cups lower-sodium vegetable broth
- 1 1/2 pounds butternut squash, cut into 1 1/2-inch cubes (from 2 [20-ounce] package)
- 1 15.5-ounce can unsweetened coconut milk, well stirred
- 2 tablespoons fresh lime juice (from 1 or 2 limes)
- 6 tablespoons crushed salted peanuts
- Chopped fresh cilantro and crushed red pepper (optional), for serving
Directions
- Heat oil in a large pot over medium. Add onion and 1/2 teaspoon salt; cook, stirring often, until onion starts to brown, 6 to 7 minutes.
- Add curry paste, ginger, and garlic; cook, stirring, until fragrant, about 1 minute. Add broth and 1 teaspoon salt, scraping up browned bits from bottom of pot. Stir in squash. Bring to a simmer over medium-high. Cover and reduce heat to low; simmer until squash is tender, 12 to 15 minutes.
- Remove from heat. Stir in coconut milk, lime juice, and remaining 1/2 teaspoon salt. Use an immersion blender to process until smooth. (Or transfer to a blender, cover with lid, and remove center piece. Place a towel over opening. Process until smooth.)
- Serve sprinkled with peanuts, cilantro, and, if using, crushed red pepper.
-
@ ac8bb9b0:70278acc
2024-11-19 19:49:52Chef's notes
This recipe is SO easy. We simply mix herbs and spices in a small dish. Add the chicken legs to a large, gallon-sized ziptop bag and add the olive oil. Seal the bag and roll those legs around for a minute to distribute the oil evenly on all the chicken. Then, open the bag, pour in the seasonings, close the bag and do the shake thing. Take a minute or so to do this and massage the chicken to really get that seasoning well distributed.
Seasoning chicken legs in a ziptop bag Set aside for a minute and preheat your oven to 425°(F) and line a baking sheet with aluminum foil. Give the foil a good spray with non-stick cooking spray. This is important as the chicken will stick without it.
Now take the chicken out of the bag and place on the foil lined sheet. Then into the oven it goes for 40 minutes.
Recipe for oven baked chicken legs After 40 minutes the chicken will be a beautiful golden color and the inside will be at least 165°(F) when checked with an instant read thermometer. In fact, it will probably be closer to 185-195°(F) which is exactly what we want!
Pro Tip: Chicken Legs are Better at 185-195°(F)! The rule of cooking chicken to a minimum internal temperature of 165°F has been well-established for quite some time. However, when it comes to darker meat portions such as chicken legs, thighs, or the entire leg quarter, exceeding this temperature is often encouraged for optimal results! When heated to around 185°F, the collagens within the meat begin to break down, contributing to the juiciness and “fall-off-the-bone” tenderness that we cherish so much in dark poultry meat.
Check out this great article by America’s Test Kitchen regarding “overcooking” chicken drumsticks and thighs.
Let Rest and Serve Carefully remove the chicken to a plate or platter and let it rest for 5 minutes before serving.
Recipe for oven baked chicken legs Can this recipe be doubled? It sure can. You can even triple or quadruple this recipe! Simply adjust the ingredients accordingly. The cook time will still be 40 minutes, just be sure to not crowd the chicken too much on the pan. Keep the legs from touching and always keep in a single layer.
Give it a kick Want to give the chicken legs a little heat? Add a ½ teaspoon of cayenne pepper and even a teaspoon of crushed red pepper flakes. You can also deepen the flavor by using smoked paprika instead of regular paprika.
Details
- ⏲️ Prep time: 10
- 🍳 Cook time: 40
- 🍽️ Servings: 2-3
Ingredients
- 6 chicken legs
- 2 tsp paprika
- 1.5 tsp kosher salt
- 1 tsp onion powder
- 1 tsp garlic powder
- 1 tsp rosemary, dried
- 1 tsp parsley flakes
- ½ tsp ground black pepper
- ½ tsp ground mustard
- 1 tbls olive oil
Directions
- Preheat oven to 425°(F)
- Pat chicken legs dry with a paper towel and trim any excess skin
- Place chicken legs in a large ziptop bag and add olive oil. Close bag and shake to coat chicken well with the oil.
- Add seasoning mix to bag, close and shake to get chicken well coated with seasoning.
- Line a baking sheet with foil and spray with non-stick cooking spray.
- Place chicken legs on baking sheet and place on middle rack of oven for 40 minutes, turning halfway.
- Chicken must have internal temperature of at least 165°(F), but 185-195°(F) is ideal for best results.
- Let rest for several minutes before serving.
-
@ 2063cd79:57bd1320
2024-12-10 13:04:20Wir sprechen oft über Bitcoin im Zusammenhang mit Geld oder Währungen. Bitcoin funktioniert als Zahlungsmittel, als Wertspeicher und als Recheneinheit - doch macht das Bitcoin zu Geld? Also, was ist Geld überhaupt und was macht ein Gut erst zu Geld? Und warum gibt es gutes Geld und weniger gutes Geld? Es gibt viele Arten von Geld, Warengeld, Notenbankgeld, Fiatgeld, usw. Doch wollen wir uns erstmal ganz von Anfang an mit der Funktionen und den Eigenschaften von Geld im Allgemeinen beschäftigen.
Was ist Geld?
Ohne auf die Geschichte von Geld zum drölftausendsten Mal einzugehen (dazu kann man so ziemliches jedes Buch über Geld, Bitcoin, Ökonomie, etc. bis Seite 75 lesen und bekommt ganz genau die gleichen Infos), ist es sinnvoll sich kurz zu klarzumachen, dass niemand bestimmt oder definiert, was Geld ist. Geld kann im Endeffekt alles sein. Jeder, der Kindern schon mal beim Spielen zugesehen hat, wird erlebt haben, wie kurzerhand aus Steinen, Stöcken, DUPLO-Steinen oder eigentlich allem, was man in der Reichweite von Kindern so findet, plötzlich Geld wird. Denn ohne es zu wissen, verstehen Kinder sehr intuitiv, wie Geld funktioniert.
Geld ist Sprache. Geld ist wahrscheinlich sogar eine Sprache, die sich vor unserer modernen kommunikativen Sprache entwickelt hat. Selbst vor Urzeiten, als verschiedene Völker und Stämme auf den verschiedensten Winkeln der Erde herum zogen und sich somit erstmal verteilten und dann wieder vermischten, entwickelten sie unterschiedliche Arten der Kommunikation. Die eine gemeinsame Sprache jedoch, war die des Handels.
Kurzes Szenario: Homo Sapiens 1 hat einen Sack voller selbstgeschnitzter Pfeilspitzen in der Hand und betritt eine Lichtung, auf der Homo Sapiens 2 gerade eine Antilope grillt. Homo Sapiens 1: Uhhhhhhhhhhhhhh (zeigt auf die Antilope). Homo Sapiens 2: Ahhhhhhhhhhhh (wehrt mit den Händen wedelnd ab und springt in verteidigender Haltung auf). Homo Sapiens 1: Uhhhhhhhhhhhhhhhh (öffnet seinen Sack mit den Pfeilspitzen und legt 10 davon so hin, dass Homo Sapiens 2 versteht, dass HS1 diese zum Tausch anbietet). Homo Sapiens 2: Haaaaaaaaaaaaaa (reißt eine saftige Keule von der Antilope ab, schmeißt diese HS1 vor die Füße und schnappt sich die Pfeilspitzen).
Handel ist also älter als Schrift oder Sprache. In dem Szenario hat Homo Sapiens 1 gegenüber Homo Sapiens 2 einen Vorteil, denn er hat einen Sack dabei, in dem sich ein Wirtschaftsgut befindet, das andere Personen bereit sind, gegen ihre Besitztümer zu tauschen. So entsteht über einen gewissen Zeitraum Geld. Dabei sind die Funktionen von Geld immer die gleichen, egal welches Mittel gewählt wird. Das Mittel hängt im Wesentlichen von der lokalen Verfügbarkeit (bzw. der Begrenztheit dieser) ab.
Funktionen von Geld
Geld muss im Wesentlichen drei Funktionen erfüllen können: Es muss als Tausch- oder Zahlungsmittel funktionieren, es sollte ein Wertaufbewahrungsmittel sein und als Recheneinheit dienen.
In dem Szenario mit den beiden haarigen Protagonist//innen, sind diese drei Funktionen sehr leicht identifizierbar. HS1 hat selbstgeschnitzte Pfeilspitzen in einem Sack mitgeführt, da diese als Zahlungs- oder Tauschmittel verwendet werden können (HS2 hat bereitwillig feinstes Antilopen-Filet dafür eingetauscht), die Pfeilspitzen sind insofern Wertaufbewahrungsmittel, als dass sie (anders als das Fleisch) über Zeit nicht verderben und somit (zunächst) wertstabil sind - und damit HS1 incentiviert wird Pfeilspitzen zu sammeln (sparen) - und es war HS2 schnell möglich 10 Spitzen abzuzählen und somit seinem/ihrem Produkt einen Gegenwert beizumessen, sie dienen also auch als Recheneinheit.
Dies ist nur ein Beispiel, denn wie gesagt, Geld kann alles sein, das diese drei besprochenen Funktionen erfüllt und wenn sich mindestens zwei Parteien darauf einigen können, dass es sich bei dem verwendeten Mittel auch um ein Geld-würdiges Mittel handelt. Hätte HS1 kurzerhand 10 Steine vom Boden aufgehoben, um diese gegen das Fleisch zu tauschen, hätte HS2 laut "Uhhhhhhhhhh!" gerufen und mit dem Kopf geschüttelt, denn 10 Steine aufheben kann er/sie auch. Doch die Pfeilspitzen haben in diesem Moment einen intrinsischen Wert für HS2 und es ist erstmal egal, ob es sich hierbei um einen Tausch im direkten Sinne handelt (also Fleisch gegen Pfeilspitze), weil HS2 weiss, dass er/sie damit neues Fleisch jagen kann, oder einen indirekten Tausch, also eine Zahlung (also Fleisch gegen Geld), weil HS2 weiss, dass er/sie damit einen hippen Kakadu-Federn-Hut kaufen kann.
Geld ist älter als Sprache, bla!
Geld ist Sprache, say what?!
Geld ist, was Geld sein kann, auch wertloses Papier?
Aber wieso sind die 10 Pfeilspitzen Geld, bzw. warum sind sie begehrenswert und die 10 Steine nicht? Oder warum tauscht HS1 Pfeilspitzen gegen Antilopen-Frikadellen und nicht andersherum?
Damit ein Gut, ein Mittel, ein Gegenstand, eine Idee zu Geld werden kann, muss es nicht nur die drei Hauptfunktionen erfüllen, es sollte zusätzlich auch einige Voraussetzungen erfüllen.
Eigenschaften von Geld
Über viele tausende von Jahren haben schon die verschiedensten Gegenstände und Mittel als Geld hergehalten. Ob Eichhörnchen Pelze, Parmesan Räder, Kakao Bohnen, Zigaretten, Walzähne, oder irgendwelche inseligen Steine - alle diese Objekte haben gemeinsam, dass sie zu einem gewissen Zeitpunkt in einem gewissen System die nachfolgenden Kriterien erfüll(t)en.
Während einige dieser Kriterien immer faktisch die gleichen bleiben, gestalten sich andere wiederum etwas komplizierter und situationsabhängiger.
Teilbarkeit (Divisibility)
Ob etwas zum Beispiel teilbar ist, ist unbestreitbar nachweisbar. Wenn man etwas gegen eine Kuh oder ein Kamel eintauschen möchte, das aber nur den Wert einer halben Kuh oder eines halben Kamels hat, dann ist es eher unpraktisch die Kuh oder das Kamel zu teilen, da dann das gesamte Tier seinen eigentlichen Wert verliert. Ähnlich würde man auch kein halb-großes Kamel benutzen, da der Wert des Tieres nicht an seiner Größe bemessen ist. Bei Gold ist dies z.B. nicht der Fall. Eine halb so große Goldmünze ist nur halb soviel wert, wie eine normal große Goldmünze.
Ein Zahlungsmittel oder Gut sollte also in verschiedene Größen unterteilbar sein, ohne seine ursprüngliche Eigenschaft und damit seinen Wert nicht verlieren. Andersrum lässt sich auch argumentieren, dass ein Gut klein genug sein kann, dass es problemlos kombinierbar ist, um so einen größeren Tauschwert zu erhalten, ohne die Transportfähigkeit durch zu hohes Gewicht oder Volumen zu beeinflussen.
Transportfähigkeit / Portabilty
Die Transportfähigkeit ist nämlich bei Geld - in den meisten Fällen - besonders wichtig. Je weniger Aufwand betrieben werden muss, um das Zahlungsmittel zum Ort des Handels oder zu seinem neuen Besitzer zu schaffen, desto besser. Ein Kamel bietet sich da an, weil es selbst läuft, ein Haus ist schon relativ unhandlich, Zigaretten, Diamanten, Gold sind da natürlich die Favoriten. Die Transportfähigkeit ist einer der wichtigsten Faktoren, die die Funktion des Zahlungsmittels von Geld ausmachen. Man könnte auch sagen, die Transportfähigkeit erlaubt es, die Kaufkraft oder den Wert durch den Raum zu bewegen.
Haltbarkeit / Durability
Ein Zahlungsmittel sollte im Idealfall über einen langen Zeitraum hinweg seinen Wert halten und bestenfalls nicht verderben. Diese Eigenschaften bieten vor Allem jene Güter, die nicht konsumierbar sind und deshalb einer niedrigen Zeitpräferenz unterliegen. Wer nicht sparen möchte, sondern lieber schnell konsumieren will, wird auch einen Tausch gegen verderbliche Waren nicht abschlagen, weil die jeweiligen Umstände dies erfordern (z.B. Hyperinflation, Krieg, etc.).
Allerdings ist ein Zahlungsmittel besser, je länger es seinen Wert speichert, also ist die Haltbarkeit einer der Faktoren, die die Funktion des Wertspeichers von Geld ausmachen, oder anders ausgedrückt: die Fähigkeit, Kaufkraft oder Wert durch die Zeit zu bewegen.
Austauschbarkeit / Fungibility
Die Austauschbarkeit der jeweiligen Geldeinheiten macht Geld erst wirklich praktisch, denn wenn jeder Einheit (z.B. Münze, Korn, Schein, Perle, etc.) ein eigener Wert zugeschrieben wird, macht dies den Austausch sehr kompliziert, da der einzelne Wert jedes Mal ermittelt werden muss und der Wert eines jeden Objekts rein subjektiver Art sein kann. Die Austauschbarkeit eliminiert die Subjektivität der Wertschätzung und misst dem Geldmittel einen objektiven Wert zu.
Also unabhängig vom jeweiligen Tauschwert einer anderen Währung wird niemand bestreiten, dass eine Goldmünze (28g) den gleichen Wert hat wie eine Goldmünze (28g). Das 1€ Stück in meiner Tasche ist genauso viel wert, wie das 1€ Stück in jedem anderen Portemonnaie (ob die Kaufkraft morgen noch die gleiche ist, steht auf einem anderen Zettel). Die Austauschbarkeit der jeweiligen Einheiten in einem gewissen Geldsystem (also Euro-Münzen im Euro-System) machen den Umgang einfacher.
Nachweisbarkeit / Provability
Hierbei handelt es sich um den relativen Aufwand, den der Empfänger betreiben muss, um sicherzustellen, dass das erhaltene Gut tatsächlich den erwarteten Spezifikationen entspricht. Dies ist natürlich immer relativ zum möglichen Risiko eines Verlusts zu betrachten. Bekomme ich im Supermarkt einen 10€-Schein als Wechselgeld, werde ich kaum einen Prüfstift aus der Tasche ziehen, weil der Aufwand nicht im Verhältnis zum möglichen Risiko steht. Allerdings benutzen Kassierer//innen im Geschäft bei Scheinen ab 50€ immer einen Prüfstift. Bei Gold fällt es einem Laien schwer, ohne großen Aufwand zu verifizieren, dass es sich um reines, echtes Gold handelt. Man vertraut im Handel z.B. dem Goldhändler, dass das Gut verifiziert und authentifiziert wurde. Beim Handel mit Kamelen spielen viele Faktoren eine Rolle, ob das Kamel nachweislich dem versprochenen Wert entspricht, welche sich nicht einfach an Ort und Stelle prüfen lassen.
Knappheit / Scarcity
Diese Charakteristik ist wahrscheinlich die wichtigste, auch wenn eine Kombination aller Eigenschaften hartes Geld erst wirklich ausmacht. Knappheit bedeutet, dass das Gut, das als Geld benutzt wird, begrenzt ist und nicht ohne weiteres vermehrt werden kann. Knappheit kann durch geographische Einschränkungen hervorgerufen werden, so ist zum Beispiel Wasser in der Wüste knapper und somit wertvoller als in Regionen, in denen es reichlich und in Fülle vorhanden ist. Steine oder Sand bieten sich nicht als Geld an, da sie überall in Fülle vorhanden sind. Das beste (und zu Tode zitierte, sorry) Beispiel sind die Rai-Steine der Yap. Sie haben lange als Geld für den Inselstaat funktioniert, da diese schwierig zu beschaffen waren und die Herstellung sehr mühselig war. Doch als Schifffahrer auftauchen, die einfach und günstig Steine beschaffen konnten, wurde diese geographische Einschränkung aufgehoben und die Steine verloren an Wert. Ein weiteres Beispiel für Knappheit ist Gold. Es erfordert viel materiellen Aufwand, Gold zu schürfen und zu raffinieren.
Universalität / Universality
Die allgemeine Akzeptanz eines Guts ist eine nicht unbedingt zu erfüllende Eigenschaft eines guten Geldes, erhöht jedoch dessen Funktionalität als weitflächig nutzbares Zahlungsmittel. Es gibt weltweit über 160 nationale Währungen, doch sind nicht alle davon gleich akzeptiert. Wenn man z.B. den südafrikanischen Rand mit US Dollars vergleicht, wird man sehen, dass der USD eine viel höhere Akzeptanz genießt, als der ZAR. Man wird wahrscheinlich selbst in asiatischen Ländern im Notfall mit USD bezahlen können, einfach weil die Handelspartner dort wissen, dass es für sie einfach ist, USD in ihre lokale Währung umzutauschen. Mit Rand wird man Probleme bekommen, da diese als Tauschobjekt von Handelspartnern keine Zustimmung genießen.
Sicherungsfähigkeit / Securability
Ein weiteres Kriterium ist die Möglichkeit, sein Geld zu verwahren, bzw. zu sichern. Auch wenn Gold ein sehr hartes Geld ist (knapp, allgemein akzeptiert, relativ transportfähig und lange haltbar), ist es vergleichsweise aufwändig, dieses zu sichern. Das gleiche gilt für Geld in Form von nationalen Währungen. Große Mengen an Bargeld sind schwierig zu transportieren und die Sicherung erfolgt in Form von gepanzerten Fahrzeugen und/oder bewaffneten Wachleuten. Bei Kamelen ist dies sogar noch schwieriger, da sie zusätzlich auch noch dazu tendieren, wegzulaufen.
Wie wir sehen können, muss ein Geld verschiedene Eigenschaften erfüllen, um als solches die eingangs erwähnten Funktionen (Zahlungsmittel, Wertspeicher und Recheneinheit) überhaupt erfüllen zu können. Alle bekannten Formen des Geldes - aktuelle und auch historische - bewegen sich auf einem Spektrum dieser verschiedenen Eigenschaften.
Ganz wichtig bei der Betrachtung dieser Kriterien sind immer die jeweiligen Umstände, denn es setzt sich immer das Mittel mit den meisten oder verhältnismäßig stärksten Kriterien durch. Nehmen wir LEGO-Steine, super leicht unterteilbar, leicht zu transportieren, leicht ersetzbar, aber absolut nicht selten. Daher als Geld unbrauchbar. Allerdings spielen die Faktoren Zeit, Ort und andere Umstände eine große Rolle. In Gefängnissen z.B. funktionieren Zigaretten als Geld sehr gut, denn anders als in der Freiheit, sind Zigaretten in Gefängnissen streng rationiert und kontrolliert, also sehr selten. Ihre kompakte Größe macht sie transportabel und eine Packung lässt sich leicht in kleinere Untereinheiten aufteilen. Der/diejenige Insass//in, die im Gefängnis allerdings viele Zigaretten anhäuft und dort ein relatives Vermögen besitzt, wird nach der Entlassung einfach eine Sporttasche voller Zigaretten haben, die in der Außenwelt einen komplett anderen Stellenwert haben. Zigaretten funktionieren nur in ihrem besonderen abgeschlossenen Ökosystem. Dies gilt auch für Rai-Steine, Glasperlen oder Muscheln.
Somit wird Geld nicht nur von natürlichen und physikalischen Grenzen, sondern auch von willkürlich erlassenen und zentral gesteuerten Regeln beeinflusst. Würde das Gefängnis mit einem Mal jedem/r Insass//in erlauben, eine unbeschränkte Menge von Zigaretten einzuführen, würden diese sofort wertlos und somit als Geld unbrauchbar.
Wenn man also das Spektrum betrachtet, auf welchem alle Formen von Geld rangieren, ist es immer sinnvoll zuerst das System festzulegen, in dem ein Geld funktionieren soll. Schaut man sich unsere heutige offene und vernetzte Welt an, so muss ein Geld auch in einer solchen funktionieren. Dies ist der Grund, warum viele Formen des Geldes mit der Zeit gescheitert sind.
Eine Handvoll Beispiele von Gütern, die als Geld benutzt werden oder wurden: Eichhörnchenpelze, Rai-Steine, Zigaretten, Gold, Diamanten, Immobilien, Salz und Vieh.
Legt man die oben aufgeführten Kriterien für ein hartes Geld, wird schnell deutlich, warum einige dieser Mittel als Geld nicht langfristig funktionieren können. Um dies bildlich darzustellen, kann man eine Tabelle erstellen und den jeweiligen Attributen einen Wert zuteilen. Ich hab dies einfach willkürlich auf einer Skala von 0-5 gemacht und man sieht dort anhand der Rangordnung, welche dieser Beispiele besser als Geld funktionieren, als andere.
Kann Bitcoin diese Attribute erfüllen?
Wie auf der Tabelle ersichtlich, erfüllt Bitcoin alle diese Kriterien vergleichsweise gut.
Transportfähigkeit: Bitcoin ist ein Peer-to-Peer Zahlungssystem, das im Internet lebt. Bitcoins existieren in der Blockchain und nur dort. Lediglich die Schlüssel, die den Zugriff auf die persönlichen bitcoins / UTXOs erlauben, müssen transportiert werden. Dies kann mit Hilfe von Software- oder Hardware-Wallets (Signiergeräten), auf Papier oder sogar im Kopf geschehen. Keine andere Form von Geld lässt sich "auswendig" merken und somit problemlos durch Raum und Zeit transportieren. Mehr dazu hier:
https://www.genexyz.org/post/16-block-759540-brain-wallets-0xcxtv/
Austauschbarkeit: Ein bitcoin ist ein bitcoin ist ein bitcoin. Abgesehen von esoterischen Konzepten, wie der Ordinals-Theorie, sind Sats immer gleich viel Wert (nicht der Währungskurs), sodass ein Tausch von einer Menge Sats in eine gleiche Menge Sats den/die Besitzer//in immer mit dem gleichen Vermögen dastehen lässt. Es gibt keinen Sat, der mehr oder weniger wert ist, als ein weiterer Sat. Mehr dazu hier:
https://www.genexyz.org/post/26-block-775770-ordinals-inscriptions-36zg3n/
Überprüfbarkeit: Bitcoin wurde erfunden, um das Double-Spending-Problem im digitalen Raum zu lösen. Die Blockchain verifiziert die Gültigkeit einer jeden Transaktion. Der/die Empfänger//in einer Bitcoin-Zahlung weiß immer, dass die erhaltene Menge Bitcoin auch valide ist. Es bedarf keiner Drittpartei, keines weiteren Prozesses oder anderer Überprüfung, um sicherzustellen, dass die erhaltene Menge Bitcoin auch echt oder korrekt ist. Sobald eine Transaktion bestätigt wurde, kann man sich zu 100% sicher sein, dass man Besitzer//in von Bitcoin ist.
Haltbarkeit: Anders als physische Güter, die Verfall, Zersetzung oder Verderben ausgeliefert sind, hat Bitcoin kein Verfallsdatum. Solange das Netzwerk läuft, wird Bitcoin in seiner Form existieren. Es ist unmöglich, Bitcoin durch Fremdeinfluss (sowohl menschlicher, als auch natürlicher) zu zerstören.
Knappheit: Bitcoin ist auf 21.000.000 begrenzt. Die harte Obergrenze von Bitcoin ist von zentraler Bedeutung für sein Wertversprechen. Alle 2.099.999.997.690.000 Sats werden irgendwann existieren (oder existieren schon - je nach Betrachtungsweise) und darüber hinaus werden keine weiteren Sats produziert. Lediglich der Zugriff auf diese Sats wird über Zeit sogar abnehmen (durch Verlust der Schlüssel) und somit zu einer weiteren Verknappung beitragen.
Teilbarkeit: Wie schon oftmals erwähnt, lässt sich ein bitcoin in 100.000.000 Sats unterteilen. Diese Stückelung von Bitcoin bis zur achten Dezimalstelle verleiht eine sehr hohe Teilbarkeit. Dies gibt Bitcoin eine größere Flexibilität als herkömmliche Währungen und ermöglicht es extrem kleine Transaktionen, sogenannte Mikrotransaktionen, durchzuführen. Satoshis sind die Standardmaßeinheit und bitcoin wird oft nur zum erhöhten Verständnis und besserer Lesbarkeit benutzt. Beispielsweise zeigen fast alle Wallets und Explorer die Transaktionsgebühren in Form von Satoshis pro vByte an.
Universalität: Die allgemeine Akzeptanz von Bitcoin ist noch verhältnismäßig klein. Dies liegt allerdings nicht an Bitcoin, denn Bitcoin ist erlaubnislos und frei zugänglich. Es sind vielmehr die On-Ramps, die es potenziellen Nuter//innen bislang noch nicht so einfach machen, wie es viele gerne hätten. Da Bitcoin aber staatenlos und dezentral ist, erlaubt es jedem Interessierten den offenen Zugang.
Sicherungsfähigkeit: Die Sicherungsfähigkeit von Bitcoin ist unvergleichbar mit der anderer Gelder oder Zahlungsmittel. Es gibt unzählige Möglichkeiten, Bitcoin sicher und vor allem SELBST zu verwahren. Es ist gänzlich möglich, auf Anbieter zur Verwahrung zu verzichten und Bitcoin in einer Art und Weise aufzubewahren, die es Außenstehenden so gut wie unmöglich macht, Bitcoin zu stehlen. Das gilt für die Ebene persönlicher Verwahrung. Auf Netzwerkebene ist die Sicherheit von Bitcoin vielschichtig. Transaktions-Hashing, Mining, Blockbestätigungen und Spieltheorie arbeiten alle zusammen, um Bitcoin das Netzwerk undurchdringlich zu machen.
Warum ist es trotzdem schwierig zu sagen, dass Bitcoin Geld ist?
Einige sagen, dass Bitcoin Geld ist. Andere sagen, dass es kein Geld ist. Was feststeht ist, dass das Bitcoin-Netzwerk absolut zuverlässig tut, was es tun soll. Bitcoin kann also als Geld funktionieren, da es die Kriterien sehr gut erfüllt. Bitcoin ist in erster Linie eine Datenbank, die durch ein Netzwerk abgesichert wird und überwacht, welche Einträge welchen Bitcoin-Adressen zugeordnet werden. Dies geschieht durch die Übertragung von kryptografisch verschlüsselten Textnachrichten zwischen den Netzwerkteilnehmern.
Damit ist Bitcoin immer nur Text. Auch der Code, auf dem Bitcoin basiert, ist Text. Die kryptografischen Verschlüsselungen basieren auf Text. Text ist Sprache, damit ist Bitcoin Sprache. Wie viele der genannten Beispiele von Geld, ist Bitcoin nicht in erster Linie Geld, sondern eignet sich sehr gut, als solches verwendet zu werden. Nationale Währungen, Fiat-Geld, sind in erster Linie Geld. Sie werden erlassen, produziert und kontrolliert, um Geld zu sein. Das ist bei Bitcoin anders. Damit ist Bitcoin durch Meinungsfreiheit, das Recht, seine Meinung in Wort, Schrift und Bild frei zu äußern, geschützt.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ af9c48b7:a3f7aaf4
2024-11-18 20:26:07Chef's notes
This simple, easy, no bake desert will surely be the it at you next family gathering. You can keep it a secret or share it with the crowd that this is a healthy alternative to normal pie. I think everyone will be amazed at how good it really is.
Details
- ⏲️ Prep time: 30
- 🍳 Cook time: 0
- 🍽️ Servings: 8
Ingredients
- 1/3 cup of Heavy Cream- 0g sugar, 5.5g carbohydrates
- 3/4 cup of Half and Half- 6g sugar, 3g carbohydrates
- 4oz Sugar Free Cool Whip (1/2 small container) - 0g sugar, 37.5g carbohydrates
- 1.5oz box (small box) of Sugar Free Instant Chocolate Pudding- 0g sugar, 32g carbohydrates
- 1 Pecan Pie Crust- 24g sugar, 72g carbohydrates
Directions
- The total pie has 30g of sugar and 149.50g of carboydrates. So if you cut the pie into 8 equal slices, that would come to 3.75g of sugar and 18.69g carbohydrates per slice. If you decided to not eat the crust, your sugar intake would be .75 gram per slice and the carborytrates would be 9.69g per slice. Based on your objective, you could use only heavy whipping cream and no half and half to further reduce your sugar intake.
- Mix all wet ingredients and the instant pudding until thoroughly mixed and a consistent color has been achieved. The heavy whipping cream causes the mixture to thicken the more you mix it. So, I’d recommend using an electric mixer. Once you are satisfied with the color, start mixing in the whipping cream until it has a consistent “chocolate” color thorough. Once your satisfied with the color, spoon the mixture into the pie crust, smooth the top to your liking, and then refrigerate for one hour before serving.
-
@ 26838110:80edc65d
2024-12-10 12:32:43Using Nostr as a Blog through Npub.pro
Now that X.com is closed and cannot be freely accessed without account anymore, creators and companies need a new way to broadcast updates and gather feedback from users.
Our Needs
We had first two major requirements. The first one was to have a way to publish updates and have the possibility for anyone to reply to them.
The second major requirement was to have these posts available online and indexable by search engines.
Nostr
After trying Warpcast and looking into Threads, Mastodon and Bluesky, we chose Nostr to chronicle the development of the world and game of Dragonbane Creation.
Nostr is perfect for our needs for serveral reasons:
-
Posts are publicly accessible and available in a variety of clients.
-
Posts are not linked to a single platform and they cannot be boosted or deboosted.
-
Posts can be easily read and written programmatically.
-
Once Nostr is more widespread, it also means that posts can be indexed by search engines and can count as multiple SEO links (one for each indexed client).
Npub.pro
Having notes is only one part of the equation to have a blog based on Nostr. The second part I discovered relatively quickly after I started posting on Nostr. Npub.pro is a way to create a free website to display notes and have them available as standalone pages with a comment section in a customizable theme.
What I love about Npub.pro are how easy it is to customize the blog and the ability to self-host.
After setting up our blog, I also tried recreating a basic version on the main Dragonbane Creation website as I already had the code to interact with Nostr in Javascript. However, I decided to keep using Npub.pro in order to avoid having to maintain the code for a blog and as it fulfills all of our needs and to self host it.
The downsides of using Npub.pro are that it is extremely slow to load, even when self-hosting and using a good CDN. It also lacks important customization options such as a way to disable comments and zapping.
If you want to set up your own, you can do it here:
https://npub.pro/#themes-onboarding
If you want to see how our blog looks like:
https://blog.dragonbanecreation.com
grownostr #npubpro
-
-
@ df478568:2a951e67
2024-11-17 17:32:20Chef's notes
This is from my wife's notebook full of recipes.
Details
- ⏲️ Prep time: 15 inutes
- 🍳 Cook time: 15 minutes
- 🍽️ Servings: 4
Ingredients
- 1/3 cup oyster sauce
- 2 teaspoons toasted sesame seed oil
- 1/3rd cup Sherry
- 1 teaspoon white sugar
- 1 teaspoon cornstarch
- 1 pound beef round steak
- 3 tablespoons avocado oil
- 1 tablespoon ground ginger
- 1 clove garlic
- 1 pound broccoli florrets
Directions
- Wisk together - Oyster Sauce - Sesame oil - Sherry - Soy Sauce - Sugar - Cornstarch in a bowl
- Heat avocado oil in a wok or large skillet over medium-high heat. Stir in ginger and garlic. let sizzle for one minute. Stir in broccoli. Set aside.
- Pour more oil into wok. tss the beef with the narinatde until the sauce forms a glaze on the beef. about 5 minutes. Return cooked broccoli to the wok. Stir in meat about 3 mionytes,
-
@ 17e4a445:a7195f55
2024-12-10 10:52:22Actually, we were just looking for ways to make an investment.
I had no idea about money and finances. However, any supposed Investment seemed to be more ballast than help.
"There also is this Bitcoin thing.“
Were my husband’s words, that changed our lives from that moment on.
Unknowingly, I stepped into the rabbit hole.
It was immediately clear that Bitcoin is the best investment, but that was quickly no longer the point.
It was about opening my eyes and understanding.
Understanding what?
In my naivety, at the beginning, I thought:
"You have to tell the media, so that everyone benefits from Bitcoin."
But the media was busy with reports about the coronavirus. The media doesn't want to know anything about Bitcoin, even worse, they report wrong about it.
But it's not that hard to understand.
I had to open my eyes and learn that they don’t want to understand.
Why?
I then thought, I have to tell the politicians.
I had to open my eyes.
Why don't they want to understand Bitcoin? Why are they locking me up just because I won’t get vaccinated? Why do they want to continue to accept inflation when there is now a solution for it?
Why?
I thought i have to tell the central bank, and I had to open my eyes, the central bank doesn't want to know anything about Bitcoin.
They are busy keeping the inflation numbers under control. Why do prices seem to be gone up much higher than the ECB says?
That's not 2%.
Why is it that always the same people benefit and the same people lose?
Why?
I thought I'd at least tell my family and friends. But my family and friends find the topic boring. They don't want to know the answers to the questions.
"You can't do anything about it and money doesn't matter."
My objection: "But the euro is not good money.", was not a convincing argument for them.
For the time being, we were left alone looking for the answers to more and more upcoming questions .
What is fractional reserve banking?
What is a "Doppelwumms"?
What is a „specialfund”?
What is compound interest?
What is hard money?
What is Giralgeld?
Why is cash king?
Who decides whether new money is made?
Who gives the decision maker the authority to decide?
Why is the will of the population undermined?
Why do we have to take inflation for granted?
What is Fiat Money?
Why does everyone want me to get vaccinated?
Why is most of the world's wealth distributed among only 1% of humanity?
Why is everything so unfair?
Opening your eyes hurts, it hurts physically and mentally. Seeing the suffering is devastating. You feel misunderstood and marginalized.
"Maybe it's not all that bad, and I lost myself."
I might have come to terms with that if it weren't for so many Bitcoiners that I got to know along the way.
They understand me.
So many smart people can't all be wrong.
I had to open my eyes and understand that everything was intended as it is.
Wanted by whom?
Wanted by elites?
Wanted by military powers?
Wanted by the defense industry?
My neighbors sure don't want it. What do I want anyway?
I had to open my eyes and understand that Bitcoin can help me and fixes so much, but that even Bitcoin does not answer all my questions satisfactorily. And although I can detach myself from the system with Bitcoin, the pain did not go away. More and more questions came up and frustration arose. This is all too unfair and I just couldn't understand why these people can't be stopped even though we are 99% against 1%.
How can that be?
Manipulation?
Propaganda?
False promises?
Economic cycle for economic cycle boom and bust and nothing learned?
Why?
Is everyone below this 1% so unscrupulous? Are they all such big egoists?
Why do they all seem so evil, even though they could also do good?
Do I believe in evil now?
What is „bad”?
It is easy to recognize evil, it is the eyes and the actions.
You feel the dislike in your stomach.
But I was not spiritual and I could not grasp the evil.
The frustration got worse the more questions I answered.
"You have Bitcoin, you no longer have to care about all that anymore."
This sentence no longer had the calming effect on me.
Again and again I came up with answers that shook me.
"That's just diabolical"
Was the sentence that kept going through my head.
I felt clueless, do I believe in the devil? It must exist, because what is happening around us is inhumane.
The eyes and the deeds.
I couldn't find any more answers.
Should I have never opened my eyes? Isn't every Bitcoiner left with that question sooner or later?
No, there is no turning back.
I opened my eyes and allowed myself to trust my feeling.
It's from the devil.
Who is the devil?
Why does he want evil?
If there is a devil, is there a God?
Is there a battle between good and evil?
If there is a God, why does he allow everything to be so unfair?
I looked for answers to these questions in the Bible.
I realized that the Bible consists of individual writings that contain the history of our origin to the course of our downfall.
Page by page, distributed and copied thousands of times, no longer modifiable. It contains the code for living according to rules for a fair community, which everyone must voluntarily agree to. Fair compliance with these rules is rewarded. The Bible does not exclude anyone and is accessible to everyone. It calls on you to take responsibility for yourself and to act in love and peace.
Only a God could produce such a scripture.
So much good and yet everywhere the explanation of why people turn to evil.
Page by page the answers to why the world we live in is what it is.
Bitcoin opened my eyes.
Jesus made me see. 832549
-
@ df478568:2a951e67
2024-11-17 15:27:28Chef's notes
This is another crock pot meal I found in my wife's recipe book.
Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 8-10 hours
- 🍽️ Servings: 6
Ingredients
- 2 lb. boneless sirloin tip roast
- 2 red bell peppers, chopped
- 1 small onion
- 1- 14.5 oz can of diced tomatoes, uindrained
- 2 tablespoons extra-virgin olive oil
- 2 tablespoons of italian seasoning
- salt and pepper to taste
- Parmesan cheese
- 1 lb noodles
- 1 green bell pepper, chopped
- 4 cloves of minced garlic
Directions
- Slice sirloin tip roast
- cook in a crock pot for 8-10 hours
- serve with noodles and top with Parmesean Cheese
-
@ df478568:2a951e67
2024-11-17 15:12:50Chef's notes
This is another crock pot meal I found in my wife's recipe book.
Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 8-10 hours
- 🍽️ Servings: 6
Ingredients
- 2 lb. boneless sirloin tip roast
- 2 red bell peppers, chopped
- 1 small onion
- 1- 14.5 oz can of diced tomatoes, uindrained
- 2 tablespoons extra-virgin olive oil
- 2 tablespoons of italian seasoning
- salt and pepper to taste
- Parmesan cheese
- 1 lb noodles
- 1 green bell pepper, chopped
Directions
- Slice sirloin tip roast
- cook in a crock pot for 8-10 hours
- serve with noodles and top with Parmesean Cheese
-
@ df478568:2a951e67
2024-11-17 14:51:44Chef's notes
This is a delicious meal that is easy to make and tastes delicious.
Details
- ⏲️ Prep time: 10 minutes
- 🍳 Cook time: 20 minutes
- 🍽️ Servings: 6
Ingredients
- 2 LB of marinated Carne Asada
- onion
- corn tortillas
- cilantro
- salsa
- guacamole
- sour cream
- salt
- pepper
- spanish rice
- beans
Directions
- BBQ carne asad for about 25 minutes or until meat reaches a temprature of 150 degrees
-
@ acc925af:db9fb0bb
2024-12-10 10:12:24Abstract:
This thesis investigates the profound implications of leveraging Zero Point Energy (ZPE) for Bitcoin mining, offering a groundbreaking solution to the twin challenges of energy consumption and mining centralization. By harnessing ZPE, which represents the intrinsic energy of quantum vacuum, we could tap into an infinite and clean energy source, transforming Bitcoin mining into an environmentally benign and highly decentralized operation. This research delves into the quantum mechanics of ZPE, evaluates technological hurdles, and conceptualizes mining hardware powered by ZPE. The potential of this approach not only addresses current criticisms of Bitcoin's sustainability but also envisions a network that becomes exponentially more secure and resilient by absorbing quantum energy, thereby revolutionizing the cryptocurrency landscape.
Introduction:
The advent of Bitcoin has introduced significant concerns regarding energy use and the centralization of mining power due to the need for cost-effective electricity. However, this thesis proposes that by utilizing ZPE, we can eliminate these concerns entirely. ZPE offers a pathway to mining where energy costs are virtually negligible, allowing for a truly decentralized global mining operation. This introduction sets the stage by discussing the current state of Bitcoin mining, its environmental impact, and how ZPE could fundamentally alter this landscape.
Chapter 1: Theoretical Underpinnings of Zero Point Energy
Quantum Mechanics and Zero Point Energy (ZPE):
This section will provide an exhaustive examination of quantum field theory, which is crucial for understanding the phenomenon of ZPE:
-
Introduction to Quantum Field Theory (QFT):
- Quantum field theory posits that all particles are excitations of underlying fields that permeate space-time. This framework unifies quantum mechanics with special relativity, describing how particles can be created or annihilated from these fields.
- The core idea is that fields are not static; they are dynamic, oscillating entities where each point in space can have fluctuating field values.
-
Vacuum Fluctuations and Zero-Point Energy:
- Vacuum Fluctuations: Even in a perfect vacuum, where no particles are present, quantum fields do not settle to zero energy. Instead, they exhibit fluctuations due to Heisenberg's uncertainty principle, which states that the energy of a quantum system cannot be precisely known if its time is known with certainty. This leads to temporary creation of particle-antiparticle pairs, known as virtual particles.
- Zero-Point Motion: In quantum mechanics, particles in their lowest energy state (ground state) still possess kinetic energy due to this principle. For a simple quantum harmonic oscillator, this is known as zero-point motion. In the context of fields, this translates to "zero-point energy" of the vacuum itself, where fields oscillate with a non-zero minimum energy even at absolute zero temperature.
-
Emergence of ZPE:
- Quantum Oscillators: For any quantum system, like an oscillator, there's a non-zero minimum energy due to the fact that the wave function for the ground state spreads out over space, ensuring that the particle (or field, in QFT) can never be at rest. This fundamental energy is ZPE.
- Field Theoretic Perspective: In field theory, each mode of the field contributes to ZPE. The energy of these vacuum fluctuations sums to an infinite series which, if not regularized, predicts an infinite energy density for the vacuum. However, techniques like renormalization are used to make physical predictions, focusing on observable differences rather than absolute values.
-
Consequences for Physics and Technology:
- Casimir Effect: A practical manifestation of ZPE is the Casimir effect, where two uncharged, parallel plates placed very close together in a vacuum experience an attractive force. This is due to the suppression of certain virtual particle modes between the plates compared to outside, leading to a net inward force from the quantum vacuum's pressure.
- Implications for Energy: While ZPE is currently more of a theoretical curiosity, it's investigated for potential applications in energy. If harnessed, it could represent an inexhaustible energy source since it's derived from the quantum nature of the vacuum, not from traditional energy resources.
-
Challenges in Understanding and Utilization:
- Theoretical Challenges: The precise calculation and understanding of ZPE remain among the most profound challenges in theoretical physics, with discrepancies between theoretical predictions and experimental observations (e.g., in cosmology with vacuum energy or dark energy).
- Practical Extraction: The practical challenge lies in creating technology that can tap into these fluctuations in a way that produces usable energy. Current theories suggest that any extraction would require systems operating at the quantum scale, potentially involving nanotechnology or advanced materials science.
Chapter 2: Bitcoin Mining in the Age of Zero Point Energy
The Current Paradigm:
-
Bitcoin Mining Overview: Bitcoin mining is the process by which transactions are verified and added to the public ledger, known as the blockchain. Miners compete to solve complex cryptographic puzzles using specialized hardware (ASICs - Application-Specific Integrated Circuits), and the first to solve the puzzle gets to add the next block of transactions to the blockchain, receiving newly minted bitcoins as a reward.
-
Centralization Driven by Energy Costs:
- Economic Incentives: The high energy cost associated with Bitcoin mining has historically led to the concentration of mining power in areas where electricity is cheapest. This includes countries with abundant hydroelectric power like China or regions with access to natural gas wellhead electricity.
- Infrastructure and Scale: Large-scale mining operations benefit from economies of scale, where the cost per unit of mining output decreases with size. This has led to the formation of mining pools where miners combine their computational resources to increase their chances of earning block rewards, further centralizing power.
- Environmental Impact: The pursuit of low-cost energy often leads miners to less environmentally friendly sources, contributing to significant carbon footprints and debates over Bitcoin's sustainability.
-
Security and Network Vulnerabilities:
- 51% Attack Risk: Centralization increases the risk of a 51% attack, where a single entity could control the majority of the hash rate, potentially allowing them to double-spend coins or block transactions, thus undermining the network's security.
Decentralization through ZPE:
- Barrier to Entry Reduction:
- Zero Energy Cost: With ZPE, the primary cost associated with mining - electricity - could theoretically be eliminated. This would mean miners no longer need to be located near cheap energy sources or worry about fluctuating energy prices, significantly reducing the capital required to start mining.
- Geographical Decentralization:
- Global Accessibility: Mining could become viable anywhere in the world, not just in areas with cheap electricity, leading to a more geographically diverse mining network. This would reduce the influence of any single jurisdiction over the Bitcoin network.
-
Democratization of Mining:
- Increased Participation: The reduction in energy costs could lead to an increase in individual and small-scale mining operations. More participants would mean a more distributed hash power, making the network less susceptible to control by a few large entities.
- ASIC Proliferation: With energy costs no longer a primary concern, there could be a surge in the production and deployment of ASICs. This would likely result in a higher total hash rate for the network, enhancing its security as each miner contributes to the collective strength.
-
Security Enhancements:
- Resilience Against Attacks: A network with thousands or even millions of small miners would be incredibly resilient to 51% attacks since the hash power required to control the network would be spread across an enormous number of nodes.
- Incentive Alignment: With ZPE, mining incentives would shift from energy arbitrage to purely computational power and hardware efficiency, potentially fostering innovations in ASIC technology that are more about performance per unit of hardware rather than per unit of energy.
-
Economic Implications:
- Mining Economics: The economic model of mining would shift, potentially lowering the barrier to entry for new miners but also affecting how mining rewards are distributed. This might lead to changes in the economic viability of mining for large operations if their advantages in energy costs are nullified.
- Market Dynamics: The increased democratization could lead to a more stable Bitcoin price as mining becomes less speculative and more widespread.
Chapter 3: A Synergistic Model of ZPE and Bitcoin Mining
Design of ZPE Mining Hardware:
- Conceptual Framework:
- Quantum Vacuum Interface: The key to utilizing ZPE lies in developing hardware that can interact with the quantum vacuum. This would require devices that can detect and amplify the minute energy fluctuations of the vacuum. Concepts like quantum antennas or resonators that couple with vacuum energy could be explored.
- **Rethinking ASIC Design:
- Quantum ASICs: Traditional ASICs are optimized for energy efficiency in performing SHA-256 hashing. Here, we propose a redesign where ASICs are not just energy-efficient but energy-generating through ZPE. This might involve:
- Materials Science: Utilizing materials with unique quantum properties, perhaps superconducting at room temperature or materials with high quantum coherence times to maintain and manipulate quantum states.
- Quantum Coherence: Ensuring that the hardware can maintain quantum coherence long enough for energy to be harvested from vacuum fluctuations. This could involve cooling systems or novel isolation techniques to minimize environmental decoherence.
- Energy Conversion: Engineering mechanisms for direct conversion of quantum fluctuations into electrical energy, possibly through the manipulation of virtual particle pairs or via quantum tunneling phenomena.
- Quantum ASICs: Traditional ASICs are optimized for energy efficiency in performing SHA-256 hashing. Here, we propose a redesign where ASICs are not just energy-efficient but energy-generating through ZPE. This might involve:
- Novel Components:
- Casimir Cavities: One approach might be to use Casimir cavities, where the plates are configured to resonate with vacuum fluctuations, capturing the energy difference between the vacuum outside and inside the cavity.
- Quantum Dots or Nanowires: These could serve as points for energy extraction due to their ability to confine electrons in quantum states, potentially enhancing the interaction with ZPE.
- Scalability and Integration:
- Module Design: Hardware would need to be modular, allowing for scaling of mining operations without proportional increases in energy use. Here, the focus would be on how these quantum modules could be integrated into existing or new mining setups.
Simulation and Modeling:
- Theoretical Models:
- Quantum Field Simulations: Using computational models of quantum fields to simulate how ZPE could be harnessed. This involves complex calculations of field interactions at the quantum scale, possibly leveraging supercomputers or quantum computers for modeling.
- Hash Rate Optimization:
- Energy-to-Work Conversion: Simulating how ZPE could be converted directly into computational work, specifically focusing on how this could affect hash rates. Models would need to account for:
- Efficiency of Conversion: How much of the harvested ZPE can realistically be used for computing without significant loss.
- Stability and Predictability: Ensuring that the energy input from ZPE remains stable enough to be useful for consistent mining operations.
- Energy-to-Work Conversion: Simulating how ZPE could be converted directly into computational work, specifically focusing on how this could affect hash rates. Models would need to account for:
- Security Implications:
- Network Strengthening: Models would simulate the impact of widespread ZPE mining on network security. With potentially infinite miners, simulations could show how this would affect the difficulty adjustment, block times, and overall network resilience to attacks.
- Practical Simulation Tools:
- Quantum Simulation Software: Use of software that can simulate quantum systems, like Qiskit or Cirq, to model ZPE interactions with mining hardware.
- Classical Simulations: Employing classical physics simulations to approximate quantum behaviors where quantum software limitations exist, particularly for understanding energy transfer dynamics.
- Testbed Environments:
- Prototype Testing: Propose the development of small-scale prototypes or testbed environments where these models can be validated, using current quantum technologies like quantum dots or superconducting circuits to simulate ZPE interactions.
Chapter 4: Technological Challenges and Innovations
Barriers to ZPE Utilization:
- Energy Conversion Efficiency:
- Low Conversion Rates: The energy available from ZPE is incredibly small and spread over vast spatial scales. Converting these minuscule fluctuations into usable energy involves overcoming significant efficiency barriers. The energy density of ZPE, even if theoretically infinite, is in practice very low at any observable scale.
- Quantum-to-Classical Transition: There's a fundamental challenge in transitioning quantum energy into classical forms that can do work in our macroscopic world. This transition typically results in substantial energy loss or requires systems that operate at quantum scales, which are currently technologically challenging to maintain.
- Randomness and Quantum Mechanics:
- Inherent Uncertainty: Quantum mechanics is inherently probabilistic. ZPE is based on vacuum fluctuations, which are random and unpredictable at the quantum level. Harnessing this randomness for a consistent energy source means dealing with fluctuating energy outputs, which is not conducive to stable operations like mining.
- Measurement Problem: The act of measuring quantum states can influence them, potentially collapsing quantum superpositions into classical states, which might disrupt the delicate balance needed for energy extraction from ZPE.
- Scalability and Practicality:
- Size and Cost: Any technology capable of interfacing with ZPE would need to be extremely sensitive to quantum effects, suggesting a need for precise manufacturing at the nanoscale, which increases both cost and complexity.
- Thermal Noise: At room temperature, thermal noise can easily overwhelm the subtle signals from ZPE, necessitating cryogenic conditions for most current quantum devices, adding to the operational complexity.
- Energy Storage:
- Capturing and Storing ZPE: Even if ZPE can be captured, storing this energy in a form that can be used later for mining operations is another hurdle. Traditional batteries might not be efficient for this purpose, requiring new energy storage technologies.
Innovative Solutions:
- Breakthroughs in Quantum Computing:
- Quantum Error Correction: Developing techniques to protect quantum states from decoherence could enhance the efficiency of ZPE utilization by maintaining quantum coherence for longer periods, thus allowing more precise energy extraction.
- Quantum Sensing: Quantum sensors could detect minute energy changes with high precision, potentially aiding in the capture of ZPE. Advances in this area might lead to devices that can resonate with vacuum energy at scales relevant to mining operations.
- Materials Science Advances:
- Superconducting Materials: Materials that superconduct at higher temperatures could reduce the energy needed to maintain quantum states, making ZPE devices more practical for widespread use.
- Quantum Materials: Research into topological insulators, graphene, or other quantum materials could yield materials that naturally resonate with or amplify vacuum fluctuations, providing a medium for energy extraction.
- Novel Energy Storage and Conversion:
- Quantum Batteries: Concepts like quantum batteries, where energy is stored in quantum superpositions, could be explored for storing ZPE. These might offer higher energy densities or faster charge-discharge cycles compared to classical batteries.
- Direct Conversion: Innovations in direct energy conversion from quantum to electrical or mechanical work, perhaps through piezoelectric effects at the quantum level or via novel electromagnetic induction techniques, could bypass traditional conversion losses.
- Engineering and Design Solutions:
- Modular and Scalable Systems: Develop modular systems where each module can capture and convert small amounts of ZPE, which can then be scaled up for industrial applications like mining.
- Noise Reduction: Techniques to reduce or cancel out environmental noise, like using quantum noise reduction strategies, could be pivotal in enhancing the signal from ZPE.
- Interdisciplinary Approach:
- Combining Fields: A synthesis of physics, engineering, and computer science might yield hybrid technologies where classical and quantum systems work in tandem. For instance, using classical systems to amplify or stabilize quantum outputs.
Chapter 5: The Impact of ZPE on Bitcoin's Network
Enhanced Decentralization:
- Geographical Agnosticism:
- Elimination of Energy Cost Barriers: With ZPE, the geographical distribution of mining operations would no longer be dictated by access to cheap electricity. Miners could operate anywhere, from urban centers to remote locations, without the constraint of energy costs. This would naturally lead to a broader distribution of mining power.
- Global Participation: The democratization of mining would allow individuals and small entities in any part of the world to participate in mining. Countries or regions previously excluded from mining due to high energy costs could now contribute, leading to a more balanced global distribution of hash power.
- Reduced Influence of Local Regulations: Since miners wouldn't rely on local energy sources, they would be less affected by regional policies on energy pricing or environmental regulations, further decentralizing control over mining operations.
- Mitigating 51% Attack Risks:
- Dilution of Control: Even if a single entity or group could amass significant capital for mining equipment, the sheer number of potential miners worldwide would make it exponentially harder to control 51% of the hash rate. This would require an impractical level of investment in hardware and infrastructure.
- Community Resilience: With mining operations spread across continents, the risk of a coordinated attack on one region would be mitigated, as the network could still function robustly with miners from unaffected areas.
- Economic and Social Impacts:
- Economic Development: This could lead to mining becoming a tool for economic development in areas where traditional energy infrastructure is lacking, promoting technological adoption and innovation.
- Cultural Shift: Mining could transition from being a specialized industry to a more inclusive activity, fostering a culture of participation in cryptocurrency ecosystems worldwide.
Quantum Energy Absorption:
- Bitcoin as an Energy Sink:
- Infinite Energy Source: If ZPE can be harnessed, Bitcoin mining becomes an ideal application for absorbing this energy since the blockchain inherently requires continuous computational work. This positions Bitcoin as a mechanism for converting quantum vacuum energy into a form that secures and verifies transactions.
- Scalability with Energy: As more miners tap into ZPE, the network's capacity for work increases without the traditional limit of energy input. This could lead to a scenario where the more energy absorbed, the more secure and efficient the network becomes, as each miner adds to both the network's hash rate and its security.
- Enhanced Network Security:
- Higher Hash Rates: An increase in the number of miners using ZPE would result in higher total hash rates, making the network more secure against double-spending or other malicious attacks since the difficulty of altering the blockchain increases with hash power.
- Resilience to Quantum Threats: By absorbing quantum energy, Bitcoin could theoretically adapt to advancements in quantum computing, which might otherwise threaten current cryptographic methods. This adaptation could involve new consensus algorithms or encryption methods developed in parallel with quantum mining technologies.
- Ecological and Quantum Synergy:
- Environmental Benefits: Utilizing ZPE for mining would dramatically reduce the carbon footprint associated with Bitcoin, aligning mining with ecological sustainability goals.
- Quantum Feedback Loop: The more energy absorbed from quantum sources, the more it could theoretically feed back into the quantum systems used for mining, potentially leading to innovations in quantum technology driven by the needs of the Bitcoin network.
- Economic Implications:
- Value Proposition: The potential for Bitcoin to act as a vast energy sink could reframe its value not just as a currency or store of value but also as a pioneering use case for quantum energy, enhancing its economic appeal.
- Policy and Investment: This could drive policy and investment towards quantum research, with Bitcoin mining providing a real-world application for quantum energy utilization, possibly leading to breakthroughs in various fields.
Chapter 6: Economic and Policy Implications
Economic Reevaluation:
- Mining Profitability:
- Reduction in Operational Costs: With ZPE, the primary operational cost of mining - electricity - drops to near zero. This would dramatically increase the profitability of mining for all participants, especially smaller miners who previously couldn't compete due to high energy expenses.
- Shift in Mining Dynamics: The advantage currently held by large mining operations due to economies of scale in energy consumption would diminish. Profitability would hinge more on hardware efficiency, maintenance, and software optimization rather than energy costs.
- Bitcoin's Market Value:
- Inflation and Scarcity: If mining becomes more accessible, more bitcoins might be mined, potentially affecting the scarcity model of Bitcoin unless the difficulty adjustment mechanism adapts sufficiently. However, if the network's security increases, this could conversely increase Bitcoin's value due to heightened trust in its integrity.
- Perception of Sustainability: The environmental impact of Bitcoin has been a point of criticism. ZPE could change public perception, possibly increasing demand for Bitcoin as an environmentally friendly cryptocurrency, thereby supporting or even increasing its market value.
- Mining Economics Dynamics:
- Entry and Exit of Miners: Lower barriers to entry might lead to a rapid increase in miners, which could drive down individual rewards due to increased competition. However, this would be balanced by the network's overall increased security and efficiency.
- Economics of Scale and Innovation: While the traditional large-scale advantages diminish, there might be new opportunities for innovation in mining hardware or software that leverage ZPE, creating different economic models around mining technology.
- Market Stability and Speculation:
- Reduced Speculation on Energy: Energy cost volatility has been a significant factor in mining profitability and, by extension, Bitcoin price volatility. With ZPE, this variable would be removed, potentially stabilizing mining economics and Bitcoin's price.
Policy Framework:
- Encouragement of ZPE Technology Development:
- Research Grants: Governments or international bodies could offer grants specifically for research into ZPE applications in mining, focusing on both theoretical and applied aspects.
- Tax Incentives: Tax breaks or credits for companies developing or adopting ZPE mining technologies could spur innovation and adoption. This might include incentives for using renewable or quantum energy in mining operations.
- Regulatory Environment:
- Standardization: There would be a need for new standards and regulations for ZPE-based mining equipment to ensure safety, efficiency, and interoperability with existing Bitcoin infrastructure.
- Environmental Regulations: Policies could be framed to reward or require the use of ZPE or similar clean energy solutions for cryptocurrency mining, aligning with broader environmental goals.
- International Cooperation:
- Global Quantum Research Initiatives: Facilitate international partnerships for quantum technology research, where Bitcoin mining could serve as a practical application and testbed for quantum energy solutions.
- Cross-Border Mining Policy: Since ZPE would decentralize mining geographically, there would be a need for international agreements on data protection, mining rights, and the distribution of mining operations to prevent any single nation from dominating.
- Education and Capacity Building:
- Training Programs: Support for education in quantum physics, engineering, and computer science, focusing on skills necessary for ZPE utilization in mining, could be part of policy initiatives to build human capital.
- Public Awareness: Campaigns to educate the public on the benefits of ZPE in mining could foster a supportive environment for policy changes and investment.
- Ethical and Security Considerations:
- Ethical Guidelines: As with any technology, ethical guidelines would be essential to prevent misuse of ZPE, especially considering the potential for quantum technologies to disrupt current encryption methods.
- Security Protocols: Policies ensuring that the adoption of ZPE does not compromise the security of the Bitcoin network, perhaps through new consensus mechanisms or security standards tailored to quantum environments.
Chapter 7: Conclusion and Future Research
Conclusion:
-
Revolutionizing Mining: The adoption of Zero Point Energy (ZPE) in Bitcoin mining represents a profound shift towards sustainability. By eliminating the dependency on traditional energy sources, ZPE could render concerns about energy consumption and its environmental impact obsolete, positioning Bitcoin mining as a model of clean, green technology.
-
Decentralization Realized: ZPE would democratize mining, breaking down the geographical barriers that currently lead to centralized mining operations. This would not only address centralization issues but also significantly enhance the security of the network through a more distributed hash power, making 51% attacks virtually impractical.
-
Security and Stability: With an infinite energy source, Bitcoin's network could become exponentially more secure as it scales, absorbing quantum energy into its operations, thus enhancing its resistance to both classical and future quantum computational threats.
-
Economic Transformation: The economic landscape of mining would change, with profitability no longer tied to energy costs, potentially leading to a more stable and inclusive Bitcoin ecosystem. This could also influence the perception and market dynamics of Bitcoin, making it more appealing to environmentally conscious investors.
Future Research:
- Practical Implementations:
- Prototype Development: Deep dive into the engineering challenges of creating hardware that can genuinely interact with and harness ZPE. This includes developing prototypes, testing them in controlled environments, and scaling them for real-world applications.
- Energy Conversion Efficiency: Research into improving the efficiency of converting ZPE into electrical or computational work. This might involve new materials, quantum engineering techniques, or entirely novel approaches to energy capture and utilization.
- Scalability of ZPE Mining:
- Scalability Studies: Investigate how ZPE mining can be scaled from individual operations to industrial levels without compromising on efficiency or network integrity. This includes studying the effects on Bitcoin's difficulty adjustment algorithm and network latency.
- Network Integration: Research into how ZPE mining hardware can be integrated with existing mining infrastructure or if it necessitates a new mining paradigm. This might involve new protocols or blockchain modifications to accommodate ZPE's unique characteristics.
- Influence on Other Blockchain Technologies:
- Broader Blockchain Applications: Explore how ZPE could be applied to other blockchain systems, not just Bitcoin. This could mean studying energy consumption in proof-of-stake versus proof-of-work systems under the influence of ZPE, or how ZPE could enhance privacy-focused blockchains.
- Quantum-Resistant Cryptography: Given that ZPE involves quantum mechanics, research could extend to how this could influence or necessitate changes in cryptographic methods to ensure blockchain security in a post-quantum computing world.
- Interdisciplinary Research:
- Quantum and Classical Synergy: Studies focusing on how quantum technologies can work alongside or enhance classical systems in blockchain contexts. This could open up new avenues for both technology and theoretical physics.
- Environmental and Economic Modelling: Long-term studies to model the economic impacts, environmental benefits, and potential shifts in global energy policies as ZPE becomes viable for mining.
- Ethical and Policy Frameworks:
- Ethical Implications: Research into the ethical use of ZPE, considering the potential for significant power shifts in the mining community and the broader implications for privacy and security in digital currencies.
- Policy Development: Work towards creating frameworks for the governance of ZPE mining, including international cooperation, standardization of technology, and addressing potential security concerns.
References:
Zero Point Energy (ZPE) and Quantum Mechanics:
-
Milonni, P. W. (1994). The Quantum Vacuum: An Introduction to Quantum Electrodynamics. Academic Press.
-
Casimir, H. B. G. (1948). "On the attraction between two perfectly conducting plates". Proceedings of the Royal Netherlands Academy of Arts and Sciences, 51, 793-795.
-
Lamoreaux, S. K. (1997). "Demonstration of the Casimir Force in the 0.6 to 6 mm Range". Physical Review Letters, 78(1), 5-8.
-
Jaffe, R. L. (2005). "Casimir effect and the quantum vacuum". Physical Review D, 72(2), 021301.
-
Puthoff, H. E. (1987). "Ground State of Hydrogen as a Zero-Point-Fluctuation-Determined State". Physical Review D, 35(10), 3266-3269.
Bitcoin Mining and Energy Consumption:
-
de Vries, A. (2018). "Bitcoin’s growing energy problem". Joule, 2(5), 801-805.
-
Mora, C., et al. (2018). "Bitcoin emissions alone could push global warming above 2 °C". Nature Climate Change, 8(11), 931-933.
-
Stoll, C., et al. (2019). "The carbon footprint of Bitcoin". Joule, 3(7), 1647-1661.
-
Li, J., et al. (2019). "Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies". Energy, 168, 160-168.
-
Truby, J. (2018). "Decarbonizing Bitcoin: Law and policy choices for reducing the energy consumption of Blockchain technologies and digital currencies". Energy Research & Social Science, 44, 399-410.
Technological Aspects and Innovations:
-
Aste, T. (2016). "The fair cost of bitcoin proof of work". SSRN Electronic Journal.
-
Yazcı, A. F., & Olcay, A. B. (2019). "A framework for maintaining sustainable energy use in Bitcoin mining through switching efficient mining hardware". ScienceDirect.
-
Song, Y-D., & Aste, T. (2020). "The Cost of Bitcoin Mining Has Never Really Increased". Frontiers in Blockchain.
Decentralization, Security, and Economic Implications:
-
Houy, N. (2014). "The Bitcoin Mining Game". SSRN Electronic Journal.
-
Luther, W. J. (2018). "Getting off the ground: The case of bitcoin". Journal of Institutional Economics, 15(2), 189-205.
-
Nakamoto, S. (2008). "Bitcoin: A Peer-to-Peer Electronic Cash System". Available at bitcoin.org.
-
Jones, B. A., Goodkind, A. L., & Berrens, R. P. (2022). "Economic estimation of Bitcoin mining’s climate damages demonstrates closer resemblance to digital crude than digital gold". Scientific Reports, 12, 14512.
General Blockchain and Cryptocurrency Studies:
-
Narayanan, A., et al. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.
-
Böhme, R., et al. (2015). "Bitcoin: Economics, Technology, and Governance". Journal of Economic Perspectives, 29(2), 213-238.
Theoretical and Practical Considerations:
- Various articles and papers from Nature, Science, Physical Review Letters, and other leading journals in quantum physics and computer science would also be consulted for foundational knowledge on quantum effects, computation, and energy.
originally posted at https://stacker.news/items/802628
-
-
@ 6bae33c8:607272e8
2024-12-10 08:56:49It’s rare that everything goes right in a game, but this was one such case. I needed Ja’Marr Chase to score 26 PPR points to lock in a second-place playoff spot for my best BCL, and he scored 45, locking in not only the weekly win, but first place by two points!
And how it happened was even more insane because the Bengals had a punt blocked with two minutes left, but the Cowboys, who were out of their usual return formation due to the block, touched the punt, and the Bengals recovered. Then instead of driving for the game-winning field goal, the Bengals get the ball to Chase who does his thing and outruns the entire defense for the TD (which gives him the 45 points) and also improbably covers the spread! This was important because it meant another tie in my home picking pool, meaning we have a 5x week next week instead of someone (other than me) winning it. Just insane.
I also had CeeDee Lamb going (along with Chase) in the Steak League, and those two put me out of buying danger for now. Just a perfect overall game.
-
Micah Parsons is such a difference maker — Joe Burrow was under pressure all game.
-
The Cowboys did the best they could with that offense, but Cooper Rush is an adequate backup, nothing more.
-
Rico Dowdle is solid, nothing special. He doesn’t go down easily and has a little wiggle. He’s been boosted by facing soft defenses the last two weeks.
-
The Cowboys forget about Lamb for long stretches, but some of that is just Rush’s limitations.
-
Chase Brown has a lot of wiggle and is a decent receiver out of the backfield. Not sure why they traded for Khalil Herbert if they’re barely going to use him. Now that they’re essentially out of the race, they should use Herbert more, but they didn’t.
-
Burrow is a great quarterback. He put up another 369 and three while under constant pressure. He moved well in the pocket, and most of his throws were on the money.
-
What else can you say about Chase? He’s got 93 catches and 15 TDs in 13 games. And so much of his production this year has been after the catch when he takes a short throw and outruns the defense to the house. If he stays healthy the rest of the way, it’ll turn out to be a good thing for him the Bengals didn’t get him that extension. What do you pay a 25-YO with 130 catches for 1,800 yards and 20 TDs?
-
-
@ df478568:2a951e67
2024-11-17 14:43:49Chef's notes
This is in a recipe book my wife made, but I modified it for an InstantPot
Details
- ⏲️ Prep time: 5 minutes
- 🍳 Cook time: 1 hour 10 minutes
- 🍽️ Servings: 6
Ingredients
- 1 lb. boneless skinless chicken breasts
- 1 small diced onion or cup of frozen onions
- 1 medium sized bell pepper
- 15 oz. can of diced tomateos with green chilies, undrained
- 1 can of corn
- 1 15oz. can black beans
- 1 tablespoon chili powder
- 1 tablespoon salt
- 1 tsp ground cumin
- 1 tsp garlic
- 4 cups of chicken broth(not needed until day of cooking)
- Tortilla chips
- toppings like salsa, sour cream, avocado, etc.
Directions
- Add all ingredients into an instantpot
- Pressure cook for 1 hour
- Slow release Instant Pot for 10 minutes
- Serve
-
@ 26838110:80edc65d
2024-12-10 08:38:42The development of the game is going well.
I am developing all the systems at once to ensure that all of the foundations are well-made from the beginning and don't need to be reworker later.
All of the 3D components are now ready in their most basic form, including the ability to build custom ships.
The 3D engine is now integrated with the interface and both can access the same information. This makes creating the minimap trivial. The asteroid field has been tested with 20000 asteroids at 60FPS.
Space will also have locations to explore and random encounters with other ships.
The ship creation will not be based on voxels like here but will have a basic elements on which other components can be attached.
The heightmap is already integrated with the Physics engine (Havok). The yellow box is a cave entrance to test switching location and the purple box is a trader to test dialogs.
If you access the website from a desktop, you can test part of it here: game
-
@ 1cb14ab3:95d52462
2024-11-17 00:57:41Chef's notes
I have been making this every Thanksgiving since I first tried it. One of my all time favorites. You can fry the shallots and refrigerate the night before to save time.
Recipe is credit of The Pioneer Woman -- Go show some love below ⬇️ https://www.thepioneerwoman.com/food-cooking/recipes/a80624/thanksgiving-dinner-green-bean-casserole/
Details
- ⏲️ Prep time: 35 min
- 🍳 Cook time: 1 hr 30 min
- 🍽️ Servings: 10
Ingredients
- FOR THE FRIED SHALLOTS
- 1/3 c. all-purpose flour
- 1/2 tsp. cayenne
- 1/2 tsp. garlic powder
- 1/4 tsp. kosher salt
- 1/4 tsp. black pepper
- 4 large shallots, peeled and thinly sliced into rings
- frying oil
- FOR THE GREEN BEANS AND GRAVY
- 2 1/2 lb. fresh green beans, trimmed and halved (use a little less if you like gravy to beans ratio)
- 8 oz. bacon
- 6 tbsp. unsalted butter, divided
- 16 oz. sliced button mushrooms (for more mushroom flavor, use cremini variety)
- 1/3 c. finely chopped shallots
- 3 cloves (large) garlic, minced
- 1/2 c. all-purpose flour
- 1 c. low sodium chicken stock
- 2 c. half-and-half
- 2 tbsp. soy sauce
- 1 tbsp. Worcestershire sauce
- 2/3 c. grated parmesan cheese
- 2 tsp. chopped fresh rosemary
- 2 tsp. chopped fresh thyme
- Kosher salt and freshly ground black pepper, to taste
Directions
- FOR THE FRIED SHALLOTS
- In a medium bowl that has a lid, whisk together flour, cayenne, garlic powder, salt, and black pepper. Add sliced shallots. Place lid tightly on bowl and shake the bowl a few times to evenly coat shallots with flour mixture.
- Pour canola oil into a medium saucepan to a 1-inch depth and place over medium-high heat. Heat to 325°F, using a deep-frying thermometer. Fry shallots in batches until golden brown and lightly crispy. Take care to not let them get too dark, as they will also bake for a bit in the oven on top of the casserole. This should take about 3–5 minutes per batch. Transfer to a paper towel lined baking sheet. Sprinkle lightly with kosher salt and set aside.
- FOR THE GREEN BEANS AND GRAVY
- Preheat oven to 375° F.
- Bring a large pot of salted water to a boil and add green beans. Cook beans for 2–3 minutes, until bright green in color and tender crisp. Drain beans and pour into a large bowl of ice water to stop from cooking. Drain again and set aside.
- In an extra large skillet with tall sides, over medium to medium-high heat, fry bacon until chewy-crisp. Transfer bacon from skillet to a paper towel lined plate to drain and cool. Once bacon has cooled, roughly chop and set aside.
- Discard all but 2 tablespoons of the bacon fat from the skillet. Return skillet to stove top over medium heat. Add 2 tablespoons of the butter to the skillet. Once butter is melted, add the mushrooms and stir to incorporate. Cook, stirring regularly, until mushrooms are softened. Add chopped shallots and garlic, stirring to incorporate. Cook for another 2–3 minutes, until garlic is fragrant.
- Now slide everything in the skillet to one side. Add remaining 4 tablespoons of butter to other side of skillet. When the butter is melted, sprinkle the flour over the butter, whisking all the while. A flat whisk works awesome here. Draw in as much liquid as you can, into the flour. The mixture will be very thick. Let it cook for one minute, until slightly browned and fragrant. Slowly whisk in chicken stock until flour mixture is smooth. Then whisk in the half and half. Now bring the entire contents of the skillet together, scraping the bottom of the skillet, and folding to incorporate. Turn heat up to medium-high and cook until thickened and bubbly, about 4–5 minutes, stirring periodically.
- Remove skillet from heat. Stir in soy sauce and Worcestershire sauce. Then sprinkle Parmesan, rosemary, and thyme over the top and stir to combine. Now is the time to taste test and add more salt and pepper, if desired. I usually add about 1/2 teaspoon of salt and 1/4 teaspoon of black pepper at this point. Fold in blanched green beans. Transfer mixture to a baking dish and place in oven to bake for 30 minutes. Remove casserole from oven and arrange fried shallots and chopped bacon over the top, leaving green beans exposed around the perimeter of the dish. Place in oven and bake for another 5 to 10 minutes, or until edges of casserole are bubbling and the top is golden. Remove from oven and let rest for a few minutes before serving.
-
@ a80fc4a7:dc80ebd1
2024-12-10 07:40:32I have noticed a pattern lately that makes me kind of sad, It seems Photography and Real photos are becoming harder and harder to find these Days, With the rise of AI And Computer generation. If you go to Google or any Search engine and simply Search "Nature Photos" you will get largely AI Photos or heavily altered images, it's almost as if it was programmed this way, is nobody taking real photos anymore? Or is Google simply trying to replace real art and real photos with AI? This honestly puzzles me and worries me, has anyone else noticed this? Or is it just me. Was it always this way on Google?
-
@ 1cb14ab3:95d52462
2024-11-17 00:38:07Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 20 min
- 🍽️ Servings: 4
Ingredients
- 1 pound shrimp
- 1 teaspoon granualted sugar
- ½ cup all-purpose flour
- ½ cup panko breadcrumbs
- 1 teaspoon salt
- ½ teaspoon black pepper
- ¼ teaspoon garlic powder
- ¼ teaspoon onion powder
- ¼ teaspoon dried basil
- 1 egg
- 1 cup milk
- 4 – 5 teaspoon chili garlic sauce
- 1 teaspoon rice vinegar
- ½ cup mayonnaise
Directions
-
- Make the sauce: Mix mayonnaise, chili garlic sauce, sugar, and rice vinegar in a bowl. Refrigerate.
-
- Prepare for frying: a) Combine beaten egg and milk in one bowl. b) Mix flour, panko, and seasonings in another bowl.
-
- Bread the shrimp: a) Coat each shrimp in flour mixture. b) Dip in egg mixture. c) Coat again in flour mixture. d) Arrange on a plate and refrigerate for 20 minutes.
-
- Fry the shrimp: a) Heat oil to 350F in a dutch oven. b) Fry shrimp for 2-3 minutes until golden. c) Drain on wire rack or paper towels.
-
- Serve: a) Coat fried shrimp with ¼ cup sauce. b) Serve with remaining sauce on the side.
-
@ 592295cf:413a0db9
2024-11-16 10:40:22Week 11-11
Lamenting is becoming something I should ask people who complain. Charity bussiness and after sending zap received to those who do not complain...
I started making an RSS feed template. Open an opml file and check the feed. I called this script,Teed.
This morning I saw a bounty from a fiatjaf note, on a rss-feed long form, basic a plugin for an app. But I'm not doing that, of course, I can also publish it as soon as I'm in charge. Maybe I have some opml files and I want to see if these are still active.
Starter pack is not good apparently creates elites and maybe gives you the feeling of not choosing, but that's what people want. Do not choose but have the illusion of choosing.
Toxicity level. high.
P2P stuff, Iroh is a protocol for syncing & moving bytes iroh computer post on Bluesky
Juraj new project
nostr:nevent1qvzqqqqqqypzpk4kccr9csumnwhmpv83ladqc6p88089cx2e5s2c4448ppgl2pakqqsyv4hs424x6c8phks903s595q2lqp5fpwyq7ajwrf00lxev8cfamcvmq23h
Alex Gleason bunker Knox. (Beta) "knox is a new Nostr bunker CLI for running a NIP-46 remote signer and granting credentials to members of your team". Announcing bunker knox article
Local First podcast, web2.5. Something like Nostr but Local P2P, interesting episode. youtube link
Open Secret AI. "OpenSecret is a backend for app developers that turns private encryption on by default." announcment AI
I think users with regard to algorithms do not want ten different feeds to choose from, but that their feed adapts to their choices, training the feed if this makes sense. So the feed is your feed for your choices, respond and train with them.
Pleblab 2, cool "ANNOUNCING TOP BUILDER SEASON 2! " nostr:nevent1qvzqqqqqqypzpmx02p4slzahlf7jlcaspsx57g6uc7kl7cc7dvhlsnqtpn6khjj0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgwwaehxw309ahx7uewd3hkctcqyzy9w0frd802hfmrp45jr6dqhf7umqj7s63z0jvhv7hvvkcsqjg0vjwd7q4)
It was the real Guardian, quit 7fqx, we know it's you who want to distract us from number go up. The Guardian has left or wants to leave twitter is looking for alternatives, but how to verify a high profile user on Nostr? Nostr Address is already something but it's not enough.
We sometimes think that there is the money tree somewhere is that they magically appear, when instead the money is in the ground but they are dirty.
If Amethyst doesn't support is others stuff
People are simple, they want an app that works for all devices they have. People are "flutter-system".
A podcast feed xml file
Add to teed, if only i had made that option, meanwhile i saw a new interesting project
An other RSS feed github project
Imagine making a file opml with categories and those are your follow nostriches.
The problem is this does not bring new sap to the social chart is important to you, receive the selected posts and it is fantastic. You can also not use Nostr, if you want to use it as backup is fine. Share opml files? It's okay, but you can also find specific sites and find the best. Update for clients, you have a lot of RSS feeds from clients but update after a few hours so if there is really an emergency you lose. I still need to figure out how to integrate Nostr into RSS feed. Maybe an event to make your lists known.
I saw the event in these pr: nostr verified podcast nip #1465 Add audio track NIP #1043
-
@ 19f9afb8:ce50e4d3
2024-11-15 22:05:01Chef's notes
Make sure you watch your roux closely. It can go from perfect to burnt in a moment. Top with green onion tops. Sprinkle a very small amount of file over top. Andouille sausage is traditional but kielbasa is also a good substitute.
Details
- ⏲️ Prep time: 30 minutes for vegetable prep + ~1 hour for boiling chicken
- 🍳 Cook time: ~2 hours
- 🍽️ Servings: 8-10
Ingredients
- 1 large onion
- 1 large bell pepper
- 2 medium stalks celery
- 6-8 cloves garlic
- ~3 lbs. bone-in, skin-on chicken; remove skin and set aside to render
- ~1.5 lbs andouille sausage, browned
- ~1/2 lb. tasso, optional
- 2 green onions, chopped and separated
- 2 cups okra, cut (frozen or fresh, not canned)
- ~1 cup oil (rendered from chicken skins & sausage)
- ~1 cup flour
- 1-2 bay leaves
Directions
- Chop all vegetables and set aside. Render the fats from your chicken skins and sausages.
- Combine your flour and rendered fats in a cast iron skillet and stir continually over medium –low heat until your roux is chocolate brown. Stir in about 1/4 tsp of flour at this stage and cook until it stops “fizzing”. (This is simply to add to the thickening power of the roux.)
- While you are cooking your roux, boil your chicken until cooked through, remove from heat and broth, and set aside to cool for deboning .
- Add your vegetables, roux, deboned chicken, sausage, hot sauce, Worcestershire, and spices/seasonings to your broth. Optional: sauté your vegetables, except okra, before adding to broth. (Only add the bottom portions of the green onion here, reserve the green tops for garnish.)
- Cook until the okra is soft and no longer slimy, about 2 hours, at a low boil. (med-high heat)
- Optional: reduce to a simmer about 10 minutes before finished and drop a few eggs to poach in the stew before serving. Do not stir.
- Serve over rice.
-
@ 7ec80607:128517c5
2024-12-10 05:35:45Lymphatic drainage massage (LDM) is a gentle, therapeutic technique designed to promote the flow of lymph, a clear fluid that plays a crucial role in the body’s immune system and waste elimination. The lymphatic system is responsible for transporting lymph throughout the body, which contains white blood cells that help fight infection, as well as waste products that need to be filtered out. LDM aims to enhance the efficiency of this system, supporting overall health and wellness.
**Understanding the Lymphatic System ** To appreciate the benefits of lymphatic drainage massage, it's essential to understand the lymphatic system's structure and function. The lymphatic system consists of lymph nodes, lymphatic vessels, and lymphoid organs such as the spleen and thymus. Unlike the circulatory system, which has the heart to pump blood, the lymphatic system relies on the movement of muscles and joint activity to push lymph through its vessels.
Lymphatic vessels collect excess fluid, proteins, and waste products from tissues and transport them to lymph nodes, where they are filtered. The lymph nodes then produce lymphocytes, which are key in fighting infections. Maintaining a healthy lymphatic system is vital for preventing lymphedema (swelling due to lymph fluid accumulation), infections, and other health issues.
**The Technique of Lymphatic Drainage Massage ** Lymphatic drainage massage utilizes light, rhythmic, and circular motions to stimulate lymph flow and promote drainage. The techniques may vary slightly among practitioners, but the following key components are generally consistent:
1.Light Pressure: Unlike traditional massages, where deeper pressure is often applied to relieve muscle tension, LDM uses very light pressure. This gentle approach is necessary because the lymphatic vessels are located just beneath the skin's surface. 2.Rhythmic Movements: The massage involves slow, deliberate movements that mimic the natural rhythm of the lymphatic system. Practitioners often use their hands to create a "pumping" effect, which encourages lymphatic flow.
3.Specific Techniques: Techniques can include skin stretching, circular motions, and pumping actions. Areas with a high concentration of lymph nodes, such as the neck, armpits, and groin, receive focused attention.
4.Body Positioning: Clients are usually positioned comfortably, often lying down, to facilitate relaxation and maximize the effectiveness of the massage.
**Benefits of Lymphatic Drainage Massage ** Lymphatic drainage massage offers a range of potential benefits, making it a popular choice for individuals seeking both therapeutic and aesthetic advantages. Some of the key benefits include:
1.Reduced Swelling and Inflammation: By promoting lymphatic flow, LDM can help reduce swelling caused by lymphedema, post-surgical recovery, or injury. It can also alleviate inflammation in the body, contributing to faster healing.
2.Improved Immune Function: A well-functioning lymphatic system enhances the body’s ability to fight infections. LDM can stimulate the production of lymphocytes, which are essential for a healthy immune response.
3.Detoxification: The lymphatic system is integral to detoxification processes. By facilitating lymph flow, LDM aids in removing toxins, metabolic waste, and excess fluid from the body.
4.Relaxation and Stress Relief: The gentle, rhythmic nature of lymphatic drainage massage promotes relaxation and reduces stress. This can lead to lower levels of anxiety and improved overall well-being.
5.Enhanced Skin Health: LDM can improve circulation and promote a healthier appearance of the skin. Many people notice a reduction in puffiness, improved skin tone, and a general feeling of vitality after a session.
6.Alleviation of Pain: For some individuals, LDM can help reduce pain associated with certain conditions, such as fibromyalgia or arthritis. The gentle movements can ease tension and promote a sense of relief.
**Who Can Benefit from Lymphatic Drainage Massage? ** Lymphatic drainage massage can be beneficial for various populations, including: 1.Individuals with Lymphedema: Those diagnosed with lymphedema or at risk for developing it (such as after certain cancer treatments) can find LDM especially helpful in managing their condition.
2.Post-Surgical Patients: After surgeries, especially those involving the lymphatic system, LDM can aid in recovery by reducing swelling and promoting healing.
3.Individuals with Chronic Illnesses: People dealing with chronic health issues that affect their immune system or lymphatic flow may benefit from regular LDM sessions.
4.Fitness Enthusiasts and Athletes: Athletes may incorporate LDM into their recovery routine to reduce muscle soreness and promote faster recovery after intense workouts.
5.Individuals Seeking Relaxation: Anyone looking for stress relief and relaxation can enjoy the calming effects of lymphatic drainage massage.
**Contraindications and Precautions ** While lymphatic drainage massage is generally safe, certain individuals should exercise caution or avoid the treatment altogether. Some contraindications include:
1.Acute Infections: If you have an active infection or fever, it is best to postpone LDM until you have fully recovered.
2.Severe Heart Conditions: Individuals with serious heart conditions should consult their healthcare provider before undergoing LDM, as the treatment may affect circulation.
3.Kidney Problems: People with significant kidney issues may need to avoid LDM, as the technique can increase fluid movement in the body.
4.Blood Clots: If you have a history of blood clots or thrombosis, LDM should be avoided, as the increased movement of lymph could dislodge a clot.
5.Skin Conditions: Open wounds, rashes, or skin infections may be aggravated by massage, making it important to avoid treatment until the skin is healed.
**Finding a Qualified Practitioner ** If you’re considering lymphatic drainage massage, it’s essential to find a qualified practitioner who has specialized training in this technique. Look for licensed massage therapists, physical therapists, or other healthcare professionals who have completed accredited courses in lymphatic drainage. Before your session, discuss your health history and any specific concerns you may have. A good practitioner will tailor the massage to meet your individual needs, ensuring a safe and effective experience.
**Conclusion ** Lymphatic drainage massage is a gentle and effective therapy that promotes the health of the lymphatic system and offers a myriad of benefits, from reducing swelling to enhancing relaxation. Whether you’re seeking relief from a medical condition or simply want to enhance your overall wellness, LDM can be a valuable addition to your self-care routine. As with any therapeutic treatment, it’s crucial to consult with a healthcare provider or qualified practitioner to ensure that lymphatic drainage massage is appropriate for your unique situation. With the right guidance, you can experience the restorative benefits of this holistic therapy, leading to improved health and vitality.
-
@ a012dc82:6458a70d
2024-12-10 05:32:42Table Of Content
-
The Lone Star State's Embrace of Bitcoin Mining
-
Legislation and the Miner's Triumph
-
A Testament to Texan Openness
-
The Economic Implications
-
The Global Perspective
-
Conclusion
-
FAQ
In the vast expanse of the digital age, where boundaries are constantly being redrawn, Texas emerges as an unlikely hero. The state, with its deep-rooted traditions and rugged landscapes, has become a beacon for the future of digital currency. As the world grapples with the implications of decentralized finance, Texas stands tall, bridging the gap between the old and the new. This is the story of how the Lone Star State became the epicenter of the Bitcoin mining revolution.
The Lone Star State's Embrace of Bitcoin Mining
It's not every day that a state becomes a hotspot for a global phenomenon, especially one as groundbreaking as Bitcoin mining. But Texas, with its vast landscapes and iconic cowboy culture, has done just that. The state, known for its oil rigs and cattle ranches, has now become synonymous with the hum of Bitcoin mining rigs. It's like the Gold Rush of the 21st century, but instead of panning for gold, folks are mining digital currency.
Legislation and the Miner's Triumph
Now, you might be wondering, how did Texas, of all places, become this global mecca for Bitcoin mining? Well, it's a tale of business, politics, and a bit of good ol' Texan spirit. For instance, there was this proposed legislation, SB 1751, that had the potential to throw a wrench in the works. This bill, which breezed through the state senate initially, aimed to cut down the incentives miners received from the power grid and put an end to mining tax abatements. Just to give you a sense of the scale, this could've set Riot back by a whopping $30 million! But here's where the story takes a twist. After the bill made its way through the Senate, the mining industry didn't just sit back and accept their fate. Oh no, they took the bull by the horns. They met with politicians, laid out their case, and made it clear how beneficial they were to the grid. And guess what? Their efforts bore fruit. The bill, which once seemed like a sure thing, met its end in the House. And boy, did the miners celebrate that victory!
A Testament to Texan Openness
The relationship between Texas and the Bitcoin mining community is unique. It's not just about business; it's about understanding, collaboration, and mutual respect. Regulators in Texas have been incredibly receptive to Bitcoin miners, recognizing the myriad benefits these miners bring to the grid. Texas has opened its arms wide, welcoming an industry that's reshaping the global financial landscape.
The Economic Implications
Beyond the hum of the mining rigs and the intricacies of legislation, there's a broader economic narrative unfolding. Texas' embrace of Bitcoin mining is not just about digital currency; it's about job creation, infrastructure development, and fostering innovation. As more miners set up shop, local economies benefit, and the state solidifies its position as a hub for technological advancement.
The Global Perspective
The world is watching, and Texas is setting a precedent. Other states and countries are taking note of how Texas has managed to integrate Bitcoin mining into its economic and legislative framework. The state's success story serves as an inspiration for regions looking to tap into the potential of digital currencies and the industries they spawn.
Conclusion
The tale of how Texas, with its rich history and tradition, has become a beacon for the future of finance is a testament to the state's adaptability, its willingness to evolve, and its undying spirit of enterprise. As the world continues its march towards a digital future, Texas stands tall, not just as a participant but as a leader. The future is not just bright; it's digital.
FAQ
What's the significance of Texas in the Bitcoin mining industry? Texas has emerged as a global hotspot for Bitcoin mining, attracting miners with its favorable regulations and infrastructure.
How did Texas respond to the proposed SB 1751 legislation? While the bill initially passed the Senate, it was later rejected in the House after miners and industry representatives made their case.
Why are regulators in Texas supportive of Bitcoin miners? Texas regulators recognize the economic benefits and technological advancements that Bitcoin miners bring to the state.
Is Texas' Bitcoin mining boom just about digital currency? No, it's also about job creation, infrastructure development, and fostering innovation in the state.
How is Texas influencing other regions regarding Bitcoin mining? Texas' success in integrating Bitcoin mining is serving as a role model for other states and countries looking to tap into the potential of digital currencies.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 44dc1c2d:31c74f0b
2024-11-15 21:31:32Chef's notes
So if you want a more sweet stew, add some dried apricots.
Details
- ⏲️ Prep time: 15 ish min
- 🍳 Cook time: 1 Hour ish
- 🍽️ Servings: 4 to 6
Ingredients
- 1/4 cup olive oil
- 1 large onion, grated
- 2 tablespoons finely minced garlic
- 1 teaspoon chili powder
- 1 teaspoon ground cumin
- 1 cinnamon stick or 1/2 teaspoon ground cinnamon
- Salt and pepper, to taste
- 3 pounds boneless lamb shoulder, cut into 1 1/2-inch pieces
- 2 1/2 cups defatted chicken broth
- 1 dried ancho chili, stem and seeds removed
- 4 carrots, peeled, halved lengthwise and cut into 1-inch pieces
- Zest of 1 orange, in wide strips
- 2 cups cubed (1 inch) butternut squash
- 2 roasted red bell peppers , cut into 1-inch pieces
- 2 tablespoons chopped fresh cilantro leaves for garnish
Directions
- Combine the oil, onion, garlic, chili powder, cumin, cinnamon, salt, and pepper in a large, heavy pot. Stir well, then add the meat. Toss the meat with the spice mixture to coat it well.
- Add the broth, ancho chili, carrots, orange zest, and butternut squash. Bring to a boil over high heat. Then reduce the heat and simmer gently, partially covered, over medium heat for 30 minutes. Add the roasted peppers; cook, partially covered, until the lamb and vegetables are tender, about 30 minutes more. Remove and discard the chili and orange zest. Sprinkle with cilantro and serve immediately.
-
@ 502ab02a:a2860397
2024-12-10 05:07:54เปิดวาร์ปอีกแล้วววว !!!
เนย จากนมแบบ Non Pasteurise กลับมาแล้ว เป็นเนยที่ใช้คำว่า Grand Cru(กรองด์ ครู) เนยเทพที่ใช้นมจาก บริตตานี ของ Le Gall
Grand Cru เป็นคำภาษาฝรั่งเศสที่แปลตรงตัวว่า “แหล่งผลิตที่ยอดเยี่ยม” หรือ “ชั้นดีเยี่ยม” ถ้าเป็นไวน์ก็คือ ไวน์ชั้นยอด ไวน์ Grand Cru Classé จะเป็นที่รู้กันในวงการไวน์
ดูเส้นที่เนยนะครับ นี่คือไม้ตบเนยให้เป็นก้อนแบบโบราณเลยนะ
เล่าประวัติ Le Gall ให้เพื่อความอิน ในการกินครับ เมื่อปีค.ศ. 1923 คุณ Jean-Marie Le Gall ตอนนั้นเขาอาศัยอยู่ที่ rue Jules Noel ทางที่จะมุ่งหน้าไปยังจตุรัส Locronan (โลโครนัน ) ใน Quimper (แก็งแปร์) แคว้น Brittany (บริตตานี) ฝรั่งเศส เป็นอีกดินแดนหนึ่งที่ขึ้นชื่อเรื่องคุณภาพของนม
เขาเริ่มต้นจากอาชีพ trader โดยการนำเนยและไข่ที่ได้มาจากสวน ไปขายในตลาดใหญ่ของเมืองบริตตานี และค่อยๆเก็บเล็กผสมน้อยทำให้เขาเริ่มรวบรวมครีมที่ปั่นแล้ว (Cream churned) จากฟาร์มมาทำเป็นเนยเพื่อจำหน่าย แล้วสินค้าของ Le Gall ก็เริ่มเจาะกลุ่มลูกค้าที่มีความต้องการมองหาสินค้าท้องถิ่นอันเลอค่าแท้ๆมากขึ้นด้วยคุณภาพสินค้า จึงตัดสินใจเก็บรักษาเทคนิคการปั่นถังที่ต้องใช้ฝีมือความปราณีตสูง (barrel chruning) สืบสานการทำเนยด้วยวิธีนี้ต่อไปไม่เปลี่ยนแปลง
ในระหว่างช่วงปี ‘70 และ ‘80 Le Gall ก็ได้พัฒนาการผลิตเนยและครีมอย่างต่อเนื่องทั้งใน บริตตานี และกินพื้นที่ทางฝั่งตะวันตกของฝรั่งเศสเกือบทั้งหมด จนกระทั้งในปี 1992 ก็ได้ชื่อว่าเป็นบริษัทแรกๆที่มุ่งมันในการทำเกษตรอินทรีย์ อย่างแท้จริงทั้งด้านการลงทุนและเข้าไปมีส่วนร่วมกับชุมชนการเกษตรท้องถิ่น
เนย Le Gall มี 2 ประเภท คือ กลุ่มที่เป็น Lactic butter ที่ผลิตด้วยกรรมวิธีสมัยใหม่ (ห่อสีขาว) และกลุ่มห่อสีๆที่เป็น artisan butter หรือกลุ่มดรัมเชิร์น ที่ผลิตด้วยกรรมวิธีดั้งเดิมโดยใช้ถังปั่น
ซึ่งวิธีผลิตเนยแบบดั้งเดิมนี้มีข้อดีที่ขั้นตอนการปั่นอย่างช้าๆจะทำให้ครีมสดๆได้เนยคุณภาพยอดเยี่ยม นุ่มละมุนเนียนเป็น texture อย่างที่เป็นอยู่นอกจากนี้ผลิตภัณฑ์ของ Le Gall ทุกตัวจะต้องผ่านการตรวจสอบจาก Master Buttermaker ของ Le Gall เองอยู่ตลอดเวลา
อย่างที่พวกเขาพูดเสมอๆว่า “เราไม่ได้เปลี่ยนอะไรเลย มันเลยสร้างความแตกต่าง” โคตรคราฟท์ ชัดเจนและลงตัวไหมล่ะ 5555 รู้แล้วใช่มะ ทำไมผมชอบเลอแกล
เช่นกันตัวเนย Le Gall Grand Cru นี้จัดอยู่ในอันดับท้อปๆของ lineup ซึ่งเป็นเนยผลิตจากนมดิบสดที่ไม่ผ่านการพาสเจอร์ไรซ์ หมักบ่มกว่า 15-18 ชั่วโมง โดยใช้กรรมวิธีดั้งเดิมของชาวฝรั่งเศสแท้ๆคือ Drum Churned ค่อยๆปั่นในถังจนได้เนยที่อ่อนนุ่มคุณภาพดีตามที่กล่าวไว้ข้างต้น
ด้วยความที่ผลิตจากนมดิบนั่นหมายถึงว่ามันยังคงมีจุลินทรีย์อยู่ไม่ถูกฆ่าไปด้วยกรรมวิธีพาสเจอร์ไรซ์นั่นเอง
ผลที่ได้ออกมาคือเนยที่มีความเข้มข้น มิติของกลิ่นหอมฟุ้งในกระพุ้งปาก ฉ่ำชื่นรื่นอุรา มีกลิ่นหอมคงค้างในปากและลำคอ (after taste)
เนยรุ่นนี้เมื่อก่อนอาจต้องบินไปซื้อถึงฝรั่งเศส เดี๋ยวนี้ทาง KCG นำเข้ามาจำหน่ายแล้ว ต้องซื้อตรงจาก KCG เท่านั้นด้วย
ซื้อผ่านทาง Line Official Account ของ KCG online ซึ่งเปิดบริการ Line MyShop เอาไว้รองรับเป็นที่เรียบร้อย
https://shop.line.me/@kcgonline
เฮียจะใช้เนยตัวนี้ทำ Rustic Butter Cake : Le Gall Grand Cru Series รอบนี้ครับ
pirateketo
ตำรับเอ๋
siripun
-
@ 234035ec:edc3751d
2024-12-10 01:25:32The rise of UAVs
Drones, we have all heard of them, seen them, and many of us own them. Also known as UAVs (Unmanned Arial Vehicles) they come in endless different shapes and sizes, from 2inch Cinewhoop FPVs (First Person View) to large military drones like the Northrop Grumman RQ-4 Global Hawk which can fly for over 30 hours at speeds over 300mph.
In recent conflicts, most notably the ongoing Russia-Ukraine war, we have seen drones play a very significant role. The utilization of small consumer or cheaply manufactured drones for reconnaissance, dropping payloads, delivering supplies, and as "kamikaze" weapons has been well documented.
These so called Kamikaze drones have been devastatingly effective due to the asymmetry of risk on the side of the drone attacker as opposed to traditional warfare methods. The FPV pilot can sit in a secure location several miles from the enemy, and launch $500-$1,000 drones to take out signifiant infrastructure, tanks, personnel, ect. By embracing a new paradigm of warfare a smaller force with significantly less resources is able to project a disproportionate amount of power.
Outside of military use we have seen drones used for many other applications such as 3D mapping, Thermal imaging, Delivery services, agricultural uses, and choreographed displays. All of these take something that once required a human operator present and allows them to be automated. While many of these applications do still require a human operator, it is not a far stretch to imagine that, with advancements in computation and machine learning they will grow more and more hands off.
Being able to utilize a computer program to fly a pre-set flightpath over a location and generate a 3D model of it or gather thermal data is already a reality. Companies now offer docking stations which charge the drone and it can take off and land from autonomously.
The use of large swarms of drones to create arial displays has also been growing in popularity in recent years. fleets of hundreds and sometimes thousands of drones are programmed to flight in precise coordinated patterns in order to create complex shapes and images in the sky. The idea of a single computer being able to control and coordinate such a vast number of vehicles is mind boggling.
Drones in the digital revolution
The "Digital Revolution" has been talked about at great lengths by many people and generally refers to the rapid growth in computation which has lead to growth in access to information and global connectivity. This new wave has seen the dematerialization of many things in our life. E-mail, E-commerce, Social Applications, Wikipedia, Bitcoin, ect. are all examples of previously physical things being dematerialized in the digital age.
UAVs give us a bridge between the digital and physical worlds. A software program run on a computer can now deliver a package to someone across town who just placed an order on a website. They can be used to inspect properties or other physical assets from a distance or to spray crops on large pieces of land.
Along with these "civilian" applications it is easy to imagine a future where drones have an even larger significance in warfare. If you combine the drone swarms used in light displays with the kamikaze drones being used in Ukraine, you get a very scary proposition. If warfare becomes increasingly autonomous, manpower will matter far less and resources will matter much more. A small wealthy nation may be able to wield significant power through their UAV systems.
Decentralization of UAVs
When considering the potential future with respect to drones and drone weapons systems, it is easy to become concerned with a potential Orwellian future where the government has patrol drones and can arrest you autonomously for your thought crimes. While government tyranny is always a serious concern, I am hopeful for the future.
The second amendment in the United States is designed to ensure that the citizens have enough power to resist a tyrannical government. I see drones as a force which levels playing fields, the average individual has access to the same drones which are being used in conflict right now in Ukraine. With the digital revolution we have also seen 3D printing grow massively in popularity and utility and individuals have been experimenting with 3D designs for firearms and drones. This further democratizes access to self defense allowing many more individuals access to the tools necessary to defend themselves in the physical world through a digital file.
The future is going to be a very interesting place. I believe that the lines between the physical and digital worlds will continue to blur and that unmanned aircraft are going to play a significant role in that transformation.
-
@ 9bcc5462:eb501d90
2024-12-10 01:12:39Beyond Legacy
Louis Sullivan was a legendary architect, known as the "father of skyscrapers". He was among the first to embrace new tech, like steel frames and elevators which changed infrastructure development forever. Despite this, people want to see him as a cautionary tale since he wasn’t financially successful in his later years. Nikola Tesla too, suffered a lack of funds when he died. Even when brilliance doesn't always equal wealth, let's not overlook the fact that Sullivan's buildings still stand strong and kiss the sky. Meanwhile, electric cars today bear Tesla's name. These men were ahead of their time and noble for it. A testament that bank accounts die and visions live on.
Frank Lloyd Wright was Sullivan's protege and battled his fair share of demons as well, including scandals, professional criticism and debts until the day of his death. Yet, he was loyal to his mentor's vision of "form follows function" despite the brutal criticisms of it at the time. Like Sullivan, he refused the status quo of mimicking the ornamental European traditions. Instead, he developed his own "organic architecture" style, integrating the site and surroundings with the building. Using the aesthetic of horizontal lines, it would become known as his signature "Prairie Style". Wright would go on to produce innovative homes like Falling Water and Taliesin, which now serve as timeless beacons of unique American architecture.
Their memory challenges me: Do I have the cojones to put everything on the line for my startup, as they did for their vision? Although Learning Producers is in the field of learning experience design, we've been guided by "form follows function" in a landscape hellbent on mimicking conventional models. Bootstrapping as a first time founder feels like entering battle, armor clanking and shield raised. My enemy, a Goliath of stagnation.
I'm reminded in the scene from the movie Troy, where Achilles is made aware of a large enemy soldier he must combat. A boy commented to him, "The Thessalonian you're fighting, he's the biggest man I've ever seen. I wouldn't want to fight him." To which Achilles savagely replies, "That's why no one will remember your name."
-
@ ab54780c:0884884e
2024-11-15 04:30:05Chef's notes
Makes approximately 1 US quart (~1L). Double the recipe to fill a 2-quart pitcher and to avoid using only half an onion and half of a lemon. Keeps well when sealed and refrigerated for up to a week. And yes: fresh ground spices makes a difference.
Details
- ⏲️ Prep time: ~25 min
- 🍽️ Servings: 6-10
Ingredients
- 2 Jalapeño peppers
- 1/2 Lemon, juice of
- 2 cans (10 oz.) Ro-Tel Original Diced Tomatoes & Green Chiles (Mild)
- 2 cans (14.5 oz.) Whole Peeled Tomatoes
- 1 bunch fresh Cilantro
- 1/2 Red Onion
- 2 Fresh Tomatoes
- 1/2 tablespoon Black Peppercorns
- 1/2 tablespoon Salt
- 1 teaspoon Garlic Salt
Directions
- Gather required tools: Spice grinder or mortar & pestle, Knife, Cutting board, Food Processor (2+ quart size), Citrus reamer (optional)
- Open canned ingredients and strain off excess water
- Grind cumin seeds to a powder and black peppercorns to medium to fine coarseness (as desired) in spice grinder or mortar & pestle
- Rinse with fresh water and prepare all fresh ingredients, cutting them into halves or quarters as necessary to size them for comfortable loading into your food processor. It’s handy to pre-squeeze the lemon into a small glass where it is easier and safer to remove ejected seeds rather than digging them out of a loaded food processor with your finger (cook safe!). Remove jalapeño stems, but leave seeds in for the right heat level.
- In the food processor blend all ingredients except the fresh tomatoes
- Once a well-blended consistency is achieved, add fresh tomatoes and pulse/chop several times to desired level of chunkiness.
-
@ 6389be64:ef439d32
2024-12-09 23:50:41Resilience is the ability to withstand shocks, adapt, and bounce back. It’s an essential quality in nature and in life. But what if we could take resilience a step further? What if, instead of merely surviving, a system could improve when faced with stress? This concept, known as anti-fragility, is not just theoretical—it’s practical. Combining two highly resilient natural tools, comfrey and biochar, reveals how we can create systems that thrive under pressure and grow stronger with each challenge.
Comfrey: Nature’s Champion of Resilience
Comfrey is a plant that refuses to fail. Once its deep roots take hold, it thrives in poor soils, withstands drought, and regenerates even after being cut down repeatedly. It’s a hardy survivor, but comfrey doesn’t just endure—it contributes. Known as a dynamic accumulator, it mines nutrients from deep within the earth and brings them to the surface, making them available for other plants.
Beyond its ecological role, comfrey has centuries of medicinal use, earning the nickname "knitbone." Its leaves can heal wounds and restore health, a perfect metaphor for resilience. But as impressive as comfrey is, its true potential is unlocked when paired with another resilient force: biochar.
Biochar: The Silent Powerhouse of Soil Regeneration
Biochar, a carbon-rich material made by burning organic matter in low-oxygen conditions, is a game-changer for soil health. Its unique porous structure retains water, holds nutrients, and provides a haven for beneficial microbes. Soil enriched with biochar becomes drought-resistant, nutrient-rich, and biologically active—qualities that scream resilience.
Historically, ancient civilizations in the Amazon used biochar to transform barren soils into fertile agricultural hubs. Known as terra preta, these soils remain productive centuries later, highlighting biochar’s remarkable staying power.
Yet, like comfrey, biochar’s potential is magnified when it’s part of a larger system.
The Synergy: Comfrey and Biochar Together
Resilience turns into anti-fragility when systems go beyond mere survival and start improving under stress. Combining comfrey and biochar achieves exactly that.
-
Nutrient Cycling and Retention\ Comfrey’s leaves, rich in nitrogen, potassium, and phosphorus, make an excellent mulch when cut and dropped onto the soil. However, these nutrients can wash away in heavy rains. Enter biochar. Its porous structure locks in the nutrients from comfrey, preventing runoff and keeping them available for plants. Together, they create a system that not only recycles nutrients but amplifies their effectiveness.
-
Water Management\ Biochar holds onto water making soil not just drought-resistant but actively water-efficient, improving over time with each rain and dry spell.
-
Microbial Ecosystems\ Comfrey enriches soil with organic matter, feeding microbial life. Biochar provides a home for these microbes, protecting them and creating a stable environment for them to multiply. Together, they build a thriving soil ecosystem that becomes more fertile and resilient with each passing season.
Resilient systems can withstand shocks, but anti-fragile systems actively use those shocks to grow stronger. Comfrey and biochar together form an anti-fragile system. Each addition of biochar enhances water and nutrient retention, while comfrey regenerates biomass and enriches the soil. Over time, the system becomes more productive, less dependent on external inputs, and better equipped to handle challenges.
This synergy demonstrates the power of designing systems that don’t just survive—they thrive.
Lessons Beyond the Soil
The partnership of comfrey and biochar offers a valuable lesson for our own lives. Resilience is an admirable trait, but anti-fragility takes us further. By combining complementary strengths and leveraging stress as an opportunity, we can create systems—whether in soil, business, or society—that improve under pressure.
Nature shows us that resilience isn’t the end goal. When we pair resilient tools like comfrey and biochar, we unlock a system that evolves, regenerates, and becomes anti-fragile. By designing with anti-fragility in mind, we don’t just bounce back, we bounce forward.
By designing with anti-fragility in mind, we don’t just bounce back, we bounce forward.
-
-
@ 4ba8e86d:89d32de4
2024-12-09 23:12:11A origem e o desenvolvimento do SearXNG começaram em meados de 2021, após o fork do conhecido mecanismo de metabusca Searx, inspirado pelo projeto Seeks. Ele garante privacidade básica ao misturar suas consultas com outras pesquisas, sem armazenar dados de busca. O SearXNG pode ser adicionado à barra de pesquisa do navegador e também configurado como mecanismo de busca padrão.
Embora o SearXNG não ofereça resultados tão personalizados quanto o Google, ele não gera um perfil sobre você. Controle Total sobre Seus Dados: com o SearXNG, você tem controle absoluto sobre suas informações de pesquisa. O histórico de busca é totalmente opcional e pode ser ativado ou desativado conforme sua preferência. Além disso, é possível excluir qualquer entrada a qualquer momento, garantindo sua privacidade. Resultados de Fontes Diversificadas: o SearXNG agrega informações de mais de 70 fontes diferentes, proporcionando uma pesquisa mais abrangente e relevante. Em vez de se limitar a uma única fonte, você obtém uma visão mais ampla e detalhada das informações disponíveis.
O SearXNG respeita sua privacidade, nunca compartilha dados com terceiros e não pode ser usado para comprometer sua segurança.
O SearXNG é um software livre com código 100% aberto, e qualquer pessoa é bem-vinda para contribuir com melhorias. Se você valoriza a privacidade, deseja ser um usuário consciente ou acredita na liberdade digital, faça do SearXNG seu mecanismo de busca padrão ou instale-o em seu próprio servidor.
O SearXNG reconhece sua preocupação com logs, por isso o código-fonte está disponível para que você possa executar sua própria instância:
https://github.com/searxng/searxngAdicione sua instância à lista de instâncias públicas.
https://searx.space/
para ajudar outras pessoas a recuperar sua privacidade e tornar a internet mais livre. Quanto mais descentralizada for a internet, maior será a liberdade para todos!
Lista de Instâncias Públicas https://searx.space/
Documentação de Instalação https://docs.searxng.org/admin/installation.html#installation
SeaxrXNG : Instalação , configuração e publicação.
https://youtu.be/zcrFPje6Ug8?si=oOI6dqHfHij51rvd
https://youtu.be/8WHnO9gJTHk?si=-5SbXUsaVSoSGpps
-
@ 2de0ffa0:b6bb72cc
2024-12-09 23:11:31🧠 Quote of the Week
“The experiment was to see how easy it was to split a large file into chunks, then upload those chunks to multiple blossom servers and reassemble them on another computer”. - npub1ye5ptcxfyyxl5vjvdjar2ua3f0hynkjzpx552mu5snj3qmx5pzjscpknpr from nevent1qqsx9l2j7g5t8llkm8r9d987er3hwj0gmrq4k09d88hzvq4ujysmksgpp4mhxue69uhkummn9ekx7mqpz3mhxue69uhhyetvv9ujuerpd46hxtnfduq3vamnwvaz7tmjv4kxz7fwdehhxarj9e3xzmnyqgszv6q4uryjzr06xfxxew34wwc5hmjfmfpqn229d72gfegsdn2q3fgjwk96y
🧡 Top Nostr News
🎥 Decentralized Video Archiving with Novia
Novia provides a decentralized alternative to the centralized platforms dominating video content today. By using the Nostr ecosystem, Novia allows users to store videos locally, while only sharing essential metadata on Nostr relays. How Novia Works: Local Storage, Global Access: Videos are stored locally, with metadata like thumbnails and info shared via Nostr. Video Requests and Recovery: Users can request videos, which are then retrieved and uploaded to Blossom servers for access. Personalized Archiving: Users can build their own video archives and run services to manage them on their devices. Novia empowers users with a web app for browsing and a service for hosting personal video collections, offering a decentralized approach to video storage. Why Novia is Needed: Today, video content is monopolized by centralized platforms, limiting users' control. Novia changes this by enabling anyone to archive, share, and retrieve videos in a decentralized manner. The Vision: Novia is for video enthusiasts and archivists who want to preserve content while maintaining privacy. Using the Nostr protocol, Novia ensures video files remain local, with uploads only occurring when requested by users. Get Started: For more details and to contribute, visit the official Novia 🔗 GitHub repository. 🔗 Event: nevent1qqszpw0pa3u9ey6g6h65m3rztux0t0t38ddeslp55748rhwatjl40egpp4mhxue69uhkummn9ekx7mqzyzad8jq5fwtzut77fjfsrv09exp64xahq7tgw59lyxtarach7u0kknhg9wg
🌍 Nostr LATAM Tour
The Nostr LATAM Tour that happened the last couple of weeks has been an incredible success, thanks to the hard work and enthusiasm of npub1hz5alqscpp8yjrvgsdp2n4ygkl8slvstrgvmjca7e45w6644ew7sewtysa and the passionate Nostr community! 🎉 Over the last few weeks, they’ve brought Nostr to South America with events in Buenos Aires, São Paulo, and El Salvador. It was an unforgettable experience that highlighted the power of decentralized communication without the middlemen. At each event, the team onboarded dozens of new users, introducing them to the Nostr protocol and helping them make their very first posts. The community shared useful tips for newcomers, and one of the key things highlighted was the importance of hashtags like #introduction, which allows the broader Nostr ecosystem to engage with new users. The workshops were full of energy, with everyone excited to dive into this new world. People were thrilled by how easy it was to create their first Nostr account – some were up and running in less than a minute! The welcoming, supportive atmosphere throughout the events proved just how much the Nostr community cares about helping each other. It was inspiring to see so many people eager to join the movement, exchange ideas, and be part of something special. The buzz was palpable, and the spirit of collaboration was alive throughout each session. This was an amazing start, and there's so much more to come. The energy and passion from everyone involved will continue to drive the growth of Nostr across the region. Check out the video to relive the highlights of this journey and see the impact for yourself! 🙌 🔗 Event note12rjgue5g7uqtrkh2lv5wd44k900qglqe9yc942rmdydq7aaym3mqmt7a8v
📺 Nostr on TV
Why Nostr Will Win with npub16c0nh3dnadzqpm76uctf5hqhe2lny344zsmpm6feee9p5rdxaa9q586nvr -
npub16c0nh3dnadzqpm76uctf5hqhe2lny344zsmpm6feee9p5rdxaa9q586nvr is the founder and the CEO of primal.net. In this episode he discusses how Primal is enhancing the Bitcoin and Nostr experience by balancing sovereignty with user accessibility. The conversation covers the challenges between custodial vs. non-custodial wallets, the impact of the zapping economy on online interactions, and the role of mobile apps in mass adoption. npub16c0nh3dnadzqpm76uctf5hqhe2lny344zsmpm6feee9p5rdxaa9q586nvr explains how integrating Bitcoin into everyday apps and using Nostr’s web of trust can help tackle issues like spam while maintaining decentralized values. Could this approach onboard millions to Bitcoin seamlessly? Tune in to explore the game theory of Bitcoin in action.
🔗 video : https://www.youtube.com/watch?v=wsc2pRPuj3E
🛠️ Tools, Updates, and Releases
Pokey v0.1.2 - alpha
Pokey is a handy Android app that gives you notifications of new replies, mentions, zaps, DM’s and so. This newest release gives multi account support, so when you have multiple Nostr profiles you can receive notifications of all of them. Developed by: npub1v3tgrwwsv7c6xckyhm5dmluc05jxd4yeqhpxew87chn0kua0tjzqc6yvjh Source: https://github.com/KoalaSat/pokey
Amethyst v0.93.1 Update
Amethyst, a popular Android Nostr client, now supports NIP-22 for interactive story replies, improving comment threading. The DVM feed displays service costs and customization options. The update also fixes bugs related to Satellite's blossom uploads, video feeds, and enhances Hex encoder performance. Developed by: npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z Source: https://github.com/vitorpamplona/amethyst
Servus v0.1.4
Servus is a minimalist social media server for personal websites, combining a CMS, Nostr relay, and file hosting into one executable. It lets you fully control your content and data, without relying on databases or web servers. It supports file hosting with Blossom and Nostr NIP-96 HTTP File Storage Integration, ensuring privacy and ownership. The 0.1.4 release improves Nostr filters.
Ideal for tech-savvy users who want a simple, self-hosted website solution with Nostr integration. It's not for beginners, as it requires basic knowledge of the command line and DNS.
Developed by: npub1xvdg698f7fqdu2qu5azwa6fu8xhw8p0zpp272qe7qex7kpn5ks5su3am9l Source: https://github.com/servus-social/servus
Corny Chat v2024.11
Corny Chat is an open-source audio space for real-time communication, integrating Nostr and Lightning to foster interactive audio rooms and personalized conversations. This release introduces Nostr Custom Emojis, enabling sticky emojis and reactions for a more engaging experience. The Animation Toggle improves performance on slower devices, making the app more accessible for all users.
Developed by: npub1yx6pjypd4r7qh2gysjhvjd9l2km6hnm4amdnjyjw3467fy05rf0qfp7kza Source: https://github.com/vicariousdrama/cornychat
Snort v0.3.0
Snort is a Nostr webclient designed for streamlined and efficient use, offering smooth performance and optimized functionality across multiple devices.
This release includes small performance tweaks, ensuring faster and more responsive interactions, making the app smoother and more efficient for users.
Developed by: npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49 Source: https://snort.social/
Voyage v0.17.1
Voyage is a lightweight Android client with a Reddit-like UI, designed for seamless browsing and organization. This release enhances data integrity by preventing empty lists from being saved and treating empty list pairs as deleted. It also resolves a critical issue causing crashes from duplicate IDs, ensuring improved stability and reliability for users.
Developed by: npub1useke4f9maul5nf67dj0m9sq6jcsmnjzzk4ycvldwl4qss35fvgqjdk5ks Source: https://github.com/dluvian/voyage
Amber v3.0.1
Amber is a Nostr event signer for Android.
This update introduces a new design, removes the push notification server, and improves permissions management. It also includes bug fixes for crashes, layout issues, and relay connectivity. Key new features: set a custom PIN for security, copy public keys easily, and better handling of NostrConnect messages and rejected events.
Developed by: npub1w4uswmv6lu9yel005l3qgheysmr7tk9uvwluddznju3nuxalevvs2d0jr5 Source: https://github.com/greenart7c3/Amber
Alby Lightning Browser Extension v3.10.0 – "Ice Clouds over a Red Planet"
Alby is a webbrowser extension for managing Nostr signing, Lightning payments and wallets. Version v3.10.0 introduces an Alby Hub Connector for seamless wallet upgrades, a notification banner for upgrade alerts, and a fee credits feature for managing transaction costs.
Alby is shifting toward its new self-custodial solution, the Alby Hub. If you’re using an Alby shared custodian wallet, heads up—big changes are coming. Starting January 4, 2025, Alby will discontinue its shared wallet service. If you have funds there, you’ll need to act before that date. This new option puts you in full control of your Bitcoin and Lightning payments. Plus, Nostr Wallet Connect is integrated right into the Hub for a smoother experience, and if you opt for the cloud version, you can even set up a custom Lightning and Nostr address. No more limits—and no more relying on a shared service.
Developed by: npub1getal6ykt05fsz5nqu4uld09nfj3y3qxmv8crys4aeut53unfvlqr80nfm Source: https://github.com/getAlby/lightning-browser-extension
Nostr Web Services (NWS) v0.2.0 - Pre-release
Nostr Web Services (NWS) is a tool designed to route TCP traffic over Nostr relays, enabling secure and reliable communication within a decentralized network. It uses the Nostr protocol, known for its censorship resistance, to allow users to establish connections and transmit data efficiently. The v0.2.0 (Pre-release) update of NWS brings improvements like better context handling, enhanced security with the switch from NIP-04 to NIP-44, and fixes to the dial function. It also updates public exit node routing, refactors exit node creation, and restructures the protocol package for better scalability and maintenance, improving stability and performance. 🔗 GitHub: https://github.com/asmogo Developed by: Npub16uq0cyx52lh2unczavzdw9dq2jphu69zutgpp9cnstz7zqtdex0qmcxla3.
🎁 Developer Tools, updates and Guides
Cherry Tree - Chunked blobs on Blossom 🌸
For developers working with files such as media, there is a pull request by Main blossom developer npub1ye5ptcxfyyxl5vjvdjar2ua3f0hynkjzpx552mu5snj3qmx5pzjscpknpr that explores how to split large files into chunks, upload them to multiple Blossom servers, and reassemble them on another computer. The experiment demonstrated that Blossom servers treat these chunks as ordinary binary blobs uploaded from a public key, with no inherent understanding that they are part of a larger file. However, this method isn’t inherently private since servers could potentially examine and piece together the data. Adding encryption to the client-side blobs would enhance privacy. It’s important to note that this is currently a PR and has not yet been accepted within the Blossom protocol. For more background, try exploring the author's post or discussing it with them. You can review the PR for details at GitHub: github.com/hzrd149/blossom/pull/51, or experiment using public Blossom servers listed at blossomservers.com. The project uses several packages, including Applesauce (hzrd149.github.io/applesauce/), rx-nostr (penpenpng.github.io/rx-nostr/en/), and blossom-client-sdk (npmjs.com/package/blossom-client-sdk). Author Public Key: npub1ye5ptcxfyyxl5vjvdjar2ua3f0hynkjzpx552mu5snj3qmx5pzjscpknpr
🚀 Introducing nostr-nsec-seedphrase: Simplifying nSec Handling for Developers! 🔑
Are you a Nostr developer tired of manually copying and pasting nSec seed phrases? Look no further! The nostr-nsec-seedphrase npm package streamlines the process, making it easier to save and work with nSecs. Whether you're developing a new app or enhancing an existing one, this tool offers simple seedphrase functionality, including HEX-to-nSec conversions—no more repetitive code. Explore the open-source project on GitHub: https://github.com/HumanjavaEnterprises/nostr-nsec-seedphrase.
NostrDVMstars v1.0.4 - Latest Release
NostrDVMstars is a Python-based Nostr NIP90 Data Vending Machine framework. Nostr can act as a marketplace for data processing, where users request jobs to be processed in certain ways (e.g., "speech-to-text", "summarization", etc.), but they don't necessarily care about "who" processes the data. Version v1.0.4 fixes a bug related to NIP44 encryption, improving bot stability and functionality. Developed by: npub1nxa4tywfz9nqp7z9zp7nr7d4nchhclsf58lcqt5y782rmf2hefjquaa6q8 Source: https://github.com/believethehype/nostrdvm
Nostr Spring Boot Starter v0.0.4
Nostr Spring Boot Starter is a framework for building Nostr-based applications with Spring Boot. This release introduces key updates, including support for Repost Events (NIP18), Nostr URI scheme (NIP21), and Relay List Metadata (NIP65). It also adds a new nostr-persona module and improves connection timeouts. Some breaking changes in method signatures for relay and event handling are included, making this update crucial for developers looking to take full advantage of the latest Nostr features.
Developed by: npub1zcuquyvd78s5le34gkq2uxjhq2xuh92wldddjjxkeldzp9ss6lrsa88ezf Source: https://github.com/theborakompanioni/nostr-spring-boot-starter
Nostr PHP v1.5.2
Nostr PHP is a PHP library designed for Nostr-based applications. This release addresses a critical issue with the gmp_pow method in the phpecc package, fixing the bug reported in PHP issue #16870. The update improves stability and compatibility, ensuring smoother functionality for developers using the package. Developed by: npub1qe3e5wrvnsgpggtkytxteaqfprz0rgxr8c3l34kk3a9t7e2l3acslezefe Source: https://github.com/nostrver-se/nostr-php
🔥 Community Highlights
🎙️ Thank For Nostr Podcast Highlights
npub1q6mcr8tlr3l4gus3sfnw6772s7zae6hqncmw5wj27ejud5wcxf7q0nx7d5, a Sovereign Engineering alum, OpenSats grantee, and Nostr developer. Also highlighted is npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn, the creator of the Coracle Nostr client and an OpenSats grantee. npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn focuses on designing healthier social networks and advancing this vision through Nostr. In the latest episode of the Thank For Nostr Podcast, npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn shares insights into his vision for a decentralized and meaningful social network, the principles guiding this work, and the role of Coracle in making it a reality. The podcast is produced by TGFB Media, an organization dedicated to educating Christians on Bitcoin’s potential for the glory of God and the good of humanity.
🌱 Ecosystem Growth
Nostr is growing fast! There are now over 45 Nostr clients, and relays are running in more than 40 countries around the globe.
During this week: Total zaps: 3,945,943 , compared to 3,909,750 zaps the week before Total posts: 441,169,786 , compared to 434,841,953 posts the week before Profiles with bio users: 8,133,703 , compared to 7,763,964 Profiles with bio users the week before
Many thanks to stats.nostr.band by npub1xdtducdnjerex88gkg2qk2atsdlqsyxqaag4h05jmcpyspqt30wscmntxy for providing these insights.
🎓 Educational Resources
No updates this week. If you have some input for the next recap about recent educational resources, please share it and I will add it in the next recap.
📅 Upcoming Events
Nostr at Tech Tuesday
📅 Date: Tuesday, December 17, 2024 - 7 PM – late EST 📍 Location: Seats2meet.com Utrecht CS, The Netherlands 🤹♀️ Organizers: npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft, npub1qe3e5wrvnsgpggtkytxteaqfprz0rgxr8c3l34kk3a9t7e2l3acslezefe and npub1w98ems6ryhpv7zvmhwp5sv65p0pwrnvzw4lucn0ch776qan9ntdstscwpx 🔗 Tech Tuesday
Join npub1hw6amg8p24ne08c9gdq8hhpqx0t0pwanpae9z25crn7m9uy7yarse465gr at Tech Tuesday for an insightful session on Nostr, covering Epoxy (a framework for integrating technologies), Tollgate (a checkpoint mechanism for validating actions), and eCash (digital cash for secure transactions) as a shared topic. Don’t miss out on this great opportunity to learn more about Nostr technologies!
📅 Date: Tuesday, December 17, 2024 - 6:30 PM – 9:00 PM
📍 Location: Toronto, ON 🤹♀️ Organizer: npub1ek36rza32zjc8pec8daz6veyywv55xtemzaxr0saymd04a4r66eqpxphdl 🔗 https://www.meetup.com/blockchain-developers-canada/events/304910752 This beginner-friendly meetup will be a tutorial that will teach participants to create Nostr accounts, send and query events, send encrypted events, and obtain a Nostr Internet Identifier. The session will be in JavaScript, and attendees are encouraged to install Node.js and Git beforehand.
FOSDEM 2025
📅 Date: Saturday, Sunday, February 1–2, 2025 - CET 📍 Location: Brussels, Belgium 🤹♀️ Organizers: npub1qe3e5wrvnsgpggtkytxteaqfprz0rgxr8c3l34kk3a9t7e2l3acslezefe, npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft , pub1hz5alqscpp8yjrvgsdp2n4ygkl8slvstrgvmjca7e45w6644ew7sewtysa , npub1nkmta4dmsa7pj25762qxa6yqxvrhzn7ug0gz5frp9g7p3jdscnhsu049fn , npub1r30l8j4vmppvq8w23umcyvd3vct4zmfpfkn4c7h2h057rmlfcrmq9xt9ma 🔗 Fosdem
FOSDEM is one of the biggest gatherings for open-source developers and enthusiasts worldwide, taking place each year in Brussels. It’s a free, community-driven event where thousands of devs, innovators, and Free and Open Source Software contributors come together to demo projects, host talks, and share ideas. It’s a key place for making meaningful connections, learning from each other, and pushing open-source tech forward.
For NOSTR being at FOSDEM is a natural fit. It’s the perfect stage to introduce the broader open-source community to Nostr’s potential—how it can replace centralized social platforms, bring true ownership of data back to users, and encourage a more resilient, open internet. Engaging with fellow open-source projects and developers at FOSDEM helps Nostr grow its ecosystem, fosters new collaborations, and gains valuable feedback. The protocol is all about grassroots development, community contributions, and evolving without the constraints of centralized platforms, which aligns perfectly with FOSDEM’s collaborative spirit.
📰 Nostr in the Media
NOSTR How and Why It Works
The Nostr protocol is transforming the way we think about social media by combining Bitcoin's cryptographic principles with decentralized communication. This innovative approach enables censorship-resistant platforms, offering users unparalleled freedom, privacy, and ownership in the digital age.
Speakers: npub147whqsr5vsj86x0ays70r0hgreklre3ey97uvcmxhum65skst56s30selt (YakiHonne), npub1c878wu04lfqcl5avfy3p5x83ndpvedaxv0dg7pxthakq3jqdyzcs2n8avm (LNbits, Nostr, Makerbits), npub1j8y6tcdfw3q3f3h794s6un0gyc5742s0k5h5s2yqj0r70cpklqeqjavrvg (BTCPayServer), npub1t6jxfqz9hv0lygn9thwndekuahwyxkgvycyscjrtauuw73gd5k7sqvksrw (Nostr Special Forces) Host: npub17plqkxhsv66g8quxxc9p5t9mxazzn20m426exqnl8lxnh5a4cdns7jezx0 (Nostr)
Watch the full panel discussion on YouTube : https://www.youtube.com/watch?v=5c7c7RugxiY
⚡ Most Zapped Last Week
Nostr’s Value4Value (V4V) model is all about plebs directly rewarding creators for the value they receive—no middlemen fees, no ads, just pure community-driven support using sats via the Bitcoin Lightning Network. Thanks to zaplife.lol by @pablof7z for providing this data. Here are the top zapped posts from last week, showcasing creators who received the most engagement:
🔥 Top 3: Most Zaps
- My Bitcoin recap video also on nostr 🧡 I hope you like it.
Author: npub13jhh5jpak3sltvh5mxxc84edq8c6scuyhtkevfa7j568jrkkscysj7c5sq\ Zaps Received: 206 Sats Earned: 279k\ 🔗 event:
nevent1qqst4t56y3ul3emc6gd0g78rgn4ayz8glfdzdyjc27kltyy7svl8vqcpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgqgdwaehxw309ahx7uewd3hkcqg5waehxw309aex2mrp0yhxgctdw4eju6t0qgsgetm6fq7mgc04kt6dnrvr6uksrudgvwzt4mvky7lf2drepmtgvzgapfeq8
- grateful for the time, sacrifice, and dedication of all the bitcoin developers around the world.
Author: npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m Zaps Received: 121\ Sats Earned: 118k 🔗 event: nevent1qqs2c3pvyc62pna2cp8dsh457e4qjz5lzamwgjswaa97n0y3wg4fjwqpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgqglwaehxw309a3ksmmjw4ejumtfddjkg6tvvajhytnrdakn5dp5xspzpq35r7yzkm4te5460u00jz4djcw0qa90zku7739qn7wj4ralhe4z6a79m6
- What Bitcoin Did is Back!
Author: npub16le69k9hwapnjfhz89wnzkvf96z8n6r34qqwgq0sglas3tgh7v4sp9ffxj\ Zaps Received: 79 Sats Earned: 17k 🔗 event:
nevent1qqsfq2cmyvxw94f7y08r3rd5ja2p20jju3lqtkft4zm492m0cpgsn7qpp4mhxue69uhkummn9ekx7mqppamhxue69uhkummnw3ezumt0d5pzp4ln5tvtwa6r8ynwyw2ax9vcjt5y0858r2qqusqlq3lmpzk30uetcepnf3
💰 Top 3: Most Sats
- My Bitcoin recap video also on nostr 🧡 I hope you like it.
Author: npub13jhh5jpak3sltvh5mxxc84edq8c6scuyhtkevfa7j568jrkkscysj7c5sq\ Sats Earned: 279k\ Zaps Received: 206\ 🔗 event : nevent1qqst4t56y3ul3emc6gd0g78rgn4ayz8glfdzdyjc27kltyy7svl8vqcpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgqgdwaehxw309ahx7uewd3hkcqg5waehxw309aex2mrp0yhxgctdw4eju6t0qgsgetm6fq7mgc04kt6dnrvr6uksrudgvwzt4mvky7lf2drepmtgvzgapfeq8
- 6 months ago I decided to try to get into a professional Muay Thai Fight 👀🥊
Author: npub1lelkh3hhxw9hdwlcpk6q9t0xt9f7yze0y0nxazvzqjmre3p98x3sthkvyz Sats Earned: 196k\ Zaps Received: 51\ 🔗 event :
nevent1qqst0fu00sezruj3c6xfqhcreegcmjdk75s8zyeh0y5xzsgutwpmx9szyrl8767x7uecka4mlqxmgq4duev48cst9u37vm5fsgztv0xyy5u6xft2c62
- Author: npub126erv2p9an0a56d8qq3a2406xkh5qal7am0n4yp84r8ekz2cs7msj8wetv Sats Earned: 127k Zaps Received: 16 🔗 event :
nevent1qqs8ww46c3xukvwfcz6vlfu62dnzg62czpgm38udygvnd54j2uqspmgpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgq3q26erv2p9an0a56d8qq3a2406xkh5qal7am0n4yp84r8ekz2cs7msvk63pr
👋 Stay in Touch & Zap
Nostr is built by the plebs, for the plebs. If you found this recap helpful, consider supporting me—Nomishka—with a zap. Right now, I’m in a tough spot: jobless and struggling to make ends meet. Most days, I’m barely able to afford food, and honestly, 210,000 sats per month would help provide a basic income to cover essential needs.
I’m committed to supporting Nostr, and I split a part of the zaps I receive for this note with the plebs mentioned in this recap for all their great effort. Thank you so much for being part of this journey. Let me know your thoughts about this first recap, share your tips and suggestions for the next weekly recap, and let’s keep #grownostr together.
Recap by npub19hs0lg9vyd0lghayeju5fnflx0melawjrl8etuqln9gkhd4mwtxq2t5jcn
-
@ ac8bb9b0:70278acc
2024-11-12 19:55:33Details
- ⏲️ Prep time: 10
- 🍳 Cook time: 45
- 🍽️ Servings: 16
Ingredients
- 1/4 cup light brown sugar
- 1/4 cup granulated sugar
- 1 tablespoon ground cinnamon
- 1 teaspoon salt
- 1 pound unsalted pecans halves
- 1 egg white
- 1/2 teaspoon vanilla extract
- 1 teaspoon water
Directions
- Preheat oven to 300 degrees F. Line a large baking sheet with parchment paper and set aside.
- In a bowl, add sugars, cinnamon, and salt. Whisk until combined. Set aside.
- In a large bowl, whisk the egg white, vanilla, and water together until frothy. Add the pecans and gently toss until the pecans are well coated. Add the sugar and cinnamon mixture and toss until pecans are covered.
- Spread the pecans out in a single layer on prepared baking sheet. Bake for about 30-45 minutes, stirring every 15 minutes.
- Remove from the oven and let the pecans cool on the baking sheet. When completely cool, store in an airtight container for up to 1 month.
-
@ dff95033:862fbf40
2024-12-09 22:42:32DADOS BIBLIOGRÁFICOS
- Autor: Daniel J. Levitin
- Título: A Mente Organizada: Como Pensar com Clareza na Era da Sobrecarga de Informação
- Título Original: The Organized Mind: Thinking Straight in the Age of Information Overload
- Tradutor: Regina Lyra
- Editora: Objetiva
- Ano de Publicação no Brasil: 2015
- Ano de Publicação Original: 2014
- ISBN (Edição Brasileira): 978-8539006465
- Páginas: 512
- Gênero: Psicologia, Ciência Cognitiva, Desenvolvimento Pessoal
INTRODUÇÃO
"Não se pode confiar na memória porque o sistema de arquivamento do cérebro destreinado é uma porcaria. Ele pega tudo que acontece com você e joga de qualquer jeito num grande armário escuro — quando você entra lá procurando algo, só consegue achar as coisas grandes e óbvias, como a morte de sua mãe, ou então coisas de que realmente não precisa. Coisas que você não está procurando, como a letra de ‘Copacabana’. Você não consegue encontrar o que precisa. Mas não entre em pânico, porque ainda está lá.” (The Mentalist, citado por Daniel Levitin em A Mente Organizada)
Quando me deparei com o livro “A Mente Organizada”, de Daniel Levitin, impulsivamente o adicionei à minha lista de leitura — apenas para deixá-lo esperando por meses. É irônico que um livro sobre organização estivesse preso no caos da minha própria lista, não estranhamente em uma era dopamínica — onde cada notificação e distração competem para roubar nossa atenção. No entanto, ao finalmente mergulhar em suas linhas, percebi que a obra é uma verdadeira ode à capacidade humana de organizar o conhecimento e a informação.
ESTRUTURA E CONTEÚDO
Dividido em três partes, “A Mente Organizada” nos guia por um entendimento prático sobre a mente humana. A Parte Um apresenta o mecanismo de atenção do cérebro, explorando como ele lida com o fluxo incessante de informações e decisões. Levitin discute a importância da atenção e como ela é fundamental para processar a quantidade massiva de dados que enfrentamos diariamente. Ele argumenta que entender esses mecanismos é crucial para melhorar nossa capacidade de foco e eficiência.
A Parte Dois oferece estratégias que colaboram com esse mecanismo, ajudando a organizar nossos ambientes físico, profissional, social e temporal. Levitin sugere métodos práticos, como a categorização e a criação de listas, que podem facilitar a tomada de decisões e reduzir a sensação de sobrecarga informacional. A ênfase na organização do espaço físico e do tempo é particularmente relevante em uma era onde distrações são constantes. Com a estrutura bem definida, Levitin avança para aprofundar seu estilo e explorar a complexidade de transmitir conceitos desafiadores de maneira acessível.
Por fim, a Parte Três discute como preparar a próxima geração para enfrentar os desafios do mundo moderno, equilibrando organização e criatividade. Levitin enfatiza a importância da educação em habilidades organizacionais desde cedo, preparando os jovens para um futuro onde o gerenciamento eficaz da informação será ainda mais crítico. Essa abordagem não apenas prepara os jovens para um futuro de desafios, mas também nos faz refletir sobre o legado que estamos construindo hoje.
ESTILO E APROFUNDAMENTO
A verbosidade de Levitin pode parecer desafiadora em alguns momentos, mas são nestes pontos que reside o valor do livro. Sua escrita flui como ondas: ora simples e objetiva, ora densa e desafiadora. Essa variação mantém o leitor engajado e instigado, permitindo uma compreensão mais profunda dos conceitos apresentados. Cada nuance tem seu propósito, oferecendo ao leitor as bases para compreender plenamente a obra ou para instigar novas inspirações e perspectivas.
Levitin se esforça para tornar pesquisas e estudos sobre o tema acessíveis a um público amplo, evitando tanto a superficialidade quanto a complexidade excessiva. Essa abordagem é especialmente valiosa em um contexto onde muitos textos acadêmicos podem se tornar herméticos.
REFLEXÕES PESSOAIS
Como frisei no decorrer deste livro, o princípio fundamental da organização, o mais crucial para evitar que percamos ou esqueçamos as coisas, é este: descarregue do cérebro para o mundo externo o ônus de organizar." (A Mente Organizada, Daniel Levitin).
Ler A Mente Organizada foi um desafio que me obrigou a encarar a zorra informacional do dia a dia de frente. Não foi apenas uma leitura, mas um embate com os meus próprios hábitos e uma pausa necessária para questionar: estou realmente lidando bem com os estímulos ao meu redor? À deriva em águas turbulentas, precisei aceitar, com humildade, as ferramentas oferecidas pelo livro para enfrentar os desafios atuais.
Senti-me provocado a observar com mais atenção tudo o que carrego, tanto física quanto mentalmente. Quantas ideias, compromissos e pensamentos acumulados passam despercebidos, sem nunca encontrar um lugar ou um significado real? Esse convite à introspecção foi um lembrete poderoso de que, mais do que organizar o que está fora, preciso organizar o que está dentro — e isso começa com um olhar honesto, e sim, doloroso, sobre o impacto que o excesso tem em minha vida.
Esse foi o verdadeiro desafio: perceber que minha forma de organização precisava de um novo olhar. Não basta apenas acumular ideias; é essencial dar-lhes estrutura, conectá-las e transformá-las em algo maior — ou descartá-las, quando necessário. Entender as miríades que moldam meu pensar e agir foi fundamental, e, neste ponto, o livro foi nada menos que revelador. A estética, o particionamento e o naturalismo solidificam as minhas bases, transformando a organização em algo mais do que uma sistemática: ela se torna uma expressão de qualidade de vida e saúde.
CONCLUSÃO
A Mente Organizada é uma obra que, para alguns, será apenas um folhetim, enquanto para outros será um verdadeiro manancial de sabedoria. Mas, acima de tudo, o que Daniel Levitin nos oferece são possibilidades — um convite à lapidação dessa gema preciosa e instigante que é a busca por sermos melhores do que somos hoje. Se você chegou a este livro, consciente ou não, já deu o primeiro passo nessa jornada.
Assim, caro leitor, deixo em tuas mãos esta obra, singela em proposta, mas grandiosa em potencial. Que ela inspire sua apreciação e, acima de tudo, seu uso.
Fecho esta gaveta aqui e espero ter apreciado o que há dentro dela — ou não. Se trouxe alguma ordem à bagunça, compartilhe e, se puder, contribua com o café — porque até a organização precisa de combustível.
-
@ 9349d012:d3e98946
2024-11-05 00:42:37Chef's notes
2 cups pureed pumpkin 2 cups white sugar 3 eggs, beaten 1/2 cup olive oil 1 tablespoon cinnamon 1 1/2 teaspoon baking powder 1 teaspoon baking soda 1/2 teaspoon salt 2 1/4 cups flour 1/4 cup chopped pecans
Preheat oven to 350 degrees Fahrenheit. Coat a bread pan with olive oil. Mix all ingredients minus nuts, leaving the flour for last, and adding it in 2 parts. Stir until combined. Pour the batter into the bread pan and sprinkle chopped nuts down the middle of the batter, lenghtwise. Bake for an hour and ten minutes or until a knife insert in the middle of the pan comes out clean. Allow bread to cool in the pan for five mintes, then use knife to loosen the edges of the loaf and pop out of the pan. Rest on a rack or plate until cool enough to slice. Spread bread slices with Plugra butter and serve.
https://cookeatloveshare.com/pumpkin-bread/
Details
- ⏲️ Prep time: 30 minutes
- 🍳 Cook time: 1 hour and ten minutes
- 🍽️ Servings: 6
Ingredients
- See Chef's Notes
Directions
- See Chef's Notes
-
@ 18bdb66e:82eb5e5d
2024-11-04 23:38:03Chef's notes
This recipe needs to sit in the refrigerator at least one hour, or overnight prior to baking. Link sausage may be used but casing must be removed prior to frying.
Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4-6
Ingredients
- 1 lb breakfast sausage
- 1 large onion, chopped
- 1 green bell pepper
- Cooking spray
- 4 cups dehydrated/dried bread cubes
- 6 large eggs
- 1 1/2 cups milk
- 1/4 tsp salt (optional)
- 1/4 tsp black pepper
- 1 cup shredded Cheddar cheese
Directions
- Spray 13x9 baking dish with cooking spray, like PAM.
- Crumble sausage into a skillet, fry breaking up pieces
- Add onion to the sausage
- Chop bell pepper, add to sausage and onion, fry until tender
- Remove from heat, drain if needed, set aside.
- Spread bread cubes on bottom of baking dish
- Spoon sausage mixture over bread
- Blend eggs, milk, salt, and pepper in a bowl or large measuring cup.
- Pour egg mixture over sausage and bread.
- Cover and place in refrigerator.
- Refrigerate at least one hour or overnight.
- Preheat oven to 375F.
- Place casserole in oven, bake 55 minutes
- Top with cheese and bake 5 minutes longer.
- Let rest 10 minutes before cutting.
-
@ 6389be64:ef439d32
2024-12-09 22:34:00Resilience is the ability to withstand shocks, adapt, and bounce back. It’s an essential quality in nature and in life. But what if we could take resilience a step further? What if, instead of merely surviving, a system could improve when faced with stress? This concept, known as anti-fragility, is not just theoretical—it’s practical. Combining two highly resilient natural tools, comfrey and biochar, reveals how we can create systems that thrive under pressure and grow stronger with each challenge.
Comfrey: Nature’s Champion of Resilience
Comfrey is a plant that refuses to fail. Once its deep roots take hold, it thrives in poor soils, withstands drought, and regenerates even after being cut down repeatedly. It’s a hardy survivor, but comfrey doesn’t just endure—it contributes. Known as a dynamic accumulator, it mines nutrients from deep within the earth and brings them to the surface, making them available for other plants.
Beyond its ecological role, comfrey has centuries of medicinal use, earning the nickname "knitbone." Its leaves can heal wounds and restore health, a perfect metaphor for resilience. But as impressive as comfrey is, its true potential is unlocked when paired with another resilient force: biochar.
Biochar: The Silent Powerhouse of Soil Regeneration
Biochar, a carbon-rich material made by burning organic matter in low-oxygen conditions, is a game-changer for soil health. Its unique porous structure retains water, holds nutrients, and provides a haven for beneficial microbes. Soil enriched with biochar becomes drought-resistant, nutrient-rich, and biologically active—qualities that scream resilience.
Historically, ancient civilizations in the Amazon used biochar to transform barren soils into fertile agricultural hubs. Known as terra preta, these soils remain productive centuries later, highlighting biochar’s remarkable staying power.
Yet, like comfrey, biochar’s potential is magnified when it’s part of a larger system.
The Synergy: Comfrey and Biochar Together
Resilience turns into anti-fragility when systems go beyond mere survival and start improving under stress. Combining comfrey and biochar achieves exactly that.
-
Nutrient Cycling and Retention
Comfrey’s leaves, rich in nitrogen, potassium, and phosphorus, make an excellent mulch when cut and dropped onto the soil. However, these nutrients can wash away in heavy rains. Enter biochar. Its porous structure locks in the nutrients from comfrey, preventing runoff and keeping them available for plants. Together, they create a system that not only recycles nutrients but amplifies their effectiveness. -
Water Management
Biochar holds onto water and releases it slowly during dry periods. This makes soil not just drought-resistant but actively water-efficient, improving over time with each rain and dry spell. -
Microbial Ecosystems
Comfrey enriches soil with organic matter, feeding microbial life. Biochar provides a home for these microbes, protecting them and creating a stable environment for them to multiply. Together, they build a thriving soil ecosystem that becomes more fertile and resilient with each passing season.
Resilient systems can withstand shocks, but anti-fragile systems actively use those shocks to grow stronger. Comfrey and biochar together form an anti-fragile system. Each addition of biochar enhances water and nutrient retention, while comfrey regenerates biomass and enriches the soil. Over time, the system becomes more productive, less dependent on external inputs, and better equipped to handle challenges.
This synergy demonstrates the power of designing systems that don’t just survive—they thrive.
Lessons Beyond the Soil
The partnership of comfrey and biochar offers a valuable lesson for our own lives. Resilience is an admirable trait, but anti-fragility takes us further. By combining complementary strengths and leveraging stress as an opportunity, we can create systems—whether in soil, business, or society—that improve under pressure.
Nature shows us that resilience isn’t the end goal. When we pair resilient tools like comfrey and biochar, we unlock a system that evolves, regenerates, and becomes anti-fragile.
By designing with anti-fragility in mind, we don’t just bounce back, we bounce forward.
originally posted at https://stacker.news/items/802554
-