-

@ f1597634:c6d40bf4
2024-10-02 09:00:59
E aí, galera do Nostr! Já pensou em como proteger sua privacidade nesse mundo descentralizado? A gente sabe que a liberdade é daora, mas é importante saber como se proteger dos "bisbilhoteiros" que estão sempre à espreita.
**O perigo das fotos:**
- Sabia que as fotos que você posta podem dar muitas informações sobre você? É tipo deixar um mapa do tesouro nas mãos de alguém!
- Pessoal mau intencionadas podem usar essas fotos para descobrir onde você mora, qual seu IP e até mesmo sua identidade!
**Dicas para se proteger:**
- **Escolha seus apps com cuidado:** Nem todos os apps são iguais. Procure aqueles que a galera mais confia e que têm uma boa fama.
- **Ajuste as configurações:** A maioria dos apps tem configurações de privacidade. Mexa nelas para mostrar só o que você quiser para os outros.
- **Cuidado com links:** Não clique em qualquer link que você receber. Pode ser uma armadilha!
Uma boa prática ao navegar pelo Nostr é configurar um Proxy *confiável* no seu aplicativo. No Nostrudel por exemplo é possível configurar um proxy de imagem através das [configurações](https://nostrudel.ninja/#/settings/performance).
<img src="https://blossom.primal.net/d6f191331248dc5cc3e8617c0f94e2a2e44341451e0ec3275cc22b5195ccbdb3.jpg">
**Segundo análise, as redes a seguir ja disponibilizam esses proxies por padrão:**
- Amethyst
- Damus
\
**O que é esse tal de proxy?**
- Imagina que você está usando uma máscara. O proxy é tipo essa máscara, só que para o seu IP. Assim, ninguém vai saber quem você é de verdade.
- É como se você estivesse usando um disfarce para navegar pela internet!
**Outras dicas:**
- **Remover Exif:** Todas as fotos que tiramos possuem metadados, normalmente redes sociais e outras empresas removem esses dados quando recebem a imagem no servidor *(eventualmente pegam os dados)*.
Programas como [ExifCleaner](https://exifcleaner.com) removem essas informações antes do upload.
**Conclusão:**
A internet é um lugar incrível, mas também pode ser perigoso. Seguindo essas dicas, você vai poder curtir o Nostr com mais tranquilidade e sem se preocupar com os "bisbilhoteiros".
**Lembre-se:** A segurança é coisa séria! Compartilhe esse guia com seus amigos e ajude a criar uma comunidade mais segura.
**E aí, curtiu?**
**fonte: [https://victorhugo.info/artigos/nostr-como-se-proteger-1](https://victorhugo.info/artigos/nostr-como-se-proteger-1)**
-

@ a95c6243:d345522c
2024-12-13 19:30:32
*Das Betriebsklima ist das einzige Klima,* \
*das du selbst bestimmen kannst.* \
*Anonym*
**Eine Strategie zur Anpassung an den Klimawandel** hat das deutsche Bundeskabinett diese Woche [beschlossen](https://www.bundesregierung.de/breg-de/aktuelles/klimaanpassungsstrategie-2024-2324828). Da «Wetterextreme wie die immer häufiger auftretenden Hitzewellen und Starkregenereignisse» oft desaströse Auswirkungen auf Mensch und Umwelt hätten, werde eine Anpassung an die Folgen des Klimawandels immer wichtiger. «Klimaanpassungsstrategie» nennt die Regierung das. 
**Für die «Vorsorge vor Klimafolgen» habe man nun erstmals** klare Ziele und messbare Kennzahlen festgelegt. So sei der Erfolg überprüfbar, und das solle zu einer schnelleren Bewältigung der Folgen führen. Dass sich hinter dem Begriff Klimafolgen nicht Folgen des Klimas, sondern wohl «Folgen der globalen Erwärmung» verbergen, erklärt den Interessierten die Wikipedia. Dabei ist das mit der [Erwärmung](https://transition-news.org/studie-ozeane-kuhlen-die-erde-viel-starker-als-gedacht) ja bekanntermaßen so eine Sache.
**Die Zunahme schwerer Unwetterereignisse habe gezeigt,** so das Ministerium, wie wichtig eine frühzeitige und effektive Warnung der Bevölkerung sei. Daher solle es eine deutliche Anhebung der Nutzerzahlen der sogenannten Nina-Warn-App geben.
**Die** ***ARD*** **spurt wie gewohnt** und setzt die Botschaft zielsicher um. Der Artikel [beginnt](https://www.tagesschau.de/inland/innenpolitik/klima-anpassung-warnapp-100.html) folgendermaßen:
> «Die Flut im Ahrtal war ein Schock für das ganze Land. Um künftig besser gegen Extremwetter gewappnet zu sein, hat die Bundesregierung eine neue Strategie zur Klimaanpassung beschlossen. Die Warn-App Nina spielt eine zentrale Rolle. Der Bund will die Menschen in Deutschland besser vor Extremwetter-Ereignissen warnen und dafür die Reichweite der Warn-App Nina deutlich erhöhen.»
**Die Kommunen würden bei ihren «Klimaanpassungsmaßnahmen»** vom Zentrum KlimaAnpassung [unterstützt](https://zentrum-klimaanpassung.de/ueber-uns), schreibt das Umweltministerium. Mit dessen Aufbau wurden das Deutsche Institut für Urbanistik gGmbH, welches sich stark für [Smart City-Projekte](https://difu.de/taxonomy/term/2083) engagiert, und die Adelphi Consult GmbH beauftragt.
**Adelphi** **[beschreibt](https://adelphi.de/de)** **sich selbst als «Europas führender Think-and-Do-Tank** und eine unabhängige Beratung für Klima, Umwelt und Entwicklung». Sie seien «global vernetzte Strateg\*innen und weltverbessernde Berater\*innen» und als «Vorreiter der sozial-ökologischen Transformation» sei man mit dem Deutschen Nachhaltigkeitspreis ausgezeichnet worden, welcher sich an den Zielen der Agenda 2030 orientiere.
**Über die** **[Warn-App](https://www.bbk.bund.de/DE/Warnung-Vorsorge/Warn-App-NINA/warn-app-nina_node.html)** **mit dem niedlichen Namen Nina,** die möglichst jeder auf seinem Smartphone installieren soll, informiert das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). Gewarnt wird nicht nur vor Extrem-Wetterereignissen, sondern zum Beispiel auch vor Waffengewalt und Angriffen, Strom- und anderen Versorgungsausfällen oder Krankheitserregern. Wenn man die Kategorie Gefahreninformation wählt, erhält man eine Dosis von ungefähr zwei Benachrichtigungen pro Woche.
**Beim BBK erfahren wir auch einiges über die empfohlenen** **[Systemeinstellungen](https://www.bbk.bund.de/DE/Warnung-Vorsorge/Warn-App-NINA/Einstellungen-Android/einstellungen-android_node.html)** für Nina. Der Benutzer möge zum Beispiel den Zugriff auf die Standortdaten «immer zulassen», und zwar mit aktivierter Funktion «genauen Standort verwenden». Die Datennutzung solle unbeschränkt sein, auch im Hintergrund. Außerdem sei die uneingeschränkte Akkunutzung zu aktivieren, der Energiesparmodus auszuschalten und das Stoppen der App-Aktivität bei Nichtnutzung zu unterbinden.
**Dass man so dramatische Ereignisse wie damals im Ahrtal auch anders bewerten kann** als Regierungen und Systemmedien, hat meine Kollegin Wiltrud Schwetje anhand der Tragödie im spanischen [Valencia](https://transition-news.org/valencia-zehn-tage-nach-der-katastrophe-warten-viele-menschen-immer-noch-auf) gezeigt. Das Stichwort «Agenda 2030» taucht dabei in einem Kontext auf, der wenig mit Nachhaltigkeitspreisen zu tun hat.
***
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/vorsorge-vor-klimafolgen)* erschienen.
-

@ 592295cf:413a0db9
2024-12-07 07:21:39
Week 02-11
- Nsite zap by hzrd149
[Support page](https://npub1wyuh3scfgzqmxn709a2fzuemps389rxnk7nfgege6s847zze3tuqfl87ez.nsite.lol/#/support)
## Content creator want more users. They can go to Bluesky.
Great that Nostr is a Echo Chambers. As stated by Rabble during NostRiga, Nostr is a bitcoin meetup. And it is very difficult as said several times, to subvert this fact.
It seems that many bitcoiners don't like this, but they can't do anything, leave Nostr and migrate to other lids.
## I'm reading Nostr adventar calendar of Japanese Nostr users.
The first two Don and Jun speak of a Mahjong game and the other of how possibly to count the followers of a given account, countfollowed.
- [Adventar calendar](https://adventar.org/calendars/10004)
continue until Christmas 🎅
- Even Bluesky is looking at MLS , is not a soccer league, is a protocol for message by groups, "circles"
[Post on Bluesky](https://bsky.app/profile/soatok.bsky.social/post/3lc4gt4mywc2z)
- Relays chakany is introduce sunday. [link](https://relay.chakany.systems/)
I've never seen such dead animals as in Nostr. Something reminds me facebook. The carnivore folks
## Hivemind podcast by Max, the kilometric comment on fountain under the podcast is the most appetizing thing of all. Just one comment, little one.
He interviewed Kagi's and searched for a brownie pill, perhaps caused a little headache. ( Brownie pill is orange plus purple)
-----------
Loss dog on Nostr this week 😔😔 Pam and Derek family dog
conspiracy theory: Fiatjaf was the reply guy!!!
I tried to download voyage, from zapstore but nothing does not work even the 17.1 does not go. Too bad.
I hear so much about notedeck that I want to make a notedeck do it yourself.
Cherry tree, stuck hzrd149 is making an app a day, Chunked blobs on blossom.
A like is used to send your writing Relays
Announcement of a possible wallet in Damus, this could make things better, zap and whatnot.
-----------
- Or I'm posting a song here, a musical interlude.
[song on wavlake](https://wavlake.com/album/87dfa3dc-b921-4a4b-8bfc-f60479cec364)
-----------
There seems to be a good buzz on Nostr, maybe it's already a Christmassy atmosphere.
- Backup di Bluesky cool things
[Bluesky post](https://bsky.app/profile/filippo.abyssdomain.expert/post/3lcfdsv2hec2a)
-----------
On another rssfeed thing.
nostr:nevent1qvzqqqqqqypzq9h35qgq6n8ll0xyyv8gurjzjrx9sjwp4hry6ejnlks8cqcmzp6tqqs93j2remdw2pxnctasa9vlsaerrrsl7p5csx5wj88kk0yq977rtdqxt7glp
### It's the same thing as following a cross de bridge, but if they do 3 bridge, I say something is wrong. A bot is attached to a Relay. The Relay goes down and so much greetings, then I can look for RSS feeds in my computer without need of Nostr. I can share a particular opml file on Nostr, but I don't know how to do it I asked Fiatjaf but didn't answer it was taken by dichotomie.
### Nip19 really Easy to do filter query.
You have events_id pubkey Relay
Instead with Nostr:note you only have the event_id.
- Sebastix says he has to implement it in his library, discover the latest weekly report.
[nostr-php-helper-library](https://nostrver.se/blog/nostr-php-helper-library-90-day-opensats-report-2)
-----------
Oh no Pablo has become super Saiyan 🤣
## There is a way to make a podcast starting from a long text, blog. With artificial intelligence. But then I thought, but if one does not have time could not have the text of the article summarized, perhaps we like generating content. It can be an option, either you read or you listen. But if you do not have time perhaps it is better to just summarize, dear chatgpt summarize this text, done. Essential points and make a thread for the social network and do what you want.
- Homemade Traditional Boozy Mincemeat, I didn't even know that existed 🤙
[link to shopstr](https://shopstr.store/listing/b7fbcd4415d50dac4cc2b95cb2e73acea294a7f3040255c6f9b07a9494006b3e)
Hodlbod news on bunker burrow
nostr:nevent1qqs84na25g6mdelvl0408nnq8m29j5070dm9mvjrzxyc6yrx2udjyuczyztuwzjyxe4x2dwpgken87tna2rdlhpd02
- In case you don't see the note
[burrow on github](https://github.com/coracle-social/burrow)
Once you have the email what do you do with your encrypted key? No Enterprise user maybe. Rember the article of Hodlbod in "Is Always a political move". ✅
List of artists on Nostr
nostr:naddr1qvzqqqr4xqpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqp9qku6tdv96x7unng9grdr
- An article for food recipe on Nostr
[Article link ](https://yakihonne.com/article/naddr1qvzqqqr4gupzpn0wjs7tkxw9r2uy0fndt4m5xua2na3a9peydw6ekzp8lf0xxaqqqqxnzdenxv6nqwf3xgun2wpkyhpdxx)
### I don't know if they'll ever be there. You can write a recipe book. Or to put recipes on wiki, there doesn't seem to be that attention or that desire. One more relay is always better
- Olas has a website 🥊
[Olas app](https://olas.app/)
Oh i see cool Hodlbod bot
A summary bot
nostr:nevent1qqs0v88uc2u3he3lm3mpm5h3gr8cuht5wv9g0tk0x9hzvamgvpdjwvspzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgq3qjlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qu0ltyv
That's all!!
-

@ a95c6243:d345522c
2024-12-06 18:21:15
*Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\
dass wir Vorteile aus ihr ziehen;\
in jedem andern hegt man den Wunsch,\
dass der Unschuldige in Schutz genommen werde.\
Jean-Jacques Rousseau*
**Politiker beteuern jederzeit, nur das Beste für die Bevölkerung zu wollen** – nicht von ihr. Auch die zahlreichen unsäglichen «Corona-Maßnahmen» waren angeblich zu unserem Schutz notwendig, vor allem wegen der «besonders vulnerablen Personen». Daher mussten alle möglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
**Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener «Schutzmaßnahmen»** den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen – wie erwartet – massive Nebenwirkungen, sondern Maskentragen [schadet der Psyche](https://transition-news.org/meisterwerk-von-studie-bestatigt-maskentragen-bei-kindern-sinnlos-und-schadlich) und der Entwicklung (nicht nur unserer Kinder) und «Lockdowns und Zensur haben [Menschen getötet](https://transition-news.org/lockdowns-und-zensur-haben-menschen-getotet)».
**Eine der wichtigsten Waffen unserer «Beschützer» ist die Spaltung der Gesellschaft.** Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persönlichen [Erfahrungen als Kritikerin](https://transition-news.org/die-coronazeit-hat-mir-gezeigt-wie-die-menschen-manipuliert-werden-konnen) der Maßnahmen berichtete kürzlich eine Schweizerin im Interview mit *Transition News*. Sie sei schwer enttäuscht und verspüre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit «Geimpften».
**Menschen, die aufrichtig andere schützen wollten,** werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ärzte, darunter [Heinrich Habig](https://transition-news.org/arzte-mussten-ihr-vergehen-irgendwann-selbst-einsehen), [Bianca Witzschel](https://transition-news.org/anwalt-von-bianca-witzschel-das-ist-eindeutig-eine-politische-justiz) und Walter Weber. Über den aktuell laufenden Prozess gegen Dr. Weber hat *Transition News* mehrfach berichtet (z.B. [hier](https://transition-news.org/prozess-gegen-walter-weber-kai-kisielinski-fuhrt-mit-argumentationsfeuerwerk) und [hier](https://transition-news.org/prozess-gegen-walter-weber-tschentscher-und-schaade-doch-nicht-vor-gericht)). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-«Impfung» bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie [Alexander Bittner](https://transition-news.org/verweigerung-der-covid-impfung-inhaftierter-bundeswehrsoldat-kundigt) erfahren mussten.
[**Die eigentlich Kriminellen**](https://transition-news.org/die-eigentlich-kriminellen-schutzen-sich-vor-der-verantwortung) **schützen sich derweil erfolgreich selber,** nämlich vor der Verantwortung. Die «Impf»-Kampagne war «das größte [Verbrechen gegen die Menschheit](https://transition-news.org/das-grosste-verbrechen-gegen-die-menschheit)». Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn [Hunter](https://transition-news.org/us-steuerbehorde-hat-prasidentschaftswahl-2020-fur-joe-biden-gestohlen) möglicherweise auch [Anthony Fauci begnadigen](https://transition-news.org/wird-biden-auch-fauci-begnadigen) wird – in diesem Fall sogar präventiv. Gibt es überhaupt noch einen Rest Glaubwürdigkeit, den Biden verspielen könnte?
**Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten** und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dürfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rücken.
**Das Buch «The Real Anthony Fauci» des nominierten US-Gesundheitsministers [Robert F. Kennedy Jr.](https://transition-news.org/usa-robert-f-kennedy-jr-als-gesundheitsminister-nominiert)** erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der öffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb übrigens [Călin Georgescu](https://transition-news.org/der-ausgang-der-rumanischen-prasidentschaftswahlen-konnte-mogliche), der Überraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der [Panik im Wertewesten](https://www.euronews.com/2024/12/04/robert-f-kennedy-jr-denies-any-link-with-far-right-romanian-presidential-candidate).
**In Rumänien selber gab es gerade einen Paukenschlag:** Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die für Sonntag angesetzte Stichwahl kurzfristig abgesagt – wegen angeblicher «aggressiver russischer Einmischung». Thomas Oysmüller merkt dazu an, damit sei jetzt in der EU das [Tabu gebrochen](https://tkp.at/2024/12/06/rumaenien-sagt-praesidenten-wahl-ab/), Wahlen zu verbieten, bevor sie etwas ändern können.
**Unsere Empörung angesichts der Historie von Maßnahmen, die die Falschen beschützen** und für die meisten von Nachteil sind, müsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem «Schutz vor Desinformation und Hassrede» (sprich: [Zensur](https://transition-news.org/fuhrende-politiker-der-welt-unterzeichnen-neue-zensurerklarung-bei-un)) wird es unsere wichtigste Aufgabe sein, Gräben zu überwinden.
---
Dieser Beitrag ist zuerst auf [*Transition News*](https://transition-news.org/schutz-wem-schutz-gebuhrt) erschienen.
-

@ 6bf975a0:65de1244
2024-12-13 13:51:21
## Виртуальная и дополненная реальность

В 1968 году Айвен Сазерленд представил миру то, что принято считать первым налобным дисплеем дополненной реальности, известным как "Дамоклов меч". Это революционное изобретение заложило основу для устройств виртуальной реальности, которыми мы пользуемся сегодня.
<iframe width="560" height="315" src="https://www.youtube.com/embed/eVUgfUvP4uk?si=1_kqwoNUCCviFH7M" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
Название "Дамоклов меч" было выбрано с юмором из-за устрашающего вида устройства и шаткости его установки. Оно символизирует как потенциал, так и риски, связанные с развивающимися технологиями, отражая предвидение Сазерленда о том, как такие устройства могут повлиять на человеческий опыт.
На протяжении десятилетий технический прогресс ускорял развитие VR. В 1980-х и 1990-х годах такие компании, как Sega и Nintendo, разработали игровые системы виртуальной реальности, хотя, как правило, с ограниченным успехом. И только в 2010-х годах такие компании, как Oculus и HTC Vive, представили высококачественные VR-гарнитуры, использующие мощную графику и технологию отслеживания движений.
### Современные гарнитуры VR
Основным игроком на рынке виртуальной реальности остаётся Meta c продуктами линейки Oculus Quest. К началу 2023 года было продано более 20 миллионов таких гарнитур. В октябре 2023 года вышла новая, третья версия.
С момента запуска 10 октября 2023 года Oculus Quest 3 добился заметных успехов в продажах: по оценкам, за первые несколько месяцев было продано не менее 1 миллиона устройств. Эта цифра основана на показателях вовлеченности пользователей в игру смешанной реальности под названием "Первые встречи", в которой было зарегистрировано более миллиона завершений, что свидетельствует о широком распространении гарнитуры.
Quest 3 выпускается по цене 499 долларов, что делает ее более дорогой в сравнении с прошлой версией и, вероятно, способствует более медленным темпам продаж. Несмотря на это, первые показатели продаж Quest 3 впечатляют, учитывая разницу в цене и состояние рынка.
В начале 2024 года начались продажи Apple Vision Pro, передовой гарнитуры смешанной реальности, сочетающей в себе возможности дополненной реальности (AR) и виртуальной реальности (VR).
<iframe width="560" height="315" src="https://www.youtube.com/embed/IY4x85zqoJM?si=c1HUjF8mYSld2GBR" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
Он оснащен двумя micro-OLED-дисплеями с общим количеством пикселей более 23 миллионов, что обеспечивает разрешение более 4K для каждого глаза. Такая высокая плотность пикселей направлена на создание потрясающих визуальных впечатлений.

Гарнитура оснащена персонализированной системой Spatial Audio с двумя динамиками, расположенными возле ушей, что позволяет пользователям воспринимать звук как исходящий из окружающей среды. Система адаптирует звук в зависимости от геометрии головы пользователя, обеспечивая эффект погружения.
Vision Pro позиционируется как устройство премиум-класса по цене около 3499 долларов, что значительно выше, чем стартовая цена Oculus Quest 3, составляющая 499 долларов. Такая ценовая стратегия нацелена на другой сегмент потребителей, ориентируясь на профессионалов и энтузиастов, а не на обычных пользователей.
### Метаверс
В 2021 году слово "метавселенная" вошло в обиход, вызвав оживленную глобальную дискуссию о том, что она собой представляет, существует ли она уже сейчас и кому она будет принадлежать. Но в 2022 году у нас все еще нет общепринятого определения того, что это такое. Это было сатирически описано на технологическом сайте The Verge:
> "Возможно, вы читали, что метавселенная заменит интернет. Может быть, мы все должны жить там. Может быть, Facebook (или Epic, или Roblox, или десятки более мелких компаний) пытается захватить его. И, может быть, это как-то связано с NFT?"
В январе 2020 года автор и инвестор Мэтью Болл опубликовал наиболее часто встречающееся описание метавселенной:
> "обширная сеть постоянных 3D-миров и симуляций, отображаемых в реальном времени, которые [...] могут синхронно переживаться фактически неограниченным числом пользователей, каждый из которых обладает индивидуальным чувством присутствия".
Согласно его определению, метавселенная - это продукт или услуга, обладающая семью основными атрибутами, включая постоянство, синхронность и совместимость. Технологический стратег Бен Томпсон утверждает, однако, что это описание на самом деле недалеко от того, чем уже является интернет, только "с 3D-слоем поверх него" ([источник](https://www.weforum.org/agenda/2022/02/future-of-the-metaverse-vr-ar-and-brain-computer/)).
### Будущее метаверса
Pew Research [опросил](https://www.pewresearch.org/internet/2022/06/30/the-metaverse-in-2040/) технологических экспертов о Метаверсе к 2040 году.
54% экспертов заявили, что, по их мнению, к 2040 году метавселенная БУДЕТ гораздо более совершенным и по-настоящему полноценным, хорошо функционирующим аспектом повседневной жизни для полумиллиарда или более людей во всем мире. 46% заявили, что, по их мнению, к 2040 году метавселенная НЕ БУДЕТ гораздо более совершенным и по-настоящему полноценным, хорошо функционирующим аспектом повседневной жизни для полумиллиарда или более людей во всем мире.



## Искусственный интеллект и тотальность гиперперсонализации
Задача сейчас [заключается](https://www.forbes.com/councils/forbestechcouncil/2023/12/27/navigating-the-future-the-dynamics-of-hyper-personalization-and-ai-in-customer-experience/) в том, чтобы выйти за рамки персонализации и добиться гиперперсонализации, чтобы выделиться в шуме и обеспечить опыт, который действительно резонирует. Крайне важно признать переход от рассмотрения персонализации как уникального аргумента в пользу ее принятия в качестве фундаментальной деловой необходимости. Рассмотрение клиентского опыта как бизнес-модели, а не только стратегии, является ключевым фактором успеха в этой новой среде.
Медиаландшафт перейдет в "алгоритмическую эру", которая будет характеризоваться полностью адресной и магазинной медиасредой. Эта трансформация позволит брендам более эффективно отслеживать поведение потребителей и соответствующим образом адаптировать свои рекламные стратегии. В результате потребители получат более целенаправленную рекламу, соответствующую их интересам и предпочтениям.
Персонализация на основе ИИ повышает доходы от Paywall. Так, Business Insider использовал искусственный интеллект для оптимизации своей платной подписки. Редакция создала "умный paywall", которsq решает, какие статьи показывать за плату, а какие бесплатно, исходя из интересов каждого пользователя. Это помогло им увеличить количество платных подписок на 75%. Система анализирует, какие статьи читатель уже прочитал, с какой платформы он зашел на сайт и какие темы его интересуют.
И это только один из примеров. Все маркетологи говорят, что гиперсонализация через ИИ — совершенно неизбежный шаг. Что еще туже затягивает вокруг пользователей пузырь фильтров (filter bubble).

## Будущее социальных медиа

**Децентрализация и web 3.0**
Блокчейн, федиверс, Nostr и другие не очень очевидные на сегодня тренды
<iframe width="560" height="315" src="https://www.youtube.com/embed/TXsr8zRsObw?si=_4nc8AvLeV_jMMaH" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
Социальные медиа всё менее социальные, даже без учета сгенерированного уже в большом количестве через AI контента



## Местные и гиперлокальные медиа
Местная журналистика может эволюционировать в сторону моделей, ориентированных на сообщество, когда рассказ о событиях ведется с помощью мероприятий или интерактивных платформ, а не традиционных методов освещения событий. Такой подход может способствовать росту вовлеченности и доверия в сообществах, решая проблему упадка местных новостных изданий.
Вместо газет люди будут получать доступ к новостям через управляемые искусственным интеллектом чат-боты, курируемые электронные журналы или собрания сообществ, посвященные актуальным темам. Акцент будет сделан на доступности и вовлеченности пользователей, а не на следовании устаревшим форматам.
## Унификация платформ и перенос технологий в облако
<iframe width="560" height="315" src="https://www.youtube.com/embed/d0MYIrXtod4?si=EsIiSrIQ3vlrqYTh" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>

**Компания Meta с ее брендами Facebook, WhatsApp, Instagram признана в РФ экстремистской*
-

@ a95c6243:d345522c
2024-11-29 19:45:43
*Konsum ist Therapie.
Wolfgang Joop*
**Umweltbewusstes Verhalten und verantwortungsvoller Konsum** zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
**Heute ist also wieder mal «Black Friday»,** falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
**Warum fallen wir auf derartige Werbetricks herein** und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
**Gedankenlosigkeit und Maßlosigkeit können besonders bei der [Ernährung](https://transition-news.org/studie-208-millionen-us-amerikaner-sind-als-fettleibig-oder-ubergewichtig) zu ernsten Problemen führen.** Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
**Kritik am schwarzen Freitag und dem unnötigen Konsum** kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
**Die EU-Kommission lancierte 2015 den Begriff «Green Friday»** im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das [Pariser Abkommen](https://transition-news.org/cop29-wird-vom-geist-des-noch-kunftigen-us-prasidenten-heimgesucht) unterzeichnet werden sollte.
**Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt.** Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des [«Green New Deal»](https://transition-news.org/green-new-deal) verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um [Valencia](https://transition-news.org/flutkatastrophe-in-valencia-die-ungereimtheiten-haufen-sich) dazu sagen?
**Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020** eine «[grüne Erholung von Covid-19](https://news.un.org/en/story/2020/12/1079602), um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
**Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet** – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
**Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung** nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie [«verantwortungsvolle Risikobereitschaft»](https://transition-news.org/zuruck-zu-2008-grossbritannien-schlagt-lockere-regeln-fur-banker-boni-vor) unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/auch-beim-freitag-ist-es-egal-ob-schwarz-oder-grun)* erschienen.
-

@ a95c6243:d345522c
2024-11-08 20:02:32
*Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister Eckhart*
**Schwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung,** der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
**Mit einem bemerkenswerten [Timing](https://transition-news.org/donald-trump-grossmaul-oder-hoffnungstrager) hat die deutsche Regierungskoalition** am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer [Selbsthypnose](https://ansage.org/schwer-traumatisiert-nach-trumps-sieg-dreht-die-politmediale-linksgruene-sekte-durch/) rund um Harris-Hype und Trump-Panik – mit teils erschreckenden [Auswüchsen](https://archive.is/7tDhY). Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
**Das [Kindergarten](https://www.spiegel.de/politik/deutschland/christian-lindner-auch-die-fdp-will-wieder-einen-eigenen-wirtschaftsgipfel-abhalten-a-a8a4e868-10b1-426e-adb0-e5a6d42f7c46)-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche** war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik [«vorsätzlich herbeigeführt»](https://www.t-online.de/nachrichten/deutschland/innenpolitik/id_100522112/fdp-chef-lindner-und-sein-grundsatzpapier-die-scheidung-von-der-ampel-.html) worden seien.
**Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen.** Verkehrs- und [Digitalminister Wissing](https://transition-news.org/raus-aus-der-komfortzone-es-lohnt-sich) trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit [Jörg Kukies](https://norberthaering.de/news/joerg-kukies/) habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
**Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP,** hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
**Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können.** Das ging erst kürzlich aus dem diesjährigen [«Freiheitsindex»](https://www.schwaebische.de/politik/forscher-beim-vertrauen-in-staat-und-medien-zerreisst-es-uns-gerade-3034357) hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
**«Die absolute Mehrheit hat [absolut die Nase voll](https://archive.is/yRxwR)»,** titelte die *Bild* angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
**Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat,** kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei *Manova*. Und er kenne [Friedrich Merz](https://www.manova.news/artikel/der-kriegsgeile-blackrocker) schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
**Was also tun? Der Schweizer Verein [«Losdemokratie»](https://zeitpunkt.ch/node/40968) will eine Volksinitiative lancieren,** um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
**In jedem Fall wird es notwendig sein, unsere Bemühungen um [Freiheit und Selbstbestimmung](https://transition-news.org/alternative-medien-in-der-krise-zensur-kontrollverlust-und-die-suche-nach)** zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/es-kann-nur-besser-werden-aber-wie)* erschienen.
-

@ a012dc82:6458a70d
2024-12-13 09:20:40
**Table Of Content**
- The SEC's Dance with Bitcoin ETFs
- The Long and Winding Road to Approval
- Why the Cold Feet, SEC?
- What's Next on the Horizon?
- Conclusion
- FAQ
In the ever-evolving landscape of cryptocurrency, there's one topic that's been consistently grabbing headlines: the elusive Bitcoin ETF. As the world eagerly anticipates its introduction, the United States Securities and Exchange Commission (SEC) continues to play a game of cat and mouse, leaving investors and enthusiasts on tenterhooks. Just when the crypto community thought they were inching closer to a resolution, the SEC has decided to keep us all in suspense a little longer. So, let's unpack the latest developments and see what's in store for the future of Bitcoin ETFs.
**The SEC's Dance with Bitcoin ETFs**
For those out of the loop, the United States Securities and Exchange Commission (SEC) has been the gatekeeper for the much-anticipated Bitcoin ETF (Exchange-Traded Fund). Think of an ETF as a basket of assets, like stocks or bonds, that you can buy or sell on a stock exchange. But in this case, the asset is our beloved Bitcoin.
The idea of a Bitcoin ETF has been floating around for years, promising to bridge the gap between traditional finance and the crypto world. It would allow both everyday investors and big financial institutions to dip their toes into Bitcoin waters without the hassle of buying and holding the actual cryptocurrency.
**The Long and Winding Road to Approval**
Big financial players like BlackRock and ARK Invest have been knocking on the SEC's door, applications in hand, hoping to get the green light. But the SEC, ever the cautious guardian, has been pushing back, delaying, and asking for public comments.
Now, here's where it gets interesting. Despite the numerous applications and the growing interest from the financial community, the SEC has never approved a spot Bitcoin ETF proposal. They've been tiptoeing around the idea, starting to accept Bitcoin-related investment vehicles in 2021, but a full-fledged Bitcoin ETF? Still on the back burner.
**Why the Cold Feet, SEC?**
One might wonder why the SEC is dragging its feet. The answer? It's complicated. A Bitcoin ETF isn't just another asset; it could involve holding actual Bitcoin, making it a direct investment. This is a tad different from Bitcoin futures-linked ETFs, which the SEC seems more comfortable with.
Then there's the wild west of the crypto market in the US. With the market's volatile nature and calls for clearer regulations and oversight, the SEC is treading carefully. They're currently juggling enforcement cases against big names like Coinbase, Binance, and Ripple. So, it's safe to say they've got a lot on their plate.
**What's Next on the Horizon?**
With the SEC's recent moves, the final deadline for some Bitcoin ETF applications is now set for 2024. But, as with everything in the crypto world, predictions can be tricky. Some analysts, ever the optimists, believe there's a 65% chance of a Bitcoin ETF getting approved. But only time will tell.
What's clear is that the SEC is in a powerful position, with the crypto world eagerly awaiting its next move. As Stuart Barton aptly put it, both sides might need to bend a bit to find common ground.
**Conclusion**
The quest for a Bitcoin ETF has been nothing short of a rollercoaster ride, filled with anticipation, hope, and a fair share of suspense. As we stand at this crossroads, the journey ahead remains uncertain. But one thing is clear: the world of cryptocurrency never ceases to surprise and captivate. While we may need to temper our expectations for now, the horizon could still hold unprecedented developments for the Bitcoin ETF narrative. Here's to a future where clarity and innovation walk hand in hand!
**FAQs**
**What is a Bitcoin ETF?**
A Bitcoin ETF (Exchange-Traded Fund) is like a basket of assets available for trading on a stock exchange, with Bitcoin as the primary asset.
**Why is the SEC involved in Bitcoin ETFs?**
The SEC (Securities and Exchange Commission) is responsible for regulating and approving new financial products, including ETFs, to ensure they meet specific criteria and are safe for investors.
**Has the SEC approved any Bitcoin ETFs yet?**
As of now, the SEC has not approved any spot Bitcoin ETF proposals.
**When can we expect a decision on Bitcoin ETFs?**
The final deadline for some Bitcoin ETF applications is set for 2024.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-

@ a95c6243:d345522c
2024-10-26 12:21:50
*Es ist besser, ein Licht zu entzünden,
als auf die Dunkelheit zu schimpfen.
Konfuzius*
**Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie,** um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
**Der sächsische Landtag hat gestern die Einsetzung eines [Untersuchungsausschusses](https://transition-news.org/sachsischer-landtag-beschliesst-afd-antrag-zu-corona-untersuchungsausschuss)** zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
**In den Niederlanden wird [Bill Gates](https://transition-news.org/niederlande-bill-gates-muss-wegen-impfstoffklage-vor-gericht-erscheinen) vor Gericht erscheinen müssen.** Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
**Mit den mRNA-«Impfstoffen» von [Pfizer/BioNTech](https://transition-news.org/neues-buch-uber-pfizer-offenbart-grosstes-verbrechen-gegen-die-menschheit) befasst sich auch ein neues Buch.** Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
**Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren** als Verbundnetzwerk [Corona-Solution](https://transition-news.org/online-konferenz-corona-solution-corona-und-modrna-von-toten-lebenden-und) kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. [Gestern](https://www.csmedicus.org/de/aktuelle-konferenz/corona-und-modrna-von-toten-lebenden-und-physik-lernen/2024-10-25/) fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
**Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß,** dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
**Der vielfältige Einsatz für Aufklärung und Aufarbeitung** wird sich nicht stummschalten lassen. Nicht einmal der [Zensurmeister der EU](https://transition-news.org/deutschland-ist-der-zensurmeister-der-eu), Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
**Wo sind die Grenzen der Meinungsfreiheit?** Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder [«Volksverhetzung»](https://transition-news.org/eduard-prols-prozess-geht-in-die-nachste-runde) werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/alles-muss-ans-licht)* erschienen.
-

@ c631e267:c2b78d3e
2024-10-23 20:26:10
Herzlichen Glückwunsch zum dritten Geburtstag, liebe *Denk Bar*! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der *Denk Bar* vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. [Damals notierte ich](https://denkbar.substack.com/p/andreas-denk-bar-eroffnet):
> «Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen [«inneren Totalschaden»](https://denkbar.substack.com/p/innerer-totalschaden) hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der [Gleichschaltung](https://denkbar.substack.com/p/warum-trotzdem-dieses-handeln), das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
---
**Danke, dass du diesen Weg mit mir weitergehst!**
-

@ 3bf0c63f:aefa459d
2024-12-06 20:37:26
# início
> "Vocês vêem? Vêem a história? Vêem alguma coisa? Me parece que estou tentando lhes contar um sonho -- fazendo uma tentativa inútil, porque nenhum relato de sonho pode transmitir a sensação de sonho, aquela mistura de absurdo, surpresa e espanto numa excitação de revolta tentando se impôr, aquela noção de ser tomado pelo incompreensível que é da própria essência dos sonhos..."
> Ele ficou em silêncio por alguns instantes.
> "... Não, é impossível; é impossível transmitir a sensação viva de qualquer época determinada de nossa existência -- aquela que constitui a sua verdade, o seu significado, a sua essência sutil e contundente. É impossível. Vivemos, como sonhamos -- sozinhos..."
* [Livros mencionados por Olavo de Carvalho](https://fiatjaf.com/livros-olavo.html)
* [Antiga _homepage_ Olavo de Carvalho](https://site.olavo.fiatjaf.com "Sapientiam autem non vincit malitia")
* [Bitcoin explicado de um jeito correto e inteligível](nostr:naddr1qqrky6t5vdhkjmspz9mhxue69uhkv6tpw34xze3wvdhk6q3q80cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsxpqqqp65wp3k3fu)
* [Reclamações](nostr:naddr1qqyrgwf4vseryvmxqyghwumn8ghj7enfv96x5ctx9e3k7mgzyqalp33lewf5vdq847t6te0wvnags0gs0mu72kz8938tn24wlfze6qcyqqq823c9f9u03)
---
* [Nostr](-/tags/nostr)
* [Bitcoin](nostr:naddr1qqyryveexumnyd3kqyghwumn8ghj7enfv96x5ctx9e3k7mgzyqalp33lewf5vdq847t6te0wvnags0gs0mu72kz8938tn24wlfze6qcyqqq823c7nywz4)
* [How IPFS is broken](nostr:naddr1qqyxgdfsxvck2dtzqyghwumn8ghj7enfv96x5ctx9e3k7mgzyqalp33lewf5vdq847t6te0wvnags0gs0mu72kz8938tn24wlfze6qcyqqq823c8y87ll)
* [Programming quibbles](nostr:naddr1qqyrjvehxq6ngvpkqyghwumn8ghj7enfv96x5ctx9e3k7mgzyqalp33lewf5vdq847t6te0wvnags0gs0mu72kz8938tn24wlfze6qcyqqq823cu05y0j)
* [Economics](nostr:naddr1qqyk2cm0dehk66trwvq3zamnwvaz7tmxd9shg6npvchxxmmdqgsrhuxx8l9ex335q7he0f09aej04zpazpl0ne2cgukyawd24mayt8grqsqqqa28clr866)
* [Open-source software](nostr:naddr1qqy8xmmxw3mkzun9qyghwumn8ghj7enfv96x5ctx9e3k7mgzyqalp33lewf5vdq847t6te0wvnags0gs0mu72kz8938tn24wlfze6qcyqqq823cmyvl8h)
---
[Nostr](nostr:nprofile1qqsrhuxx8l9ex335q7he0f09aej04zpazpl0ne2cgukyawd24mayt8gpyfmhxue69uhkummnw3ez6an9wf5kv6t9vsh8wetvd3hhyer9wghxuet5fmsq8j) [GitHub](https://github.com/fiatjaf) [Telegram](https://t.me/fiatjaf) [code](https://git.fiatjaf.com)
-

@ a95c6243:d345522c
2024-10-19 08:58:08
Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
*Das [Gewissen](https://apollo-news.net/das-gewissen-in-corona-jahren-zum-tod-von-gunnar-kaiser/) regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.*
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-

@ eac63075:b4988b48
2024-12-02 02:40:18
Estonia is a small country with just 1.3 million inhabitants and an area similar to that of the state of Rio de Janeiro, but with a notable difference: while Rio has about 16 million residents, Estonia shines with its efficiency, innovation, and digitalization. It's no wonder it's known as the "digital nation." For many Brazilians, the country has become a strategic gateway to start a business and settle in Europe.
Listen the podcast
https://www.fountain.fm/episode/pizBLdhqqP5qQrKQILFb
## The Purpose of the Event and the Context
The meeting organized by Bloco and the Brazilian digital community aimed primarily to explore the opportunities that Estonia offers to those wishing to expand their businesses or start a new life in Europe. With pizza, networking, and straightforward presentations, the evening was dedicated to demystifying questions like "Why Estonia?" and "What makes this country a viable option for Brazilians?"
Additionally, the event highlighted the importance of E-Residency, a digital identity that allows you to open and manage a company in Estonia from anywhere in the world. But that's just the beginning. Let's explore what makes Estonia a standout point on the European scene.
## Where Is Estonia Located?
If you open a map of Europe and look for this small country, you're likely to have difficulty locating it. Situated to the north of what's called Eastern Europe, Estonia borders Russia and Latvia and is separated from Finland by the Baltic Sea. Although geographically positioned in the east, many Estonians prefer to identify with the north due to cultural and historical proximity to the Nordic countries.
There's something fascinating about Estonia's history. According to local legends, Vikings set out from their Estonian islands to conquer the world, later returning to reclaim their lands. This spirit of resilience and reinvention permeates the country's culture to this day.
## Digitalization: The Estonian Revolution
Thirty years ago, when Estonia gained its independence from the Soviet Union, the country decided to look to the future. The question was simple: how to ensure the sovereignty and survival of a small, vulnerable nation? The answer was bold: total digitalization.
In 2001, the X-Road was created—a decentralized infrastructure that connects all government institutions and allows citizens to access public services digitally. This system is so advanced that even the servers of the Estonian government are located outside the country, stored with backups at the European Commission in Brussels.
Through this infrastructure, Estonia eliminated information silos, decentralized data, and allowed its citizens to authorize the use of personal information with complete control. Today, 98% of the population has a digital identity, 95% file taxes online in less than three minutes, and 100% of public services are available digitally.
For those accustomed to Brazilian bureaucracy, it's impressive to know that opening a company in Estonia can be done in just 15 minutes, without the need for an accountant.
## E-Residency: A Digital Passport for Business
Launched in 2014, the E-Residency program made Estonia the first country in the world to offer a digital identity to non-residents. This digital ID card allows entrepreneurs to open a company in the European Union, sign documents, and manage businesses remotely without needing to visit the country.
Although it doesn't grant citizenship or physical residency, E-Residency is perfect for those who want to test the European market or operate a digital company. The program has already attracted over 118,000 e-residents from around the world, including 1,300 Brazilians who have opened 379 companies in the country.
## Advantages of Doing Business in Estonia
Starting a business in Estonia has many advantages. Let's discuss some of the main ones:
### **Simple and Clear Taxation:**
Estonia adopts a flat tax rate of 20% (which increased to 22% after the pandemic and will be 24% in 2025) on distributed profits. If you reinvest the profits in the company, the taxation is zero—a unique policy that encourages sustainable growth.
### **Low Cost to Start:**
Unlike Switzerland, which requires an initial deposit of 100,000 Swiss francs to open a company, in Estonia, only 2,500 euros are needed. And the best part: this amount only needs to be deposited when the company distributes profits for the first time.
### **Complete Digitalization:**
Digital signatures in Estonia eliminate the need for notaries and paper documents. Everything can be done online, from opening the company to filing taxes.
### **Support for Startups and Innovation:**
With the Startup Visa, entrepreneurs can move to Estonia with their entire family and receive support to expand their businesses. Additionally, the country has the highest number of unicorns (startups valued at over one billion dollars) per capita in the world, including companies like Skype, Bolt, and Wise.
### **Easy Access to Europe:**
Establishing your company in Estonia means access to the European market, with its unified regulations and a vibrant innovation ecosystem.
## The Startup Visa: An Invitation for Entrepreneurs
For those who want more than just operating remotely, the Startup Visa program offers the opportunity to physically move to Estonia. The initial visa is valid for one year and can be renewed for three consecutive years. After eight years, there's the possibility of applying for European citizenship, although Estonia doesn't allow dual nationality.
One of the unique features of the Startup Visa is that there's no limit to the number of partners or family members who can be included in the program. This means that the entire team of founders and their families can benefit from the residence permit.
Additionally, Estonia offers support through the International House and its Work in Estonia program, a center where newcomers can resolve everything from assistance with opening bank accounts to cultural and professional integration.
## Innovation and Access to Investments
Estonia is known for its culture of innovation. Events like Latitude 59, one of Europe's main startup gatherings, offer prizes of up to two million euros for winning startups. The country also facilitates direct connections with investment funds and venture capital, often without bureaucratic barriers.
For early-stage companies, the Estonian ecosystem is especially attractive. There are cases of entrepreneurs who managed to raise hundreds of thousands of euros with little more than a prototype or a good idea on paper.
## A Small Country with Global Ambitions
Although small in size, Estonia is big in ambition. Its model of digitalization and support for startups serves as an example to the world. With unique opportunities like E-Residency and the Startup Visa, the country positions itself as a viable and accessible gateway for Brazilians who wish to explore the European market.
For those seeking innovation, simplicity, and access to the global market, Estonia offers more than opportunities; it offers a vision of the future. Whether it's to open a business, operate remotely, or move with the family, the country proves that with the right strategies, even a small nation can make a giant impact.
-

@ c6687336:907ba3e3
2024-12-13 07:32:24
i9BET là một nền tảng giải trí trực tuyến nổi bật, mang đến cho người dùng những trải nghiệm tuyệt vời và an toàn. Với giao diện thân thiện, dễ sử dụng và những dịch vụ đa dạng, i9BET đã nhanh chóng chiếm được sự yêu mến từ cộng đồng yêu thích giải trí trực tuyến. Nền tảng này không chỉ cung cấp các trò chơi hấp dẫn mà còn chú trọng đến bảo mật và sự hài lòng của người dùng.
Một trong những điểm mạnh của **i9BET** là sự đa dạng trong các dịch vụ mà nền tảng này cung cấp. Người dùng có thể tham gia vào nhiều loại hình giải trí khác nhau, từ các trò chơi sáng tạo đến các tiện ích bổ sung khác. Mỗi dịch vụ đều được tối ưu hóa để mang lại trải nghiệm mượt mà và không gián đoạn. Hệ thống của i9BET hoạt động ổn định, giúp người dùng dễ dàng tận hưởng những phút giây thư giãn mà không gặp phải sự cố kỹ thuật. https://i9bet-online.com
Bảo mật là yếu tố quan trọng mà i9BET luôn chú trọng. Nền tảng này áp dụng công nghệ bảo mật tiên tiến để bảo vệ thông tin cá nhân và tài khoản người dùng một cách tuyệt đối. Mọi giao dịch và hoạt động trên nền tảng đều được xử lý nhanh chóng, chính xác và minh bạch, giúp người dùng hoàn toàn yên tâm khi tham gia vào các hoạt động giải trí. Với hệ thống bảo mật mạnh mẽ, i9BET cam kết mang lại một không gian giải trí an toàn và bảo mật.
Ngoài chất lượng dịch vụ, i9BET còn đặc biệt chú trọng đến sự hỗ trợ khách hàng. Đội ngũ chăm sóc khách hàng của i9BET luôn sẵn sàng giải đáp mọi thắc mắc và cung cấp sự hỗ trợ tận tâm, giúp người dùng giải quyết mọi vấn đề một cách nhanh chóng và hiệu quả. Hệ thống hỗ trợ khách hàng hoạt động 24/7, đảm bảo người dùng sẽ luôn nhận được sự trợ giúp kịp thời.
Với cam kết cung cấp dịch vụ giải trí chất lượng, bảo mật và sự hỗ trợ tận tình, i9BET là lựa chọn lý tưởng cho những ai tìm kiếm một nền tảng giải trí trực tuyến an toàn, sáng tạo và thú vị. Nền tảng này không chỉ đáp ứng mọi nhu cầu giải trí mà còn mang lại cho người dùng những giây phút thư giãn tuyệt vời.
-

@ c6687336:907ba3e3
2024-12-12 08:44:08
Cwin05 là một nền tảng giải trí trực tuyến chất lượng, nổi bật với các trò chơi đa dạng, bao gồm game bài, cá cược thể thao và nhiều loại trò chơi thú vị khác. Với mục tiêu mang đến cho người chơi những trải nghiệm giải trí đỉnh cao, Cwin05 đã tạo ra một không gian thú vị, dễ tiếp cận và hoàn toàn an toàn cho người tham gia.
Một trong những yếu tố quan trọng làm nên sự hấp dẫn của Cwin05 chính là giao diện người dùng thân thiện, dễ sử dụng. Người chơi có thể dễ dàng tham gia vào các trò chơi yêu thích mà không gặp phải bất kỳ khó khăn nào. Hệ thống thanh toán của Cwin05 cũng rất nhanh chóng và bảo mật, giúp người chơi thực hiện các giao dịch mà không lo ngại về vấn đề bảo mật. Các thông tin cá nhân và tài chính của người tham gia được mã hóa an toàn, mang lại sự yên tâm tuyệt đối.
https://cwin05-online.com
**Cwin05** không chỉ chú trọng đến chất lượng các trò chơi, mà còn đặc biệt quan tâm đến việc hỗ trợ khách hàng. Đội ngũ hỗ trợ của Cwin05 luôn sẵn sàng giải đáp mọi thắc mắc và hỗ trợ người chơi 24/7. Dịch vụ khách hàng tận tình và chuyên nghiệp là một trong những lý do khiến người chơi cảm thấy hài lòng và gắn bó lâu dài với nền tảng này. Hơn nữa, Cwin05 còn thường xuyên tổ chức các chương trình khuyến mãi hấp dẫn, mang lại cơ hội nhận thưởng cho người tham gia.
Với tất cả những tính năng nổi bật và dịch vụ chuyên nghiệp, Cwin05 xứng đáng là lựa chọn hàng đầu của những ai yêu thích các trò chơi trực tuyến. Nếu bạn đang tìm kiếm một nền tảng giải trí an toàn, đáng tin cậy và đầy thú vị, Cwin05 chính là nơi bạn không thể bỏ qua. Hãy tham gia ngay hôm nay để trải nghiệm và khám phá những điều thú vị tại Cwin05!
-

@ a012dc82:6458a70d
2024-12-12 07:30:09
**Table Of Content**
- The Anticipated Halving Event: A Catalyst for Growth
- The Power of the Bitcoin ETF: Driving Demand
- Global Economic Shifts: The BRICS and SCO Connection
- Regulatory Challenges: The Ripple-XRP Case
- Conclusion
- FAQ
Bitcoin, the pioneering cryptocurrency, has seen its fair share of ups and downs since its inception. From being dismissed as a mere fad to becoming a globally recognized financial asset, its journey has been nothing short of remarkable. Now, with Fundstrat's recent prediction of Bitcoin potentially reaching a staggering $180,000 by 2024, the crypto community is buzzing with excitement. Let's delve into the reasons behind this bold forecast.
**The Anticipated Halving Event: A Catalyst for Growth**
Every four years, Bitcoin undergoes a significant event known as "halving." This event sees the rewards for mining new blocks cut in half, effectively reducing the rate at which new bitcoins are introduced into the market. Historically, these halvings have been pivotal moments for Bitcoin's price trajectory.
The logic behind the price surge post-halving is relatively straightforward: as the rewards for mining decrease, the supply of new bitcoins entering the market slows down. If demand remains constant or increases, this reduced supply can lead to upward pressure on the price. The previous halvings in 2012, 2016, and 2020 have all been followed by substantial bull runs, solidifying the belief in this pattern among many investors.
Fundstrat's prediction takes this historical context into account. With the next halving event scheduled for April 2024, there's a growing anticipation of another significant price rally. If past patterns hold true, and with the added dynamics of increased institutional interest and broader mainstream acceptance, Bitcoin's journey to $180,000 seems not just possible, but plausible.
**The Power of the Bitcoin ETF: Driving Demand**
The concept of a Bitcoin ETF (Exchange Traded Fund) has been a topic of discussion and anticipation in the crypto community for years. An ETF would essentially track the price of Bitcoin, allowing investors to buy shares of the ETF rather than owning Bitcoin directly. This structure provides a more familiar and regulated way for institutional investors to gain exposure to Bitcoin's price movements without the complexities and security concerns of direct cryptocurrency ownership.
Fundstrat believes that the approval of a Bitcoin ETF could be a game-changer. Historically, the introduction of ETFs for other assets has often led to increased liquidity and demand for the underlying asset. For instance, the introduction of gold ETFs provided a significant boost to the gold market, making it more accessible to a broader range of investors.
With a Bitcoin ETF, institutional investors, who might have been previously hesitant due to the perceived risks and complexities associated with cryptocurrency, would have a more straightforward avenue to invest. This could lead to a massive influx of capital into the Bitcoin market. As these large-scale investors enter the scene, the demand for Bitcoin could skyrocket, driving up its price significantly. Fundstrat's projection of a 521% price hike takes into account this potential surge in demand, underlining the transformative power a Bitcoin ETF could have on the market.
**Global Economic Shifts: The BRICS and SCO Connection**
While not directly related to Bitcoin's price, it's essential to understand the global economic landscape. An Indian analyst has posited that World War III has already begun in the form of economic and digital warfare. He anticipates a merger between the BRICS economic bloc (Brazil, Russia, India, China, and South Africa) and the Shanghai Cooperation Organization (SCO). Such a merger could reshape global economic dynamics, potentially influencing Bitcoin's role as a decentralized currency.
**Regulatory Challenges: The Ripple-XRP Case**
The crypto world isn't just about bullish predictions; it's also about navigating the complex regulatory landscape. The U.S. Securities and Exchange Commission (SEC) is currently seeking permission to appeal a ruling in the SEC v. Ripple case over XRP. While this might seem unrelated to Bitcoin, it underscores the importance of regulatory clarity for the entire crypto industry. A favorable outcome for Ripple could set a precedent for other cryptocurrencies, including Bitcoin, fostering a more conducive environment for growth.
**Conclusion**
While predictions are just that – predictions, the factors outlined by Fundstrat and the broader global economic context provide compelling reasons to be optimistic about Bitcoin's future. Only time will tell if Bitcoin will indeed touch the $180,000 mark, but one thing is certain: the journey will be an exciting one to watch.
**FAQ**
**What is the Bitcoin halving event?**
The Bitcoin halving is an event where the rewards for mining new blocks are cut in half, reducing the rate of new bitcoins entering the market.
**Why does Fundstrat believe Bitcoin will reach $180,000 by 2024?**
Fundstrat's prediction is based on historical price patterns around halving events and the potential approval of a Bitcoin ETF, which could drive significant demand.
**What is a Bitcoin ETF?**
A Bitcoin ETF (Exchange Traded Fund) tracks the price of Bitcoin, allowing investors to buy shares of the ETF instead of owning Bitcoin directly, providing a more regulated way to invest in Bitcoin's price movements.
**How does the halving impact Bitcoin's price?**
Historically, halvings have led to price surges due to reduced supply of new bitcoins. If demand remains constant or increases, this can lead to upward price pressure.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-

@ a39d19ec:3d88f61e
2024-11-17 10:48:56
This week's functional 3d print is the "Dino Clip".

## Dino Clip
I printed it some years ago for my son, so he would have his own clip for cereal bags.
Now it is used to hold a bag of dog food close.
The design by "Sneaks" is a so called "print in place". This means that the whole clip with moving parts is printed in one part, without the need for assembly after the print.

The clip is very strong, and I would print it again if I need a "heavy duty" clip for more rigid or big bags.
Link to the file at [Printables](https://www.printables.com/model/64493-dino-clip-mechanical-cam-chip-clip-print-in-place)
-

@ 88d8c9d1:5b3ac02b
2024-12-12 02:39:25
This article was first [published](https://bitcoinmagazine.com/culture/how-bitcoin-can-save-political-dissidents-in-myanmar)on Bitcoin Magazine at June 9, 2023.
As the 2024 U.S. Presidential election campaign kicked off, one of the candidates, Robert F. Kennedy Jr., took to Twitter to express his support for Bitcoin. In a tweet, he stated that “Bitcoin has been a lifesaver for people’s movements around the world, particularly in Burma.”
Myanmar, also known as [Burma](https://en.wikipedia.org/wiki/Myanmar), is a country located in Southeast Asia, bordering China, India, Thailand, Laos and Bangladesh. The country has stunning natural beauty, including untouched beaches, vast forests and a rich culture of Buddhism. Despite these attractions, Myanmar [has been tortured by the world's longest civil war](https://digitalcollections.sit.edu/capstones/2603/), which has been ongoing for more than 70 years, since it achieved [independence in 1945](https://asiangeo.com/articles/the-road-to-independence-burma-1945-1962/). The country has also experienced multiple military coups throughout its history, leading to political instability and economic turmoil. Additionally, [the government has a history of demonetizing the local currency](https://rpl.hds.harvard.edu/religion-context/country-profiles/myanmar/economic-policies-and-ideologies), and there have been frequent banking crises.
One of Myanmar's most notable instances of demonetization occurred in 1987, leading to the historic "8888 Uprising." On September 5, 1987, the military dictator Ne Win [announced the demonetization of Myanmar's 25, 35, and 75 kyat notes](https://www.latimes.com/archives/la-xpm-1987-09-12-mn-1980-story.html) without providing prior notice or replacing them for citizens. At that time, these notes accounted for [80% of the circulation in the economy.](https://www.irrawaddy.com/specials/on-this-day/day-three-myanmar-banknotes-suddenly-became-worthless.html) Previous demonetization efforts in 1964 and 1985 had [compensated noteholders](https://www.irrawaddy.com/specials/on-this-day/day-three-myanmar-banknotes-suddenly-became-worthless.html), making this move in 1987 especially unexpected and devastating for the people of Myanmar. The choice to demonetize these particular, odd denominations sparked significant speculation, as they were believed to hold special status. It is widely held that Ne Win, who was highly superstitious, considered these numbers to be propitious both for the country and himself on a personal level.
Myanmar's transformation era commenced [with the visit of U.S. President Barack Obama to the country in 2012](https://www.reuters.com/article/us-asia-obama-myanmar/obama-offers-praise-pressure-on-historic-myanmar-trip-idUSBRE8AI04320121119), followed by its [first civilian election in 2015](https://www.cnn.com/2015/11/11/asia/myanmar-elections/index.html), which marked a significant milestone in the country's path toward democracy. However, the [2021 Myanmar military coup](https://en.wikipedia.org/wiki/2021_Myanmar_coup_d%27%C3%A9tat) has set the country back by a decade. The military's seizure of power in February 2021 has sparked widespread protests and violence across the country, with thousands of people taking to the streets to demand the release of detained political leaders, including the [State Counselor Aung San Suu Kyi and President U Win Myint](https://www.aljazeera.com/news/2023/2/1/timeline-two-years-since-the-myanmar-military-coup) and the restoration of democracy.
But following the military coup in February 2021, the military has brutally cracked down on civilians who are protesting against the regime. [Reports indicate](https://www.bbc.com/news/world-asia-57380237) that the military has resorted to extreme measures to suppress dissent, including shooting protesters on the spot and arresting individuals, some of whom have been found dead the following day. The military junta has also taken steps to silence activists and journalists who have spoken out against the coup on social media by [freezing their bank accounts](https://coconuts.co/yangon/news/myanmar-bank-faces-boycott-after-freezing-accounts-to-block-donations-to-anti-coup-forces/), making it difficult for them to access their funds and personal savings. These actions have led to widespread condemnation from the international community and have raised concerns about the deteriorating human rights situation in Myanmar.
A source from [ANTS](https://www.facebook.com/ANTSforPeople), a group that raises funds for the democracy movement in Myanmar, revealed to me that many of their members and their friends had their bank accounts frozen by the military regime since they started fundraising efforts in October 2021. These efforts have also led to the arrests and questioning of the family members of activists. In response to the situation, a 22-year-old activist from ANTS told me, "To overcome getting their bank accounts frozen, ANTS changed its fundraising strategy to take bank information privately and instruct donors to write online shopping payment in the note section to reduce the risk of exposure."
Assisting resistance groups in Myanmar poses a significant danger for individuals irrespective of social hierarchy. Even a donation of less than $10 to these groups [has led to ten years of prison sentences for some individuals](https://www.rfa.org/english/news/myanmar/prison-terms-04062022170714.html). In one instance, a well-known jeweler in the Mandalay region was arrested for allegedly supporting the resistance, resulting in the seizure of his assets, including properties, businesses and an [astounding 193 tons of raw jade](https://www.irrawaddy.com/news/burma/myanmar-gems-boss-arrested-for-alleged-resistance-support.html) valued at approximately 12 billion kyat (equivalent to roughly $5.7 million).
**Alternatives, But Not Solutions**
Furthermore, the group revealed that they have explored alternative digital payment options such as [NUGPay](https://nugpay.app/), a pilot digital currency platform launched by Myanmar's parallel government, the [National Unity Government (NUG)](https://www.nugmyanmar.org/en/). However, as one of their members explained, "Our donors are hesitant to use the platform because it requires opening a bank account with an agent who is either inside Myanmar or outside of Myanmar. Who can guarantee that it is purely safe for the agent and users in terms of data security? It looks like having a double risk than using the traditional banking system.”
But NUGPay, a digital currency platform built on the [open-source Stellar network](https://en.wikipedia.org/wiki/Stellar_(payment_network)#:~:text=Stellar%20is%20an%20open%2Dsource,communicate%20with%20other%20Stellar%20servers.), has faced concerns over data security from many people.
As of May 28, 2023, [the Stellar blockchain had recorded 26,950 trustlines using the platform](https://stellar.expert/explorer/public/asset/DMMK-GDMMKKNI5KTQWFEI57ZTCAPFUJFGQSW5YUN5AJ4O2I25JXEU3IL2DZXD-1?filter=payments). However, the mobile app Exxon Film Investment — which allegedly enticed users with interest-yield incentives — [had managed to scam more than 30,000 people in Myanmar](managed to scam more than 30,000 people in Myanmar), creating a number of users who are now discouraged from exploring digital currencies like Bitcoin that exceeds the entire user base of NUGPay, highlighting the challenges of ensuring the security of digital financial transactions in Myanmar.
"I think from my experience, many local young people still do not believe in the potential of digital currency,” Feliz, the founder of Myan Crypto, a local crypto educational community, told me. “It is still skeptical in our community. Not to mention senior citizens."
He added, "Many people in our community came to the Bitcoin and crypto trading industry because they are kind of rich in cash but they don’t know what to do in this economic fallout."
Regarding NUGPay, Feliz expressed concerns about its limited adoption, saying, "I think the problem of NUGPay is limited adoption. You can’t use it as a currency outside of the revolution group. I think it needs widespread adoption everywhere to make it as an effective currency. Even some people who trade bitcoin and crypto don’t use or hesitate to use the NUGPay due to its limited acceptance. Even (a) user not under military reach doesn’t know what to use NUGPay for other than supporting the resistance.”
**How Bitcoin Can Help Those Resisting The Military In Myanmar**
But Bitcoin could serve as a better alternative for those in Myanmar who are being cut off from traditional banking services or fear currency devaluation.
[Research](https://www.facebook.com/MizzimaDaily/posts/pfbid02E3XzCQ2qoLcGoe5q5Wvnsh2YuSb4QamR49yjB95iqjNE4eeQEwTxA3XaLFTJbB4jl?_rdc=1&_rdr) conducted by the [Bitcoin Myanmar Initiative](https://www.facebook.com/Bitcoin.MM.Initiative/) shows that, while the value of the kyat has fallen by over 35% since the military coup, the price of bitcoin has doubled in the same period. Prior to the coup, the price of 1 BTC was approximately 500 million kyat, but it is hovering around 1 billion kyat on Binance’s peer-to-peer exchange as of this writing.
"We believe that the adoption of bitcoin and other digital currencies in Myanmar will be a gradual process, given the current economic environment and the fragile risk tolerance of the majority of people," a representative of the Bitcoin Myanmar Initiative told me. "However, we see the potential for growth due to the country's previous experiences with technology leapfrogging. With a smartphone penetration rate of 78% and only 36% of the population having a bank account, many people in Myanmar are looking for an alternative to traditional banking. By promoting a form of currency that no one can control, we aim to help people reclaim their property rights in a digital way and unleash themselves from the military regime's monetary policy. We believe that it's just a matter of time before more people in Myanmar recognize the benefits of Bitcoin."
Highlighting another powerful example of how Bitcoin can help those in Myanmar in “[Check Your Financial Privilege](https://store.bitcoinmagazine.com/collections/books/products/check-your-financial-privilege),” author Alex Gladstein wrote that:
*“As a personal example, someone reached out to me at the beginning of the Myanmar revolution in February 2021. They wanted to provide aid to the democracy movement, but the banking system was practically shuttered, and there was no easy way to wire dollars. After doing some digging, we were introduced to an aid worker-turned-activist who was also a Bitcoin user. He could easily accept a donation, save it in BTC, and then sell it on the peer-to-peer markets when he needed to spend the collapsing local kyat currency on goods. An address was sent over Signal, and a gift was made in minutes. No barriers, no middlemen, and no possibility for corruption along the way. It is just one small example, but it is a glimpse of what the future could hold.” *
-

@ 29ff421a:2b6de3bf
2024-12-11 12:20:19
The latest drafted document on the global LED Lighting Market by Roots Analysis, provides a brief discussion on industry size, current growth scenario and future opportunities. In the market study report, our authors extensively covered qualitative and quantitative analysis including investment opportunities to help stakeholders in evaluating the major growth drivers and business strategies to accelerate growth in the industry. In addition to comprehensive analysis, our researchers illustrated the market drivers, challenges, upcoming trends and partnerships between industrial leaders. The exclusive information about market dynamics serves as a valuable guide to predict economic scenarios and initiatives taken to enhance future growth. Our market study report aims to deliver value-pack information about supply chain ratio, product portfolio, consumption pattern, purchasing habits, macro and micro-economic factors. The primary objective is to help stakeholders update with current market scenarios and future opportunities to make considerable investment.
Global LED Lighting Segments Overview
The global LED Lighting market report highlights the discussion on the top segments across the LED Lighting industry and the major share held by the segments. This segmentation dominance information helps businesses understand the major segments' distribution, products, end users, applications and key geographical regions. In addition, year wise discussion on three forecast models on the global LED Lighting market help readers make a well-informed decision on business strategies for the future.
Global LED Lighting Market Statistical Analysis Data
The global LED Lighting market study report utilizes insightful processes for the analysis of statistical data associated with products provided in the industry. This elaborate discussion about the LED Lighting market serves as an important document for understanding consumer requirements and future demand. Our market report provides invaluable data about leading companies and their business strategies that help vendors understand the competitiveness among them. The LED Lighting industry is currently witnessing major expansion and growth dynamics driven by the entry of new players and rising collaborations between existing players. The market study outlines the growing market segments and insight into the evolving elements of the LED Lighting industry. The primary objective of the market study report is to provide insightful information about current growth, transition, and future growth opportunities in the market. The global industry of LED Lighting also features various acquisitions, mergers, agreements, partnerships, joint ventures, and product launches to help you make a strategic decision for future investment in this field.
Key Companies Profiled in the Report are
• Acuity Brands
• Bridgelux
• Cree Lighting
• Daktronics
• Eaton
• Fagerhults Belysning AB
• GE Lighting
• Halonix
• Hubbell
• LG Innotek
• Nanoleaf
• OSRAM Licht
• Pretium Packaging
Regional Analysis Covers:
The market report provides you a brief discussion over key region, market share, regulatory guidelines and future trends to be availed by the key players in these regions. The market report also provides a detailed regional analysis of the LED Lighting market with regard to market size, production and consumption patterns, market share in terms of volume and value, import / export and demand dynamics, and presence of leading players in the market.
• North America (U.S., Canada)
• Europe (U.K., Italy, Germany, France, Rest of EU)
• Asia Pacific (India, Japan, China, South Korea, Australia, Rest of APAC)
• Latin America (Chile, Brazil, Argentina, Rest of Latin America)
• Middle East & Africa (Saudi Arabia, U.A.E., South Africa, Rest of MEA)
• Rest of the World (Australia, New Zealand and Other Countries)
To know more about the report, visit @ https://www.rootsanalysis.com/led-lighting-market
Competitive Outlook of LED Lighting Market
Additionally, the report features in-depth analytical data segmented into charts, figures, graphs, tables, and diagrams in a well-organized format for quick analysis. The visual representation of data enables readers to understand the current market scenario in an easy and understandable way. Apart from the market study, the primary objective of the report is to provide a competitive outlook and offer a well-informed conclusion about opportunities to help readers make strategic business decisions. The SWOT analysis covered in the report, along with Porter's Five Forces analysis of the segment, provides information about future trends in the market.
Thank you for reading our report. For further queries, please connect with us, and our team will provide you with the report best suited to your requirements.
About Roots Analysis
Roots Analysis is a global leader in the pharma / biotech market research. Having worked with over 750 clients worldwide, including Fortune 500 companies, start-ups, academia, and venture and strategic investors for more than a decade, we offer a highly analytical / data-driven perspective to a network of over 450,000 senior industry stakeholders looking for credible market insights. All reports provided by us are structured in a way that enables the reader to develop a thorough perspective on the given subject. Apart from writing reports on identified areas, we provide bespoke research / consulting services dedicated to serving our clients in the best possible way.
Contact Details
Roots Analysis
Gaurav Chaudhary
+1 (415) 800 3415
+44 (122) 391 1091
Gaurav.chaudhary@rootsanalysis.com
Website: https://www.rootsanalysis.com/
-

@ 29ff421a:2b6de3bf
2024-12-11 12:17:34
The latest drafted document on the global Adaptive AI Market by Roots Analysis, provides a brief discussion on industry size, current growth scenario and future opportunities. In the market study report, our authors extensively covered qualitative and quantitative analysis including investment opportunities to help stakeholders in evaluating the major growth drivers and business strategies to accelerate growth in the industry. In addition to comprehensive analysis, our researchers illustrated the market drivers, challenges, upcoming trends and partnerships between industrial leaders. The exclusive information about market dynamics serves as a valuable guide to predict economic scenarios and initiatives taken to enhance future growth. Our market study report aims to deliver value-pack information about supply chain ratio, product portfolio, consumption pattern, purchasing habits, macro and micro-economic factors. The primary objective is to help stakeholders update with current market scenarios and future opportunities to make considerable investment.
Global Adaptive AI Segments Overview
The global Adaptive AI market report highlights the discussion on the top segments across the Adaptive AI industry and the major share held by the segments. This segmentation dominance information helps businesses understand the major segments' distribution, products, end users, applications and key geographical regions. In addition, year wise discussion on three forecast models on the global Adaptive AI market help readers make a well-informed decision on business strategies for the future.
Global Adaptive AI Market Statistical Analysis Data
The global Adaptive AI market study report utilizes insightful processes for the analysis of statistical data associated with products provided in the industry. This elaborate discussion about the Adaptive AI market serves as an important document for understanding consumer requirements and future demand. Our market report provides invaluable data about leading companies and their business strategies that help vendors understand the competitiveness among them. The Adaptive AI industry is currently witnessing major expansion and growth dynamics driven by the entry of new players and rising collaborations between existing players. The market study outlines the growing market segments and insight into the evolving elements of the Adaptive AI industry. The primary objective of the market study report is to provide insightful information about current growth, transition, and future growth opportunities in the market. The global industry of Adaptive AI also features various acquisitions, mergers, agreements, partnerships, joint ventures, and product launches to help you make a strategic decision for future investment in this field.
Key Companies Profiled in the Report are
• Aegis Software
• Apexon
• ABB
• Cisco
• Cygnus
• Dynam.AI
• Eaton
• General Electric
• Google
• Honeywell
• Huawei
Regional Analysis Covers:
The market report provides you a brief discussion over key region, market share, regulatory guidelines and future trends to be availed by the key players in these regions. The market report also provides a detailed regional analysis of the Adaptive AI market with regard to market size, production and consumption patterns, market share in terms of volume and value, import / export and demand dynamics, and presence of leading players in the market.
• North America (U.S., Canada)
• Europe (U.K., Italy, Germany, France, Rest of EU)
• Asia Pacific (India, Japan, China, South Korea, Australia, Rest of APAC)
• Latin America (Chile, Brazil, Argentina, Rest of Latin America)
• Middle East & Africa (Saudi Arabia, U.A.E., South Africa, Rest of MEA)
• Rest of the World (Australia, New Zealand and Other Countries)
To know more about the report, visit @ https://www.rootsanalysis.com/adaptive-ai-market
Competitive Outlook of Adaptive AI Market
Additionally, the report features in-depth analytical data segmented into charts, figures, graphs, tables, and diagrams in a well-organized format for quick analysis. The visual representation of data enables readers to understand the current market scenario in an easy and understandable way. Apart from the market study, the primary objective of the report is to provide a competitive outlook and offer a well-informed conclusion about opportunities to help readers make strategic business decisions. The SWOT analysis covered in the report, along with Porter's Five Forces analysis of the segment, provides information about future trends in the market.
Thank you for reading our report. For further queries, please connect with us, and our team will provide you with the report best suited to your requirements.
About Roots Analysis
Roots Analysis is a global leader in the pharma / biotech market research. Having worked with over 750 clients worldwide, including Fortune 500 companies, start-ups, academia, and venture and strategic investors for more than a decade, we offer a highly analytical / data-driven perspective to a network of over 450,000 senior industry stakeholders looking for credible market insights. All reports provided by us are structured in a way that enables the reader to develop a thorough perspective on the given subject. Apart from writing reports on identified areas, we provide bespoke research / consulting services dedicated to serving our clients in the best possible way.
Contact Details
Roots Analysis
Gaurav Chaudhary
+1 (415) 800 3415
+44 (122) 391 1091
Gaurav.chaudhary@rootsanalysis.com
Website: https://www.rootsanalysis.com/
-

@ a012dc82:6458a70d
2024-12-11 08:02:59
**Table Of Content**
- From the Backbench to the Forefront
- Milei's Bitcoin Connection
- The Coinx Controversy
- Argentina's Financial Quagmire
- Conclusion
- FAQ
Well, folks, it seems like the winds of change are blowing in Argentina! In a twist that no one saw coming, Javier Milei, the presidential candidate with a penchant for Bitcoin and libertarian economics, clinched the top spot in Argentina's primary. This victory sent shockwaves throughout the nation. Milei and his gang, the La Libertad Avanza (or "Liberty Advances"), managed to snag a whopping 30% of the votes. They beat the second-place contender, Juntos Por El Cambio, by just under 2%, which is quite the feat!
**From the Backbench to the Forefront**
La Libertad Avanza, founded just a couple of years ago in 2021, was once the little guy in the political arena. In their first legislative elections, they made waves, becoming the third most-voted coalition in Buenos Aires. But this recent victory? It's monumental! It's like David taking on Goliath and emerging victorious. Milei's rise has certainly turned heads and raised eyebrows in the political sphere, making everyone wonder what's next.
**Milei's Bitcoin Connection**
Javier Milei is not your run-of-the-mill political candidate. He's carved out a unique niche for himself in the world of politics, largely due to his vocal support for cryptocurrencies, especially Bitcoin. When you tune into talk shows and interviews, you'll often find Milei passionately discussing the potential of digital currencies. He doesn't just see them as another financial instrument; to him, they represent a return to a time when the power of money was firmly rooted in the hands of the people, free from excessive governmental control.
His views on Bitcoin go beyond mere admiration. Milei perceives it as a revolutionary tool, one that can challenge traditional financial systems. He often contrasts the decentralized nature of cryptocurrencies with the centralized control of traditional fiat currencies. In his eyes, Bitcoin and its peers are not just alternatives but superior forms of money. He's even made bold claims, suggesting that in many ways, cryptocurrencies are safer investments than traditional precious metals like gold or silver. This is a significant statement, especially in a country like Argentina, where people have historically turned to gold as a hedge against economic instability.
However, as with any public figure with strong opinions, Milei's crypto enthusiasm has its fair share of critics. While he paints a rosy picture of a crypto-driven future, there are those who question his motives and the feasibility of his vision. The crypto world, as many know, is not without its pitfalls. From volatile market swings to regulatory challenges, the journey to mainstream acceptance is fraught with challenges. And Milei's connection to this world has put him under the microscope, with every statement and action being dissected and debated.
**The Coinx Controversy**
Rumor has it that Milei promoted a Ponzi scheme called Coinx, which allegedly swindled a cool $800,000 in Argentine pesos. Milei, of course, denies any wrongdoing. He even compared their business model to that of a bank. The only difference? They can offer higher interest rates because they're not tied down by the central bank. But not everyone's buying it. Manuel Ferrari, a big shot in the Bitcoin Argentina NGO, remains wary of Milei. This controversy adds another layer to the complex narrative surrounding Milei's rise.
**Argentina's Financial Quagmire**
Argentina's economic waters are turbulent, to say the least. With a dizzying inflation rate of 135% this year, the peso's value is plummeting, causing widespread distress. Amidst this chaos, many are pinning their hopes on Javier Milei, a figure who has emerged with a pro-Bitcoin stance that's causing quite the stir. Drawing parallels with El Salvador's audacious move to adopt Bitcoin, there's a buzz about whether Argentina might follow suit. But is Milei the savior Argentina has been waiting for? While his support for cryptocurrencies offers a glimmer of hope to some, it also brings with it skepticism and apprehension. The world of crypto, though promising, is still uncharted territory, especially for an economy as volatile as Argentina's.
As debates rage on, it's evident that Argentina stands at a crucial financial juncture. Milei's advocacy for Bitcoin and other cryptocurrencies suggests a potential shift in the country's financial paradigm. But diving into the crypto realm isn't without its risks, and there's a looming question: Are we witnessing the dawn of a new financial era for Argentina, or is it just a leap from the frying pan into the fire? The nation watches with bated breath, waiting to see the path Milei might pave.
**Conclusion**
Only time will truly reveal the impact of Milei's influence on Argentina's financial future. It's a waiting game now, folks. But if there's one thing we can bank on, it's that with Milei stirring the pot, Argentina's economic and financial landscape is poised for some dramatic shifts. The rollercoaster has just begun, so everyone better buckle up and brace themselves. Keep your eyes peeled and ears to the ground, because the upcoming months promise a whirlwind of changes, debates, and transformations for Argentina. The nation stands at a pivotal juncture, and the world watches with bated breath.
**FAQ**
**Who is Javier Milei?**
Javier Milei is a presidential candidate in Argentina known for his support of Bitcoin and libertarian economics.
**What is La Libertad Avanza?**
La Libertad Avanza, translated as "Liberty Advances," is the political coalition led by Javier Milei.
**How did Milei fare in the recent primaries?**
Milei clinched the top spot in Argentina's primary, securing over 30% of the votes.
**What is the Coinx controversy?**
Coinx is an alleged Ponzi scheme that Milei is rumored to have promoted. However, Milei denies any wrongdoing.
**What is Milei's stance on Bitcoin?**
Milei is a strong advocate for Bitcoin, viewing it as a return to private sector-controlled money and a safer alternative to traditional assets like gold or silver.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research. *
-

@ 07907690:d4e015f6
2024-12-11 03:45:40
Dhruv Bansal, CSO dan Co-Founder Unchained mengeksplorasi prinsip-prinsip dan sejarah yang mengarah pada penciptaan Bitcoin dan mengajukan pertanyaan: "Apa yang telah dilakukan Satoshi"?
Bitcoin sering dibandingkan dengan internet pada tahun 1990an, namun saya yakin analogi yang lebih baik adalah dengan telegraf pada tahun 1840an.[^1]
Telegraf adalah teknologi pertama yang mengirimkan data yang dikodekan dengan kecepatan mendekati cahaya dalam jarak jauh. Ini menandai lahirnya industri telekomunikasi. Internet, meskipun skalanya lebih besar, kontennya lebih kaya, dan _many-to-many_, bukan _one-to-one_, pada dasarnya masih merupakan teknologi telekomunikasi.
Baik telegraf maupun internet bergantung pada model bisnis di mana perusahaan mengerahkan modal untuk membangun jaringan fisik dan kemudian membebankan biaya kepada pengguna untuk mengirim pesan melalui jaringan ini. Jaringan AT&T secara historis mengirimkan telegram, panggilan telepon, paket TCP/IP, pesan teks, dan sekarang TikTok.
Transformasi masyarakat melalui telekomunikasi telah menghasilkan kebebasan yang lebih besar namun juga sentralisasi yang lebih besar. Internet telah meningkatkan jangkauan jutaan pembuat konten dan usaha kecil, namun juga memperkuat jangkauan perusahaan, otoritas pusat, dan lembaga lain yang memiliki posisi yang cukup baik untuk memantau dan memanipulasi aktivitas online.
Namun Bitcoin bukanlah akhir dari transformasi apa pun—ini adalah awal dari sebuah transformasi. Seperti halnya telekomunikasi, Bitcoin akan mengubah kebiasaan umat manusia dan kehidupan sehari-harinya. Memprediksi seluruh cakupan perubahan saat ini sama dengan membayangkan internet saat hidup di era telegraf.
Seri ini mencoba membayangkan masa depan dengan memulai dari masa lalu. Artikel awal ini menelusuri sejarah mata uang digital sebelum Bitcoin. Hanya dengan memahami kegagalan proyek-proyek sebelumnya, kita dapat memahami apa yang membuat Bitcoin berhasil—dan bagaimana hal itu menyarankan metodologi untuk membangun sistem desentralisasi di masa depan.
Klaim utama dari artikel ini adalah bahwa Bitcoin dapat dianggap sebagai adaptasi dari proyek B-money Dai yang menghilangkan kebebasan untuk menciptakan uang. Hanya beberapa minggu setelah artikel ini pertama kali diterbitkan, email baru muncul di mana Satoshi mengaku tidak terbiasa dengan B-money, namun mengakui bahwa Bitcoin dimulai “tepat dari titik itu.” Mengingat bukti baru ini, kami yakin klaim utama ini, meskipun tidak akurat secara historis, masih merupakan cara yang bermakna dan bermanfaat untuk memikirkan asal usul Bitcoin.
**Bagaimana Satoshi Nakamoto Memikirkan Bitcoin?**
Satoshi memang cerdas, tetapi Bitcoin tidak muncul begitu saja.
Bitcoin mengulangi pekerjaan yang ada di bidang kriptografi, sistem terdistribusi, ekonomi, dan filsafat politik. Konsep _proof-of-work_ sudah ada jauh sebelum digunakan dalam uang dan cypherpunk sebelumnya seperti Nick Szabo, Wei Dai, & Hal Finney mengantisipasi dan memengaruhi desain Bitcoin dengan proyek-proyek seperti bit gold, B-money, dan RPoW. Pertimbangkan bahwa, pada tahun 2008, ketika Satoshi menulis _white paper_ Bitcoin[^2], banyak ide penting Bitcoin telah diusulkan dan/atau diimplementasikan:
* Mata uang digital harus berupa jaringan P2P
* _Proof-of-work_ adalah dasar penciptaan uang
* Uang diciptakan melalui lelang
* Kunci publik kriptografi digunakan untuk menentukan kepemilikan dan transfer koin
* Transaksi dikelompokkan menjadi beberapa blok
* Blok dirangkai bersama melalui _proof-of-work_
* Semua blok disimpan oleh semua peserta
Bitcoin memanfaatkan semua konsep ini, tetapi Satoshi tidak menciptakan satu pun konsep tersebut. Untuk lebih memahami kontribusi Satoshi, kita harus menentukan prinsip Bitcoin mana yang tidak ada dalam daftar.
Beberapa kandidat yang jelas adalah persediaan Bitcoin yang terbatas, konsensus Nakamoto, dan algoritma penyesuaian kesulitan. Tapi apa yang mendorong Satoshi pada ide ini?
Artikel ini mengeksplorasi sejarah mata uang digital dan menyatakan bahwa fokus Satoshi pada kebijakan moneter yang sehat adalah hal yang menyebabkan Bitcoin mengatasi tantangan yang mengalahkan proyek-proyek sebelumnya seperti bit gold dan B-money.
## Sistem yang Terdesentralisasi Adalah Pasar
Bitcoin sering digambarkan sebagai sistem terdesentralisasi atau terdistribusi. Sayangnya, kata “desentralisasi” dan “terdistribusi” sering kali membingungkan. Ketika diterapkan pada sistem digital, kedua istilah tersebut mengacu pada cara aplikasi monolitik dapat didekomposisi menjadi jaringan bagian-bagian yang berkomunikasi.

Untuk tujuan kita, perbedaan utama antara sistem terdesentralisasi dan terdistribusi bukanlah [topologi diagram jaringannya]( https://medium.com/@VitalikButerin/the-meaning-of-decentralization-a0c92b76a274 "Link to: https://medium.com/@VitalikButerin/the-meaning-of-decentralization-a0c92b76a274"), namun cara mereka menegakkan aturan. Kami meluangkan waktu di bagian berikut untuk membandingkan sistem terdistribusi dan desentralisasi dan memotivasi gagasan bahwa sistem desentralisasi yang kuat adalah pasar.
### Sistem Terdistribusikan Bergantung pada Otoritas Pusat
Dalam hal ini, kami mengartikan “terdistribusi” sebagai sistem apa pun yang telah dipecah menjadi beberapa bagian (sering disebut sebagai "_node_") yang harus berkomunikasi, biasanya melalui jaringan.
Insinyur perangkat lunak semakin mahir dalam membangun sistem yang terdistribusi secara global. Internet terdiri dari sistem terdistribusi yang secara kolektif berisi miliaran node. Kita masing-masing memiliki simpul di saku kita yang berpartisipasi dan bergantung pada sistem ini.
Namun hampir semua sistem terdistribusi yang kita gunakan saat ini diatur oleh beberapa otoritas pusat, biasanya administrator sistem, perusahaan, atau pemerintah yang saling dipercaya oleh semua node dalam sistem.
Otoritas pusat memastikan semua node mematuhi aturan sistem dan menghapus, memperbaiki, atau menghukum node yang gagal mematuhinya. Mereka dipercaya untuk melakukan koordinasi, menyelesaikan konflik, dan mengalokasikan sumber daya bersama. Seiring waktu, otoritas pusat mengelola perubahan pada sistem, memperbarui atau menambahkan fitur, dan memastikan bahwa node yang berpartisipasi mematuhi perubahan tersebut.
Manfaat yang diperoleh sistem terdistribusi karena mengandalkan otoritas pusat juga disertai dengan biaya. Meskipun sistem ini kuat terhadap kegagalan node-nodenya, kegagalan otoritas pusat dapat menyebabkan sistem berhenti berfungsi secara keseluruhan. Kemampuan otoritas pusat untuk mengambil keputusan secara sepihak berarti menumbangkan atau menghilangkan otoritas pusat sudah cukup untuk mengendalikan atau menghancurkan keseluruhan sistem.
Terlepas dari adanya _trade-off_ ini, jika ada persyaratan bahwa satu partai atau koalisi harus mempertahankan otoritas pusat, atau jika peserta dalam sistem tersebut puas dengan mengandalkan otoritas pusat, maka sistem terdistribusi tradisional adalah solusi terbaik. Tidak diperlukan [blockchain](/2024/07/apa-itu-blockchain.html "Apa itu Blockchain?"), token, atau sistem desentralisasi serupa.
Secara khusus, kasus VC atau mata uang kripto yang didukung oleh pemerintah, dengan persyaratan bahwa satu pihak dapat memantau atau membatasi pembayaran dan membekukan akun, adalah kasus penggunaan yang sempurna untuk sistem terdistribusi tradisional.
### Sistem Desentralisasi Tidak Memiliki Otoritas Pusat
Kami menganggap “desentralisasi” memiliki arti yang lebih kuat daripada “terdistribusi”: sistem desentralisasi adalah bagian dari sistem terdistribusi yang tidak memiliki otoritas pusat. Sinonim yang mirip dengan “desentralisasi” adalah “peer-to-peer” (P2P).
Menghapus otoritas pusat memberikan beberapa keuntungan. Sistem terdesentralisasi:
* Tumbuh dengan cepat karena tidak ada hambatan untuk masuk—siapa pun dapat mengembangkan sistem hanya dengan menjalankan node baru, dan tidak ada persyaratan untuk registrasi atau persetujuan dari otoritas pusat.
* Kuat karena tidak ada otoritas pusat yang kegagalannya dapat membahayakan berfungsinya sistem. Semua node adalah sama, jadi kegagalan bersifat lokal dan jaringan merutekan sekitar kerusakan.
* Sulit untuk ditangkap, diatur, dikenakan pajak, atau diawasi karena tidak adanya titik kendali terpusat yang dapat ditumbangkan oleh pemerintah.
Kekuatan inilah yang menjadi alasan Satoshi memilih desain Bitcoin yang terdesentralisasi dan _peer-to-peer_:
> _“Pemerintah pandai memotong… jaringan yang dikendalikan secara terpusat seperti Napster, namun jaringan P2P murni seperti Gnutella dan Tor tampaknya masih mampu bertahan.” - Satoshi Nakamoto, 2008_
Namun kekuatan ini juga disertai dengan kelemahan. Sistem yang terdesentralisasi bisa menjadi kurang efisien karena setiap titik harus memikul tanggung jawab tambahan untuk koordinasi yang sebelumnya diambil alih oleh otoritas pusat.
Sistem yang terdesentralisasi juga sering dilanda perilaku yang bersifat penipuan dan bertentangan. Terlepas dari persetujuan Satoshi terhadap Gnutella, siapa pun yang menggunakan program berbagi file P2P untuk mengunduh file yang ternyata kotor atau berbahaya memahami alasan mengapa berbagi file P2P tidak pernah menjadi model utama untuk transfer data online.
Satoshi tidak menyebutkannya secara eksplisit, namun email adalah sistem terdesentralisasi lainnya yang menghindari kendali pemerintah. Dan email juga terkenal sebagai spam.
### Sistem Desentralisasi diatur Melalui Insentif
Akar masalahnya, dalam semua kasus ini adalah, bahwa perilaku kejahatan (menyebarkan file buruk, mengirim email spam) tidak dihukum, dan perilaku kooperatif (menyebarkan file bagus, hanya mengirim email berguna) tidak dihargai. Sistem desentralisasi yang mengandalkan partisipannya untuk menjadi aktor yang baik gagal untuk berkembang karena sistem tersebut tidak dapat mencegah aktor jahat untuk ikut berpartisipasi.
Tanpa memaksakan otoritas pusat, satu-satunya cara untuk menyelesaikan masalah ini adalah dengan menggunakan insentif ekonomi. Aktor yang baik, menurut definisinya, bermain sesuai aturan karena mereka secara inheren termotivasi untuk melakukannya. Pelaku kejahatan, menurut definisinya, adalah orang yang egois dan licik, namun insentif ekonomi yang tepat dapat mengarahkan perilaku buruk mereka ke arah kebaikan bersama. Sistem yang terdesentralisasi melakukan hal ini dengan memastikan bahwa perilaku kooperatif menguntungkan dan perilaku kejahatan merugikan.
Cara terbaik untuk menerapkan layanan terdesentralisasi yang kuat adalah dengan menciptakan pasar di mana semua pelaku, baik dan buruk, dibayar untuk menyediakan layanan tersebut. Kurangnya hambatan masuk bagi pembeli dan penjual di pasar yang terdesentralisasi mendorong skala dan efisiensi. Jika protokol pasar dapat melindungi partisipan dari penipuan, pencurian, dan penyalahgunaan, maka pelaku kejahatan akan merasa lebih menguntungkan untuk mengikuti aturan atau menyerang sistem lain.
## Pasar yang Terdesentralisasi Membutuhkan Barang yang Terdesentralisasi
Namun pasar itu rumit. Mereka harus memberi pembeli dan penjual kemampuan untuk mengirimkan penawaran dan permintaan serta menemukan, mencocokkan, dan menyelesaikan pesanan. Kebijakan tersebut harus adil, memberikan konsistensi yang kuat, dan menjaga ketersediaan meskipun terjadi masa-masa yang tidak menentu.
Pasar global saat ini sangat mumpuni dan canggih, namun menggunakan barang-barang tradisional dan jaringan pembayaran untuk menerapkan insentif di pasar yang terdesentralisasi bukanlah hal yang baru. Setiap penggabungan antara sistem desentralisasi dan uang fiat, aset tradisional, atau komoditas fisik akan menimbulkan kembali ketergantungan pada otoritas pusat yang mengontrol pemroses pembayaran, bank, dan bursa.

Sistem terdesentralisasi tidak dapat mentransfer uang tunai, mencari saldo rekening perantara, atau menentukan kepemilikan properti. Barang-barang tradisional sama sekali tidak terbaca dalam sistem desentralisasi. Hal sebaliknya tidak benar—sistem tradisional dapat berinteraksi dengan Bitcoin semudah aktor lainnya (begitu mereka memutuskan ingin melakukannya). Batasan antara sistem tradisional dan desentralisasi bukanlah sebuah tembok yang tidak dapat dilewati, melainkan sebuah membran semi-permeabel.
Ini berarti bahwa sistem yang terdesentralisasi tidak dapat melaksanakan pembayaran dalam mata uang barang tradisional apa pun. Mereka bahkan tidak dapat menentukan saldo rekening yang didominasi fiat atau kepemilikan real estat atau barang fisik. Seluruh perekonomian tradisional sama sekali tidak terbaca dalam sistem desentralisasi.
Menciptakan pasar yang terdesentralisasi membutuhkan perdagangan barang-barang baru yang terdesentralisasi yang dapat dibaca dan ditransfer dalam sistem yang terdesentralisasi.
### Komputasi Adalah Barang Terdesentralisasi yang Pertama
Contoh pertama dari “barang terdesentralisasi” adalah kelas komputasi khusus yang pertama kali diusulkan pada tahun 1993 oleh Cynthia Dwork dan Moni Naor.[^3]
Karena adanya hubungan mendalam antara matematika, fisika, dan ilmu komputer, komputasi ini memerlukan energi dan sumber daya perangkat keras di dunia nyata—hal ini tidak dapat dipalsukan. Karena sumber daya di dunia nyata langka, komputasi ini juga langka.
_input_ untuk komputasi ini dapat berupa data apa pun. Keluaran yang dihasilkan adalah “bukti” digital bahwa pengkomputasian telah dilakukan pada data _input_ yang diberikan. Pembuktian mengandung “kesulitan” tertentu yang merupakan bukti (statistik) dari sejumlah pekerjaan komputasi tertentu. Yang terpenting, hubungan antara data _input_, pembuktian, dan pekerjaan komputasi asli yang dilakukan dapat diverifikasi secara independen tanpa perlu mengajukan banding ke otoritas pusat mana pun.
Gagasan untuk menyebarkan beberapa data _input_ bersama dengan bukti digital sebagai bukti kerja komputasi dunia nyata yang dilakukan pada _input_ tersebut sekarang disebut “_proof-of-work_”.[^4] _Proof-of-work_ adalah, jika menggunakan ungkapan Nick Szabo, “biaya yang tidak dapat ditiru”. Karena _proof-of-work_ dapat diverifikasi oleh siapa pun, maka _proof-of-work_ merupakan sumber daya ekonomi yang dapat dibaca oleh semua peserta dalam sistem desentralisasi. _Proof-of-work_ mengubah penghitungan data menjadi barang yang terdesentralisasi. Dwork & Naor mengusulkan penggunaan komputasi untuk membatasi penyalahgunaan sumber daya bersama dengan memaksa peserta untuk memberikan _proof-of-work_ dengan tingkat kesulitan minimum tertentu sebelum mereka dapat mengakses sumber daya:
> “Dalam makalah ini kami menyarankan pendekatan komputasi untuk memerangi penyebaran surat elektronik. Secara umum, kami telah merancang mekanisme kontrol akses yang dapat digunakan kapan pun diinginkan untuk membatasi, namun tidak melarang, akses ke sumber daya.” - Dwoak & Naor, 1993
Dalam proposal Dwork & Naor, administrator sistem email akan menetapkan tingkat kesulitan bukti kerja minimum untuk mengirimkan email. Pengguna yang ingin mengirim email perlu melakukan sejumlah komputasi yang sesuai dengan email tersebut sebagai data _input_. Bukti yang dihasilkan akan dikirimkan ke server bersamaan dengan permintaan pengiriman email.
Dwork & Naor menyebut kesulitan _proof-of-work_ sebagai “fungsi penetapan harga” karena, dengan menyesuaikan kesulitan tersebut, “otoritas penetapan harga” dapat memastikan bahwa sumber daya bersama tetap murah untuk digunakan bagi pengguna yang jujur dan rata-rata, namun mahal bagi pengguna yang mencari untuk mengeksploitasinya. Di pasar pengiriman email, administrator server adalah otoritas penetapan harga; mereka harus memilih “harga” untuk pengiriman email yang cukup rendah untuk penggunaan normal namun terlalu tinggi untuk spam.
Meskipun Dwork & Naor membingkai _proof-of-work_ sebagai disinsentif ekonomi untuk memerangi penyalahgunaan sumber daya, nomenklatur “fungsi penetapan harga” dan “otoritas penetapan harga” mendukung interpretasi yang berbeda dan berbasis pasar: pengguna membeli akses ke sumber daya dengan imbalan komputasi pada tingkat yang sama. harga yang ditetapkan oleh pengontrol sumber daya.
Dalam interpretasi ini, jaringan pengiriman email sebenarnya adalah pengiriman email perdagangan pasar yang terdesentralisasi untuk komputasi. Kesulitan minimum dari _proof-of-work_ adalah harga yang diminta untuk pengiriman email dalam mata uang komputasi.
### Mata Uang Adalah Barang Terdesentralisasi yang kedua
Namun komputasi bukanlah mata uang yang baik.
Bukti yang digunakan untuk “memperdagangkan” komputasi hanya valid untuk _input_ yang digunakan dalam komputasi tersebut. Hubungan yang tidak dapat dipecahkan antara bukti spesifik dan _input_ tertentu berarti bahwa _proof-of-work_ untuk satu _input_ tidak dapat digunakan kembali untuk _input_ yang berbeda.

_Proof-of-work_ awalnya diusulkan sebagai mekanisme kontrol akses untuk membatasi email spam. Pengguna diharapkan memberikan bukti kerja bersama email apa pun yang ingin mereka kirim. Mekanisme ini juga dapat dianggap sebagai pasar di mana pengguna membeli pengiriman email dengan komputasi pada harga yang dipilih oleh penyedia layanan email.
Batasan ini berguna – dapat digunakan untuk mencegah pekerjaan yang dilakukan oleh satu pembeli di pasar kemudian dibelanjakan kembali oleh pembeli lain. Misalnya, HashCash, implementasi nyata pertama dari pasar pengiriman email, menyertakan metadata seperti stempel waktu saat ini dan alamat email pengirim dalam data masukan untuk penghitungan bukti kerja. Bukti yang dihasilkan oleh pengguna tertentu untuk email tertentu, tidak dapat digunakan untuk email yang berbeda.
Namun ini juga berarti bahwa komputasi bukti kerja adalah barang yang dipesan lebih dahulu. Dana tersebut tidak dapat dipertukarkan, tidak dapat dibelanjakan kembali,[^5] dan tidak memecahkan masalah kebutuhan yang terjadi secara kebetulan. Properti moneter yang hilang ini mencegah komputasi menjadi mata uang. Terlepas dari namanya, tidak ada insentif bagi penyedia pengiriman email untuk ingin mengakumulasikan HashCash, karena akan ada uang tunai sebenarnya.
Adam Back, penemu HashCash, memahami masalah berikut:
> "Hashcash tidak dapat ditransfer secara langsung karena untuk membuatnya didistribusikan, setiap penyedia layanan hanya menerima pembayaran dalam bentuk tunai yang dibuat untuk mereka. Anda mungkin dapat menyiapkan pencetakan gaya digicash (dengan chaumian ecash) dan meminta bank hanya mencetak uang tunai pada penerimaan tabrakan hash yang ditangani. Namun ini berarti Anda harus mempercayai bank untuk tidak mencetak uang dalam jumlah tak terbatas untuk digunakan sendiri." - Adam Back, 1997
Kita tidak ingin menukar komputasi yang dibuat khusus untuk setiap barang atau jasa yang dijual dalam perekonomian yang terdesentralisasi. Kita menginginkan mata uang digital serba guna yang dapat langsung digunakan untuk mengoordinasikan pertukaran nilai di pasar mana pun.
Membangun mata uang digital yang berfungsi namun tetap terdesentralisasi merupakan tantangan yang signifikan. Mata uang membutuhkan unit yang dapat dipertukarkan dengan nilai yang sama yang dapat ditransfer antar pengguna. Hal ini memerlukan model penerbitan, definisi kriptografi kepemilikan dan transfer, proses penemuan dan penyelesaian transaksi, dan buku besar historis. Infrastruktur ini tidak diperlukan ketika bukti kerja hanya dianggap sebagai “mekanisme kontrol akses”.
Terlebih lagi, sistem desentralisasi adalah pasar, jadi semua fungsi dasar mata uang ini harus disediakan melalui penyedia layanan berbayar… dalam satuan mata uang yang sedang dibuat!
Seperti mengkompilasi _compiler_ pertama, permulaan jaringan listrik yang gelap, atau evolusi kehidupan itu sendiri, pencipta mata uang digital dihadapkan pada masalah bootstrapping: bagaimana mendefinisikan insentif ekonomi yang mendasari mata uang yang berfungsi tanpa memiliki mata uang yang berfungsi di dalamnya yang akan mendenominasikan atau membayar insentif tersebut.

Komputasi dan mata uang adalah barang pertama dan kedua di pasar yang terdesentralisasi. _Proof-of-work_ sendiri memungkinkan pertukaran komputasi tetapi mata uang yang berfungsi memerlukan lebih banyak infrastruktur. Butuh waktu 15 tahun bagi komunitas cypherpunk untuk mengembangkan infrastruktur tersebut.
### Pasar Terdesentralisasi Pertama harus Memperdagangkan Komputasi untuk Mata Uang
Kemajuan dalam masalah bootstrapping ini berasal dari penyusunan batasan yang tepat.
Sistem yang terdesentralisasi harus menjadi pasar. Pasar terdiri dari pembeli dan penjual yang saling bertukar barang. Pasar terdesentralisasi untuk mata uang digital hanya memiliki dua barang yang dapat dibaca di dalamnya:
1. Komputasi melalui _proof-of-work_
2. Unit mata uang yang kita coba bangun
Oleh karena itu, satu-satunya perdagangan pasar yang memungkinkan adalah antara kedua barang tersebut. Komputasi harus dijual untuk satuan mata uang atau setara dengan satuan mata uang harus dijual untuk komputasi. Menyatakan hal ini sangatlah mudah—bagian tersulitnya adalah menata pasar ini sehingga sekadar menukar mata uang untuk komputasi akan mem-bootstrap semua kemampuan mata uang itu sendiri!
Seluruh sejarah mata uang digital yang berpuncak pada _white paper_ Satoshi tahun 2008 adalah serangkaian upaya yang semakin canggih dalam menata pasar ini. Bagian berikut mengulas proyek-proyek seperti bit gold milik Nick Szabo dan B-money milik Wei Dai. Memahami bagaimana proyek-proyek ini menyusun pasar mereka dan mengapa mereka gagal akan membantu kita memahami mengapa Satoshi dan Bitcoin berhasil.

## Bagaimana Sistem Desentralisasi Dapat Menentukan Harga Komputasi?
Fungsi utama pasar adalah penemuan harga. Oleh karena itu, komputasi perdagangan pasar untuk mata uang harus menemukan harga komputasi itu sendiri, dalam satuan mata uang tersebut.
Kita biasanya tidak memberikan nilai moneter pada komputasi. Kita biasanya menghargai kapasitas untuk melakukan komputasi karena kita menghargai output dari komputasi, bukan komputasi itu sendiri. Jika keluaran yang sama dapat dilakukan dengan lebih efisien, dengan komputasi yang lebih sedikit, hal ini biasanya disebut “kemajuan”.
_Proof-of-work_ mewakili komputasi spesifik yang keluarannya hanya berupa bukti bahwa komputasi tersebut telah dilakukan. Menghasilkan bukti yang sama dengan melakukan lebih sedikit komputasi dan lebih sedikit pekerjaan tidak akan menghasilkan kemajuan—hal ini akan menjadi _bug_. Oleh karena itu, komputasi yang terkait dengan _Proof-of-work_ merupakan hal yang aneh dan baru untuk dicoba dihargai.
Ketika bukti kerja dianggap sebagai disinsentif terhadap penyalahgunaan sumber daya, maka bukti kerja tidak perlu dinilai secara tepat dan konsisten. Yang terpenting adalah penyedia layanan email menetapkan tingkat kesulitan yang cukup rendah sehingga tidak terlihat oleh pengguna yang sah, namun cukup tinggi sehingga menjadi penghalang bagi pelaku spam. Oleh karena itu, terdapat beragam “harga” yang dapat diterima dan setiap peserta bertindak sebagai otoritas penetapan harga mereka sendiri, dengan menerapkan fungsi penetapan harga lokal.
Namun satuan mata uang dimaksudkan agar dapat dipertukarkan, masing-masing memiliki nilai yang sama. Karena perubahan teknologi dari waktu ke waktu, dua unit mata uang yang dibuat dengan tingkat kesulitan _proof-of-work_ yang sama—yang diukur dengan jumlah komputasi yang sesuai—mungkin memiliki biaya produksi yang sangat berbeda di dunia nyata, yang diukur dengan waktu, energi, dan/atau modal untuk melakukan komputasi tersebut. Ketika komputasi dijual dengan menggunakan mata uang, dan biaya produksi yang mendasarinya bervariasi, bagaimana pasar dapat memastikan harga yang konsisten?
Nick Szabo dengan jelas mengidentifikasi masalah harga ini ketika menjelaskan bit gold:
> "Masalah utamanya...adalah bahwa skema pembuktian kerja bergantung pada arsitektur komputer, bukan hanya matematika abstrak yang didasarkan pada "siklus komputasi" abstrak. ...Jadi, ada kemungkinan untuk menjadi produsen berbiaya sangat rendah (dengan beberapa kali lipat besarnya) dan membanjiri pasar dengan bit gold." - Szabo, 2005

Mata uang terdesentralisasi yang diciptakan melalui _proof-of-work_ akan mengalami kelebihan pasokan dan penurunan pasokan seiring dengan perubahan pasokan komputasi seiring waktu. Untuk mengakomodasi volatilitas ini, jaringan harus belajar menghitung harga secara dinamis.
Mata uang digital awal mencoba memberi harga pada komputasi dengan mencoba mengukur “biaya komputasi” secara kolektif. Wei Dai, misalnya, mengusulkan solusi praktis berikut dalam B-money:
> "Jumlah unit moneter yang diciptakan sama dengan biaya upaya komputasi dalam sekeranjang komoditas standar. Sebagai contoh, jika sebuah masalah memerlukan waktu 100 jam untuk diselesaikan pada komputer yang dapat menyelesaikannya dengan cara yang paling ekonomis, dan diperlukan 3 keranjang standar untuk membeli 100 jam waktu komputasi pada komputer tersebut di pasar terbuka, maka setelah solusi terhadap masalah tersebut disiarkan, setiap orang mengkredit rekening penyiar sebanyak 3 unit." - Dai, 1998
Sayangnya, Dai tidak menjelaskan bagaimana pengguna dalam sistem yang seharusnya terdesentralisasi seharusnya menyetujui definisi “keranjang standar”, komputer mana yang memecahkan masalah tertentu “paling ekonomis”, atau biaya komputasi di “pasar terbuka”. Mencapai konsensus di antara semua pengguna mengenai kumpulan data bersama yang berubah-ubah terhadap waktu adalah masalah penting dalam sistem desentralisasi!
Agar adil bagi Dai, dia menyadari hal ini:
> “Salah satu bagian yang lebih bermasalah dalam protokol B-money adalah penciptaan uang. Bagian dari protokol ini mengharuskan semua \[pengguna\] memutuskan dan menyetujui biaya perhitungan tertentu. Sayangnya karena teknologi komputasi cenderung berkembang pesat dan tidak selalu bersifat publik, informasi ini mungkin tidak tersedia, tidak akurat, atau ketinggalan jaman, yang semuanya akan menyebabkan masalah serius pada protokol." - Dai, 1998
Dai kemudian mengusulkan mekanisme penetapan harga berbasis lelang yang lebih canggih yang kemudian dikatakan Satoshi sebagai titik awal idenya. Kita akan kembali ke skema lelang di bawah ini, tapi pertama-tama mari kita beralih ke bit gold, dan pertimbangkan wawasan Szabo tentang masalahnya.
### Gunakan Pasar Eksternal
Szabo mengklaim bahwa _proof-of-work_ harus “diberi stempel waktu dengan aman”:
> "Bukti kerja diberi stempel waktu yang aman. Ini harus bekerja secara terdistribusi, dengan beberapa layanan stempel waktu berbeda sehingga tidak ada layanan stempel waktu tertentu yang perlu diandalkan secara substansial." - Szabo, 2005
Szabo tertaut ke halaman sumber daya tentang protokol penandaan waktu yang aman tetapi tidak menjelaskan algoritme spesifik apa pun untuk penandaan waktu yang aman. Ungkapan “aman” dan “fesyen terdistribusi” mempunyai pengaruh yang besar di sini, sehingga dapat mengatasi kerumitan dalam mengandalkan satu (atau banyak) layanan “di luar sistem” untuk penandaan waktu.[^6]

Waktu pembuatan unit mata uang digital penting karena menghubungkan komputasi yang dilakukan dengan biaya produksi di dunia nyata.
Terlepas dari ketidakjelasan implementasi, Szabo benar—waktu pembuatan _proof-of-work_ merupakan faktor penting dalam menentukan harga karena terkait dengan biaya komputasi:
> "…Namun, karena bit gold diberi stempel waktu, waktu yang dibuat serta tingkat kesulitan matematis dari pekerjaan tersebut dapat dibuktikan secara otomatis. Dari sini, biasanya dapat disimpulkan berapa biaya produksi selama periode waktu tersebut..." - Szabo, 2005
"Menyimpulkan" biaya produksi adalah hal yang penting karena bit gold tidak memiliki mekanisme untuk membatasi penciptaan uang. Siapapun dapat membuat bit gold dengan melakukan perhitungan yang sesuai. Tanpa kemampuan untuk mengatur penerbitan, bit gold sama dengan barang koleksi:
> "…Tidak seperti atom emas yang dapat dipertukarkan, tetapi seperti halnya barang-barang kolektor, pasokan dalam jumlah besar selama jangka waktu tertentu akan menurunkan nilai barang-barang tersebut. Dalam hal ini, emas kecil bertindak lebih seperti barang-barang kolektor daripada seperti emas..." - Szabo, 2005
Bit gold memerlukan proses eksternal tambahan untuk menciptakan unit mata uang yang sepadan:
> “…\[B\]it Gold tidak dapat dipertukarkan berdasarkan fungsi sederhana, misalnya, panjang tali. Sebaliknya, untuk membuat unit yang dapat dipertukarkan, _dealer_ harus menggabungkan potongan-potongan bit gold dengan nilai berbeda ke dalam satuan yang lebih besar kira-kira dengan nilai yang sama. Hal ini serupa dengan apa yang dilakukan banyak pedagang komoditas saat ini untuk memungkinkan pasar komoditas bekerja. Kepercayaan masih terdistribusi karena perkiraan nilai dari kumpulan tersebut dapat diverifikasi secara independen oleh banyak pihak lain dengan cara yang sebagian besar atau seluruhnya otomatis." - Szabo, 2005
Mengutip Szabo, “untuk menguji nilai… bit gold, _dealer_ memeriksa dan memverifikasi tingkat kesulitan, masukan, dan stempel waktu”. _Dealer_ yang mendefinisikan “unit yang lebih besar dengan nilai yang kira-kira sama” menyediakan fungsi penetapan harga yang serupa dengan “keranjang komoditas standar” Dai. Unit yang dapat dipertukarkan tidak dibuat dalam bentuk bit gold ketika bukti kerja diproduksi, hanya kemudian ketika bukti tersebut digabungkan menjadi “unit yang kira-kira bernilai sama” oleh _dealer_ di pasar di luar jaringan.

Yang patut disyukuri, Szabo mengakui kelemahan ini:
> "…Potensi kelebihan pasokan yang awalnya tersembunyi karena inovasi tersembunyi dalam arsitektur mesin adalah potensi kelemahan dalam bit gold, atau setidaknya ketidaksempurnaan yang harus diatasi oleh lelang awal dan pertukaran ex post bit gold." - Szabo, 2005
Sekali lagi, meskipun belum sampai pada (yang sekarang kita kenal sebagai) solusinya, Szabo menunjukkan solusinya: karena biaya komputasi berubah seiring waktu, jaringan harus merespons perubahan pasokan komputasi dengan menyesuaikan harga uang.
### Gunakan Pasar Internal
_Dealer_ Szabo akan menjadi pasar eksternal yang menentukan harga (bundel dari) bit gold setelah penciptaannya. Apakah mungkin menerapkan pasar ini di dalam sistem dan bukan di luar sistem?
Mari kita kembali ke Wei Dai dan B-money. Seperti disebutkan sebelumnya, Dai mengusulkan model alternatif berbasis lelang untuk pembuatan B-money. Desain Satoshi untuk Bitcoin meningkat secara langsung pada model lelang B-money[^7]:
“Jadi saya mengusulkan subprotokol penciptaan uang alternatif, di mana \[pengguna\]… memutuskan dan menyetujui jumlah B-money yang akan dibuat setiap periode, dengan biaya pembuatan uang tersebut ditentukan melalui lelang. Setiap periode pembuatan uang adalah dibagi menjadi empat tahap, sebagai berikut:
**_Planning_**. Para \[pengguna\] menghitung dan bernegosiasi satu sama lain untuk menentukan peningkatan jumlah uang beredar yang optimal untuk periode berikutnya. Apakah \[jaringan\] dapat mencapai konsensus atau tidak, mereka masing-masing menyiarkan kuota penciptaan uang mereka dan komputasi makroekonomi apa pun yang dilakukan untuk mendukung angka tersebut.
**_Bidding_**. Siapapun yang ingin membuat B-money menyiarkan tawaran dalam bentuk dimana x adalah banyaknya B-money yang ingin dibuatnya, dan y adalah soal yang belum terselesaikan dari kelas soal yang telah ditentukan. Setiap masalah di kelas ini harus memiliki biaya nominal (katakanlah dalam MIPS\-years) yang disetujui secara publik.
**_Computation_**. Setelah melihat penawaran, pihak yang mengajukan penawaran pada tahap penawaran sekarang dapat menyelesaikan masalah dalam penawarannya dan menyiarkan solusinya. Penciptaan uang.
**_Money creation_**. Setiap \[pengguna\] menerima tawaran tertinggi (di antara mereka yang benar-benar menyiarkan solusi) dalam hal biaya nominal per unit B-money yang dibuat dan memberikan kredit kepada akun penawar sesuai dengan itu."
\- Dai, 1998
B-money membuat kemajuan signifikan menuju struktur pasar yang tepat untuk mata uang digital. Ini berupaya untuk menghilangkan _dealer_ eksternal Szabo dan memungkinkan pengguna untuk terlibat dalam penemuan harga dengan menawar satu sama lain secara langsung.
Namun menerapkan proposal Dai seperti yang tertulis akan menjadi sebuah tantangan:
* Dalam fase "_Planning_”, pengguna menanggung beban menegosiasikan “peningkatan optimal jumlah uang beredar untuk periode berikutnya”. Bagaimana “optimal” harus didefinisikan, bagaimana pengguna harus bernegosiasi satu sama lain, dan bagaimana hasil negosiasi tersebut dibagikan tidak dijelaskan.
* Terlepas dari apa yang direncanakan, fase “_Bidding_” memungkinkan siapa saja untuk mengajukan “tawaran” untuk membuat B-money. Tawaran mencakup jumlah B-money yang akan dibuat serta jumlah bukti kerja yang sesuai sehingga setiap penawaran adalah harga, jumlah perhitungan yang bersedia dilakukan oleh penawar tertentu untuk membeli sejumlah tertentu. dari B-money.
* Setelah penawaran diserahkan, fase “_Computation_” terdiri dari peserta lelang yang melakukan _proof-of-work_ yang mereka tawarkan dan menyiarkan solusi. Tidak ada mekanisme untuk mencocokkan penawar dengan solusi yang disediakan. Yang lebih problematis adalah tidak jelasnya bagaimana pengguna dapat mengetahui bahwa semua penawaran telah diajukan – kapan fase “_Bidding_” berakhir dan fase “_Computation_” dimulai?
* Masalah-masalah ini berulang dalam fase “_Money creation_”. Karena sifat _proof-of-work_, pengguna dapat memverifikasi bahwa bukti yang mereka terima dalam solusi adalah asli. Namun bagaimana pengguna dapat secara kolektif menyepakati serangkaian “tawaran tertinggi”? Bagaimana jika pengguna yang berbeda memilih set yang berbeda, baik karena preferensi atau latensi jaringan?
Sistem yang terdesentralisasi kesulitan dalam melacak data dan membuat pilihan secara konsisten, namun B-money memerlukan pelacakan tawaran dari banyak pengguna dan membuat pilihan konsensus di antara mereka. Kompleksitas ini menghalangi penerapan B-money.
Akar dari kompleksitas ini adalah keyakinan Dai bahwa tingkat “optimal” penciptaan B-money harus berfluktuasi seiring waktu berdasarkan “perhitungan makroekonomi” penggunanya. Seperti bit gold, B-money tidak memiliki mekanisme untuk membatasi penciptaan uang. Siapapun dapat membuat unit B-money dengan menyiarkan tawaran dan kemudian melakukan _proof-of-work_ yang sesuai.
Baik Szabo maupun Dai mengusulkan penggunaan pasar pertukaran mata uang digital untuk komputasi, namun baik bit gold maupun B-money tidak menentukan kebijakan moneter untuk mengatur pasokan mata uang di pasar ini.
## Tujuan Kebijakan Moneter Satoshi Menghasilkan Bitcoin
Sebaliknya, kebijakan moneter yang sehat adalah salah satu tujuan utama Satoshi dalam proyek Bitcoin. Dalam postingan milis pertama tempat Bitcoin diumumkan, Satoshi menulis:
> “Akar permasalahan mata uang konvensional adalah kepercayaan yang diperlukan agar mata uang tersebut dapat berfungsi. Bank sentral harus dipercaya untuk tidak merendahkan mata uang tersebut, namun sejarah mata uang fiat penuh dengan pelanggaran terhadap kepercayaan tersebut.” - Satoshi, 2009
Satoshi selanjutnya menjelaskan masalah lain dengan mata uang fiat seperti perbankan cadangan fraksional yang berisiko, kurangnya privasi, pencurian & penipuan yang merajalela, dan ketidakmampuan melakukan pembayaran mikro. Namun Satoshi memulai dengan isu penurunan nilai oleh bank sentral—dengan kekhawatiran mengenai kebijakan moneter.
Satoshi ingin Bitcoin pada akhirnya mencapai pasokan sirkulasi terbatas yang tidak dapat terdilusi seiring waktu. Tingkat penciptaan Bitcoin yang “optimal”, bagi Satoshi, pada akhirnya akan menjadi nol.
Tujuan kebijakan moneter ini, lebih dari karakteristik lain yang mereka miliki secara pribadi (atau kolektif!), adalah alasan Satoshi “menemukan” Bitcoin, blockchain, konsensus Nakamoto, dll. —dan bukan orang lain. Ini adalah jawaban singkat atas pertanyaan yang diajukan dalam judul artikel ini: Satoshi memikirkan Bitcoin karena mereka fokus pada penciptaan mata uang digital dengan persediaan terbatas.
Pasokan Bitcoin yang terbatas bukan hanya tujuan kebijakan moneter atau meme bagi para Bitcoiner untuk berkumpul. Penyederhanaan teknis penting inilah yang memungkinkan Satoshi membangun mata uang digital yang berfungsi sementara B-money Dai tetap menjadi postingan web yang menarik.
Bitcoin adalah B-money dengan persyaratan tambahan berupa kebijakan moneter yang telah ditentukan. Seperti banyak penyederhanaan teknis lainnya, pembatasan kebijakan moneter memungkinkan kemajuan dengan mengurangi ruang lingkup. Mari kita lihat bagaimana masing-masing fase pembuatan B-money disederhanakan dengan menerapkan batasan ini.
### Semua Pasokan 21 Juta Bitcoin Sudah Ada
Dalam b-money, setiap “periode penciptaan uang” mencakup fase “Perencanaan”, di mana pengguna diharapkan untuk membagikan “perhitungan makroekonomi” mereka yang membenarkan jumlah b-money yang ingin mereka ciptakan pada saat itu. Tujuan kebijakan moneter Satoshi yaitu pasokan terbatas dan emisi nol tidak sesuai dengan kebebasan yang diberikan b-money kepada pengguna individu untuk menghasilkan uang. Oleh karena itu, langkah pertama dalam perjalanan dari bmoney ke bitcoin adalah menghilangkan kebebasan ini. Pengguna bitcoin perorangan tidak dapat membuat bitcoin. Hanya jaringan bitcoin yang dapat membuat bitcoin, dan hal ini terjadi tepat sekali, pada tahun 2009 ketika Satoshi meluncurkan proyek bitcoin.
Satoshi mampu menggantikan fase “Perencanaan” b-money yang berulang menjadi satu jadwal yang telah ditentukan sebelumnya di mana 21 juta bitcoin yang dibuat pada tahun 2009 akan dilepaskan ke peredaran. Pengguna secara sukarela mendukung kebijakan moneter Satoshi dengan mengunduh dan menjalankan perangkat lunak Bitcoin Core yang kebijakan moneternya dikodekan secara keras.
Hal ini mengubah semantik pasar bitcoin untuk komputasi. Bitcoin yang dibayarkan kepada penambang bukanlah hal baru yang diterbitkan; itu melainkan baru dirilis ke peredaran dari persediaan yang ada.
Pandangan ini sangat berbeda dari klaim naif bahwa “penambang bitcoin menciptakan bitcoin”. Penambang Bitcoin tidak menciptakan bitcoin, mereka membelinya. Bitcoin tidak berharga karena “bitcoin terbuat dari energi”—tetapi nilai bitcoin didemonstrasikan dengan dijual untuk mendapatkan energi.
Mari kita ulangi sekali lagi: bitcoin tidak dibuat melalui _proof-of-work_, bitcoin dibuat melalui konsensus.

Desain Satoshi menghilangkan persyaratan untuk fase “Perencanaan” yang berkelanjutan dari b-money dengan melakukan semua perencanaan terlebih dahulu. Hal ini memungkinkan Satoshi untuk membuat kebijakan moneter yang sehat namun juga menyederhanakan penerapan bitcoin.
### Bitcoin dihargai Melalui Konsensus
Kebebasan yang diberikan kepada pengguna untuk menghasilkan uang menimbulkan beban yang sesuai bagi jaringan bmoney. Selama fase “Penawaran” jaringan b-money harus mengumpulkan dan membagikan “tawaran” pembuatan uang dari banyak pengguna yang berbeda.
Menghilangkan kebebasan untuk menghasilkan uang akan meringankan beban jaringan bitcoin. Karena seluruh 21 juta bitcoin sudah ada, jaringan tidak perlu mengumpulkan tawaran dari pengguna untuk menghasilkan uang, jaringan hanya perlu menjual bitcoin sesuai jadwal Satoshi yang telah ditentukan.
Jaringan bitcoin dengan demikian menawarkan konsensus harga permintaan untuk bitcoin yang dijualnya di setiap blok. Harga tunggal ini dihitung oleh setiap node secara independen menggunakan salinan blockchainnya. Jika node memiliki konsensus pada blockchain yang sama (poin yang akan kita bahas nanti) mereka semua akan menawarkan harga permintaan yang sama di setiap blok.[^8]
Bagian pertama kalkulasi harga konsensus menentukan berapa banyak bitcoin yang akan dijual. Hal ini diperbaiki oleh jadwal rilis Satoshi yang telah ditentukan sebelumnya. Semua node bitcoin di jaringan menghitung jumlah yang sama untuk blok tertentu:
`$ bitcoin-cli getblockstats <block\_height> {... "subsidy": 6250000000, ... } # 6.25 BTC`
Bagian kedua dari harga yang diminta secara konsensus adalah jumlah komputasi yang akan menjual subsidi saat ini. Sekali lagi, semua node bitcoin di jaringan menghitung nilai yang sama (kita akan meninjau kembali kalkulasi tingkat kesulitan ini di bagian berikutnya):
`$ bitcoin-cli getdifficulty {... "result": 55621444139429.57, ... }`
Bersama-sama, subsidi dan kesulitan jaringan menentukan permintaan bitcoin saat ini sebagai mata uang komputasi. Karena blockchain berada dalam konsensus, harga ini adalah harga konsensus.
Pengguna b-money juga dianggap memiliki konsensus “blockchain” yang berisi riwayat semua transaksi. Namun Dai tidak pernah memikirkan solusi sederhana berupa konsensus tunggal yang meminta harga untuk pembuatan b-money baru, yang hanya ditentukan oleh data di blockchain tersebut.
Sebaliknya, Dai berasumsi bahwa penciptaan uang harus berlangsung selamanya. Oleh karena itu, pengguna individu perlu diberdayakan untuk mempengaruhi kebijakan moneter – seperti halnya mata uang fiat. Persyaratan yang dirasakan ini membuat Dai merancang sistem penawaran yang mencegah penerapan b-money.
Kompleksitas tambahan ini dihilangkan dengan persyaratan Satoshi mengenai kebijakan moneter yang telah ditentukan sebelumnya.
### Waktu Menutup Semua Penyebaran
Dalam fase “Komputasi” b-money, pengguna individu akan melakukan komputasi yang telah mereka lakukan dalam penawaran sebelumnya. Dalam bitcoin, seluruh jaringan adalah penjual – tetapi siapa pembelinya?
Di pasar pengiriman email, pembelinya adalah individu yang ingin mengirim email. Otoritas penetapan harga, penyedia layanan email, akan menetapkan harga yang dianggap murah bagi individu namun mahal bagi pelaku spam. Namun jika jumlah pengguna yang sah bertambah, harganya masih bisa tetap sama karena kekuatan komputasi masing-masing pengguna akan tetap sama.
Di b-money, setiap pengguna yang menyumbangkan tawaran untuk pembuatan uang selanjutnya harus melakukan sendiri jumlah komputasi yang sesuai. Setiap pengguna bertindak sebagai otoritas penetapan harga berdasarkan pengetahuan mereka tentang kemampuan komputasi mereka sendiri.
Jaringan bitcoin menawarkan satu harga yang diminta dalam komputasi subsidi bitcoin saat ini. Namun tidak ada penambang individu yang menemukan blok yang melakukan komputasi sebanyak ini.[^9] Blok pemenang penambang individu adalah bukti bahwa semua penambang secara kolektif melakukan jumlah komputasi yang diperlukan. Pembeli bitcoin dengan demikian adalah industri penambangan bitcoin global.
Setelah mencapai konsensus harga yang diminta, jaringan bitcoin tidak akan mengubah harga tersebut sampai lebih banyak blok diproduksi. Blok-blok ini harus berisi _proof-of-work_ dengan harga yang diminta saat ini. Oleh karena itu, industri pertambangan tidak punya pilihan jika ingin “melakukan perdagangan” selain membayar harga yang diminta saat ini dalam komputasi.
Satu-satunya variabel yang dapat dikontrol oleh industri pertambangan adalah berapa lama waktu yang dibutuhkan untuk memproduksi blok berikutnya. Sama seperti jaringan bitcoin yang menawarkan satu harga yang diminta, industri pertambangan juga menawarkan satu penawaran—waktu yang diperlukan untuk menghasilkan blok berikutnya yang memenuhi harga yang diminta jaringan saat ini.
> Untuk mengimbangi peningkatan kecepatan perangkat keras dan minat yang berbeda-beda dalam menjalankan node dari waktu ke waktu, kesulitan _proof-of-work_ ditentukan oleh rata-rata bergerak yang menargetkan jumlah rata-rata blok per jam. Jika dihasilkan terlalu cepat, kesulitannya akan meningkat. - Nakamoto, 2008
Satoshi dengan sederhana menjelaskan algoritma penyesuaian kesulitan, yang sering disebut sebagai salah satu ide paling orisinal dalam implementasi bitcoin. Hal ini benar, namun alih-alih berfokus pada daya cipta solusi, mari kita fokus pada mengapa penyelesaian masalah sangat penting bagi Satoshi.
Proyek-proyek seperti bit gold dan b-money tidak perlu membatasi nilai tukar pada saat penciptaan uang karena mereka tidak memiliki pasokan tetap atau kebijakan moneter yang telah ditentukan sebelumnya. Periode penciptaan uang yang lebih cepat atau lebih lambat dapat dikompensasikan melalui cara lain, misalnya melalui pajak. _Dealer_ eksternal memasukkan token bit gold ke dalam _bundler_ yang lebih besar atau lebih kecil atau pengguna b-money mengubah tawaran mereka.
Namun tujuan kebijakan moneter Satoshi mengharuskan bitcoin memiliki tingkat pelepasan bitcoin yang telah ditentukan untuk diedarkan. Membatasi laju (statistik) produksi blok dari waktu ke waktu adalah hal yang wajar dalam bitcoin karena laju produksi blok adalah laju penjualan pasokan awal bitcoin. Menjual 21 juta bitcoin selama 140 tahun adalah proposisi yang berbeda dibandingkan membiarkannya dijual dalam 3 bulan.
Selain itu, bitcoin sebenarnya dapat menerapkan batasan ini karena blockchain adalah “protokol cap waktu aman” milik Szabo. Satoshi menggambarkan bitcoin sebagai yang pertama dan terutama sebagai “server stempel waktu terdistribusi secara peer-to-peer,” dan implementasi awal kode sumber bitcoin menggunakan “rantai waktu” dunia, bukan “blockchain” untuk menggambarkan struktur data bersama yang mengimplementasikan pasar _proof-of-work_ bitcoin.[^10]

Tidak seperti bit gold atau b-money, token dalam bitcoin tidak mengalami kelebihan pasokan. Jaringan bitcoin menggunakan penyesuaian kesulitan untuk mengubah harga uang sebagai respons terhadap perubahan pasokan komputasi.
Algoritme penyesuaian ulang kesulitan Bitcoin memanfaatkan kemampuan ini. Blockchain konsensus digunakan oleh peserta untuk menghitung penawaran historis yang dibuat oleh industri pertambangan dan menyesuaikan kembali kesulitan agar bisa mendekati waktu blok target.
### Pesanan Terunggul Menciptakan Konsensus
Rantai penyederhanaan yang disebabkan oleh tuntutan kebijakan moneter yang kuat meluas ke fase “penciptaan uang” dari b-money.
Tawaran yang diajukan pengguna di b-money mengalami masalah “tidak ada yang dipertaruhkan”. Tidak ada mekanisme untuk mencegah pengguna mengajukan tawaran dengan sejumlah besar b-money untuk pekerjaan yang sangat sedikit. Hal ini mengharuskan jaringan untuk melacak tawaran mana yang telah diselesaikan dan hanya menerima “tawaran tertinggi…dalam hal biaya nominal per unit b-money yang dibuat” untuk menghindari tawaran yang mengganggu tersebut. Setiap peserta b-money harus melacak seluruh tawaran senilai buku pesanan, mencocokkan tawaran dengan perhitungan selanjutnya, dan hanya menyelesaikan pesanan yang telah selesai dengan harga tertinggi.
Masalah ini merupakan contoh dari masalah konsensus yang lebih umum dalam sistem desentralisasi, yang juga dikenal sebagai “_Byzantine generals_” atau terkadang masalah “pembelanjaan ganda” dalam konteks mata uang digital. Berbagi urutan data yang identik di antara semua peserta merupakan suatu tantangan dalam jaringan yang saling bermusuhan dan terdesentralisasi. Solusi yang ada untuk masalah ini – yang disebut “algoritma konsensus _Byzantine-fault tolerant_ (BFT)” – memerlukan koordinasi sebelumnya di antara peserta atau mayoritas (>67%) peserta agar tidak berperilaku bermusuhan.
Bitcoin tidak harus mengelola buku pesanan dalam jumlah besar karena jaringan bitcoin menawarkan harga permintaan konsensus tunggal. Ini berarti node bitcoin dapat menerima blok pertama (valid) yang mereka lihat yang memenuhi harga yang diminta jaringan saat ini—tawaran gangguan dapat dengan mudah diabaikan dan merupakan pemborosan sumber daya penambang.
Komputasi harga berdasarkan konsensus memungkinkan pencocokan pesanan beli/jual dalam bitcoin dilakukan secara antusias, dengan sistem siapa cepat dia dapat. Berbeda dengan b-money, pencocokan pesanan yang cepat ini berarti bahwa pasar bitcoin tidak memiliki fase—pasar ini beroperasi terus-menerus, dengan harga konsensus baru dihitung setelah setiap pesanan dicocokkan (blok ditemukan). Untuk menghindari percabangan yang disebabkan oleh latensi jaringan atau perilaku bertentangan, node juga harus mengikuti aturan rantai terberat. Aturan penyelesaian pesanan yang serakah ini memastikan bahwa hanya tawaran tertinggi yang diterima oleh jaringan.
Kombinasi algoritma yang antusias dan serakah ini, dimana node menerima blok valid pertama yang mereka lihat dan juga mengikuti rantai terberat, adalah algoritma BFT baru yang dengan cepat menyatu pada konsensus tentang urutan blok. Satoshi menghabiskan 25% dari _white paper_ bitcoin untuk mendemonstrasikan klaim ini.[^11]
Kita telah menetapkan di bagian sebelumnya bahwa harga permintaan konsensus bitcoin itu sendiri bergantung pada konsensus blockchain. Namun ternyata keberadaan harga permintaan konsensus tunggal inilah yang memungkinkan perhitungan pasar untuk mencocokkan pesanan dengan penuh semangat, dan itulah yang pertama-tama mengarah pada konsensus!
Terlebih lagi, “konsensus Nakamoto” yang baru ini hanya mengharuskan 50% peserta untuk tidak bertentangan, sebuah kemajuan yang signifikan dibandingkan dengan kondisi sebelumnya. Seorang cypherpunk seperti Satoshi membuat terobosan ilmu komputer teoretis ini, dibandingkan dengan akademisi tradisional atau peneliti industri, karena fokus mereka yang sempit pada penerapan uang yang sehat, dibandingkan algoritma konsensus umum untuk komputasi terdistribusi.
## Kesimpulan
B-money adalah kerangka kerja yang kuat untuk membangun mata uang digital tetapi tidak lengkap karena tidak memiliki kebijakan moneter. Membatasi b-money dengan jadwal rilis yang telah ditentukan untuk bitcoin mengurangi cakupan dan menyederhanakan implementasi dengan menghilangkan persyaratan untuk melacak dan memilih di antara tawaran pembuatan uang yang diajukan pengguna. Mempertahankan kecepatan sementara dari jadwal rilis Satoshi menghasilkan algoritma penyesuaian kesulitan dan memungkinkan konsensus Nakamoto, yang secara luas diakui sebagai salah satu aspek paling inovatif dalam implementasi bitcoin.
Ada lebih banyak hal dalam desain bitcoin daripada aspek yang dibahas sejauh ini. Kita memfokuskan artikel ini pada pasar “utama” dalam bitcoin, pasar yang mendistribusikan pasokan awal bitcoin ke dalam sirkulasi.
Artikel berikutnya dalam seri ini akan mengeksplorasi pasar penyelesaian transaksi bitcoin dan kaitannya dengan pasar pendistribusian pasokan bitcoin. Hubungan ini akan menyarankan metodologi bagaimana membangun pasar masa depan untuk layanan terdesentralisasi selain bitcoin.
Sumber artikel: _HOW DID SATOSHI THINK OF BITCOIN?_ [ https://bitcoinmagazine.com/technical/how-did-satoshi-think-of-bitcoin](https://bitcoinmagazine.com/technical/how-did-satoshi-think-of-bitcoin)
Diterjemahkan oleh: Abengkris
[^1]: Judul seri ini diambil dari pesan telegraf pertama dalam sejarah, yang dikirimkan oleh Samuel Morse pada tahun 1844: _“What hath God wrought?”_.
[^2]: Bitcoin: Sistem Uang Elektronik _Peer-to-Peer_, tersedia di: [ https://bitcoin.org/bitcoin.pdf](https://bitcoin.org/bitcoin.pdf)
[^3]: _Pricing via Processing or Combatting Junk Mail_ oleh Dwork dan Naor. tersedia di:
[ https://www.wisdom.weizmann.ac.il/../../pvp.pdf](https://www.wisdom.weizmann.ac.il/~naor/PAPERS/pvp.pdf)
[^4]: Meskipun merupakan pencetus ide tersebut, Dwork & Naor tidak menciptakan “_proof-of-work_”—julukan tersebut kemudian diberikan pada tahun 1999 oleh Markus Jakobsson dan Ari Juels.
[^5]: Proyek RPoW Hal Finney adalah upaya untuk menciptakan _proof-of-work_ yang dapat ditransfer, tetapi bitcoin tidak menggunakan konsep ini karena tidak memperlakukan komputasi sebagai mata uang. Seperti yang akan kita lihat nanti ketika kita memeriksa bit gold dan b-money, komputasi tidak dapat berupa mata uang karena nilai komputasi berubah seiring waktu sementara unit mata uang harus memiliki nilai yang sama. Bitcoin bukanlah komputasi, bitcoin adalah mata uang yang dijual untuk komputasi.
[^6]: Pada saat ini, beberapa pembaca mungkin percaya bahwa saya meremehkan kontribusi Dai atau Szabo karena kontribusi mereka tidak jelas atau tidak jelas dalam beberapa hal. Perasaan saya justru sebaliknya: Dai dan Szabo pada dasarnya benar dan fakta bahwa mereka tidak mengartikulasikan setiap detail seperti yang dilakukan Satoshi tidak mengurangi kontribusi mereka. Sebaliknya, hal ini seharusnya meningkatkan apresiasi kita terhadap hal tersebut, karena hal ini menunjukkan betapa menantangnya munculnya mata uang digital, bahkan bagi para praktisi terbaiknya.
[^7]: Postingan b-money Dai adalah referensi pertama dalam _white paper_ Satoshi, tersedia di: [ http://www.weidai.com/bmoney.txt](http://www.weidai.com/bmoney.txt)
[^8]: Ada dua penyederhanaan yang dilakukan di sini: 1. Jumlah bitcoin yang dijual di setiap blok juga dipengaruhi oleh biaya transaksi pasar, yang berada di luar cakupan artikel ini, namun tetap menunggu pekerjaan selanjutnya. 2. Kesulitan yang dilaporkan oleh bitcoin bukanlah jumlah perhitungan yang diharapkan; seseorang harus mengalikannya dengan faktor proporsionalitas.
[^9]: Setidaknya sejak masa lalu yang buruk ketika Satoshi adalah satu-satunya penambang di jaringan.
[^10]: _Bitcoin is Time_ klasik dari Gigi adalah pengenalan yang bagus tentang hubungan mendalam antara bitcoin dan waktu, tersedia di: [ https://dergigi.com/2021/01/14/bitcoin-is-time/](https://dergigi.com/2021/01/14/bitcoin-is-time/)
[^11]: Satoshi melakukan kesalahan baik dalam analisis mereka di buku putih maupun implementasi awal bitcoin berikutnya dengan menggunakan aturan “rantai terpanjang” dan bukan aturan “rantai terberat”.
-

@ fd78c37f:a0ec0833
2024-12-11 01:32:23
Bitcoin, as a decentralized digital currency, is reshaping the global financial landscape, sparking innovation and transformation across various sectors. In South America, Bitcoin communities are emerging as crucial drivers of economic empowerment, financial inclusion, and local technological advancement. This issue will highlight 21 Bitcoin communities from South America, exploring their missions, growth trajectories, and recent developments. By examining these grassroots initiatives, we aim to show how Bitcoin is being leveraged to create sustainable economic ecosystems, foster social progress, and expand access to education and financial tools. Thank you, YakiHonne decentralized media client on Nostr to support people in owning their voice. #iOS #Android, for supporting the publication of the Bitcoin Community Newsletter. Most of the content has been reviewed and confirmed by the South American communities. If there are any omissions, please feel free to reach out to me.
**1**.**[Mi Primer Bitcoin ]( https://yakihonne.com/users/nprofile1qqs0vzw43dp9x3v8drvm4udj326dld0ku6gdnxajwcxg8h36ssxrags952hav)**
nostr:npub17cyatz6z2dzcw6xehtcm9z45m76lde5smxdmyasvs00r4pqv863qrs4ml3
* **Introduction**
My First Bitcoin is a Bitcoin education initiative rooted in the principles of independence, fairness, and community leadership. Originating in El Salvador, it aims to empower individuals and communities by providing open-source educational resources and fostering a decentralized network. Through a commitment to high-quality education, resistance to external influence, and the creation of a global collaborative network, it seeks to spread Bitcoin education to every corner of the world, offering a transparent and transformative model for reshaping traditional financial systems.
* **Latest Updates**
Recently, MyfirstBitcoin successfully hosted the fourth [Bitcoin Educators Unconference]( https://x.com/MyfirstBitcoin_/status/1854554521474597195), featuring guests such as nostr:npub1zfgx8v2g0faswd0ry2qn3ay4pvx4jr6q4fw9d0yqalpkyv9hhp0sjccnj5 nostr:npub1rhh9pkmf6l6z7298yg6fgp95rzkmx4j9uxpekn8j73p5k95ck7gsvce7vj attracting around 170 participants and receiving positive feedback. They also held the graduation ceremony in Ilopango, El Salvador, and continued to organize their regular monthly Bitcoin education meetups and Bitcoin game nights. Additionally, MyfirstBitcoin’s Bitcoin Educators Node Network welcomed four new projects from Canada, Nigeria, and the United States. In partnership with Bitcoin Boma, they are launching [a free online Bitcoin education course for Malawi]( https://x.com/BitcoinBoma/status/1862860266553090512) in January 2025, aimed at enhancing local Bitcoin knowledge.
**2**.**[Bitcoin Beach]( https://x.com/Bitcoinbeach)**
* **Introduction**
Bitcoin Beach is a groundbreaking initiative in El Salvador aimed at fostering sustainable local economic development through Bitcoin. The project provides financial services to the community, particularly for those without access to traditional banking. By using Bitcoin for payments, residents can cover everyday expenses such as utility bills, medical costs, and food. Bitcoin Beach leverages the Lightning Network and community collaboration to promote the adoption of Bitcoin both within El Salvador and globally.
* **Latest Updates**
Recently, Bitcoin Beach attended the conference at Bitcoin Lake, where they hosted the Bitcoin Beach Meetup and Bitcoin Beach Festival to support local businesses with Bitcoin. They also invited notable figures such as nostr:npub1q0al05h2uvtj0fp8ww7etl0pdjnkum638ynz9tmku3e522fyvlmqjq04mt Hermann Buhr-Vivier, nostr:npub164xhe3pgcqaj70ls7ls5e4hwlnvl4ttuu8wns99jmwp5z6lwhutsa27wle as podcast guests. The discussions covered a range of impactful topics, including how Bitcoin mining can truly light up rural Africa, how to use Bitcoin to transform small towns in South Africa, and integrating Bitcoin into state-level policies across the United States, among other key areas.
**[3.Praia Bitcoin Brazil]( https://x.com/BitcoinBeachBR)**
nostr:npub1m3tu3l6y59g2tmackq23v5vgn59u7hu66gxg8xajghz59tqm6xnqk2m888
* **Introduction**
Praia Bitcoin Brazil, located in Jericoacoara, Brazil, is dedicated to creating the country's first Bitcoin circular economy, empowering local residents with financial inclusion. Founded by Fernando Motolese, the project promotes Bitcoin adoption through education, technology, and community-driven initiatives. It has integrated over 40 local businesses into the Bitcoin ecosystem and raised more than 12 BTC through Bitcoin-only crowdfunding. Praia Bitcoin offers self-sovereign financial services and runs programs like the "Bitcoin Smiles" initiative and educational support for children.
* **Latest Updates**
Recently, Praia Bitcoin Brazil launched several innovative projects, including the first stage lighting course and free acoustic guitar course funded entirely through Bitcoin crowdfunding. Additionally, Praia Bitcoin successfully hosted the [Praia Bitcoin Conference 2024]( https://x.com/BitcoinBeachBR/status/1855936971970949382), attracting 10 volunteers, 100 local residents, and 10 new merchants. The conference also sponsored the first music performance paid in Bitcoin and introduced three local courses, all funded via Bitcoin crowdfunding. These initiatives highlight Praia Bitcoin's ongoing efforts to drive Bitcoin adoption and foster local community development.
**[4.Bitcoin Lake / Lago Bitcoin Guatemala]( https://yakihonne.com/users/npub1a4excy7uf9z3mcafvm9cwdr549dl5lpazuvpr2nc550vf27n5a4scqq5k2)**
nostr:npub1a4excy7uf9z3mcafvm9cwdr549dl5lpazuvpr2nc550vf27n5a4scqq5k2
* **Introduction**
Bitcoin Lake aims to create a circular economy powered by Bitcoin, providing a novel and accessible solution for unbanked as well as banked merchants in Guatemala.
* **Latest Updates**
The Bitcoin Lake community has been actively preparing and promoting a series of innovative initiatives. On November 30 and December 1, Bitcoin Lake successfully hosted its [2024 conference]( https://x.com/LakeBitcoin/status/1851663535320846661), inviting industry experts such as Ronny Avendaño, co-founder and CEO of the Bitcoin hardware store, and prominent Bitcoin advocate Roman Martínez (chimbera). During the conference, the community also organized creative activities like the [coffee workshop]( https://x.com/LakeBitcoin/status/1852699037457101218) and “[Be Captain of the Bitcoin Boat]( https://x.com/LakeBitcoin/status/1853089917947056534)”, offering participants an opportunity to dive deeper into Bitcoin and the local economy. Additionally, through partnerships with local merchants, Bitcoin Lake is actively advancing the development of the Bitcoin economy, fostering economic growth and financial inclusion in the community.
**[5.Bitcoin jungle]( https://yakihonne.com/users/npub14f26g7dddy6dpltc70da3pg4e5w2p4apzzqjuugnsr2ema6e3y6s2xv7lu)**
nostr:npub14f26g7dddy6dpltc70da3pg4e5w2p4apzzqjuugnsr2ema6e3y6s2xv7lu
* **Introduction**
Bitcoin Jungle is an open-source community project built on the Bitcoin Lightning Network with the goal of creating a circular Bitcoin economy. The project provides education, resources, and technology to both individuals and businesses. Starting from the Golden Triangle area in Costa Rica (Dominical, Uvita, Ojochal, Platanillo, Tinamaste), it is developing a shining example of what a Bitcoin community can represent.
* **Latest Updates**
Recently, the Bitcoin Jungle community has been actively promoting the adoption and use of Bitcoin in Costa Rica, participating in various projects and events. Community members attended the Adopting Bitcoin conference in El Salvador, further advancing global Bitcoin adoption. At the same time, they have been actively supporting children's charity projects and Bitcoin diploma courses, continuously driving Bitcoin education, social responsibility, and community development.
**[6.Bitcoin Berlín sv]( https://x.com/bitcoinberlinsv?s=21)**
* **Introduction**
Bitcoin Berlín sv aimed at creating a financially sovereign town in Berlín, El Salvador, through the implementation of a Bitcoin circular economy. The project seeks to integrate Bitcoin into the local economy by educating residents and businesses about its benefits, promoting the adoption of Bitcoin-based payment systems, and empowering local entrepreneurs with financial education. It also focuses on environmental sustainability, encouraging the use of renewable energy and waste reduction.
* **Latest Updates**
Recently, the Bitcoin Berlín sv has been actively promoting the use of Bitcoin by sharing informative articles and supporting the graduation of podcast producer Joel through the BlinkBTC QR code platform, allowing contributions in sats. This initiative not only supports the growth and development of community members but also furthers Bitcoin’s adoption and usage within the community. Additionally, on November 23rd, the community successfully hosted [a cultural festival celebrating the local heritage]( https://x.com/BitcoinBerlinSV/status/1857851562334294250). During the event, all vendors accepted Bitcoin payments, showcasing its practical application in Berlín’s economy. The festival attracted numerous tourists and residents eager to experience Bitcoin payments, further advancing its integration into daily life.
**[7.Bitcoin embassy San Salvador]( https://x.com/btcembassy_sv?s=21)**
* **Introduction**
Bitcoin embassy San Salvador is more into promoting Nostr in the region.
* **Latest Updates**
Recently, the Bitcoin Embassy San Salvador has been actively promoting the use and adoption of Bitcoin within the community, organizing various events. One of the highlights was the [Christmas Toy Drive x Cuarteto Salvación]( https://x.com/BTCEmbassy_SV/status/1859771767792992472), where toys were purchased using Sats to bring holiday cheer to children in need. The event, held on December 1 at Cuscatlán Park, also featured a special Music Night, attracting a large audience. Additionally, the Embassy hosted [an educational gathering for food vendors]( https://x.com/BTCEmbassy_SV/status/1856869503092576427), aimed at promoting Bitcoin payment systems. During the event, vendors accept Bitcoin payments through tiankii_Tech and blinkbtc platforms, further encouraging local businesses to embrace and adopt Bitcoin payments.
**[8.ONG Bitcoin Argentina]( https://x.com/bitcoinar?s=21)**
* **Introduction**
ONG Bitcoin Argentina is dedicated to advancing the development and application of decentralized technologies, particularly in the fields of Bitcoin, cryptocurrencies, and blockchain. As a leading organization in this space, the community promotes user protection and the healthy growth of the crypto ecosystem through education, training, and public advocacy. Its mission is to help individuals, businesses, and decision-makers understand and leverage decentralized, transparent, and secure technologies to bring more opportunities and progress to society. ONG Bitcoin Argentina has become a leading force in promoting decentralized technology in Argentina and Latin America.
* **Latest Updates**
Recently, ONG Bitcoin Argentina has been actively preparing for the “[Moon Party | Despedimos el año ATH (A Todo Hodler)]( https://x.com/BitcoinAR/status/1859973808204943665)” celebration, set to take place on December 5, 2024. Bitcoin enthusiasts will gather to enjoy exciting activities, including a Lightning Network demonstration and the Fish Bowl Manizesto Bitcoiner art exhibition. In addition, the community has hosted and will host a series of conferences and workshops covering a range of topics, including local digital asset services, Bitcoin as a strategic reserve in the U.S., the reconversion of the Bitcoin and cryptocurrency economy and financial systems, the role of crypto economics in financial system reform, the impact of Bitcoin ETFs on markets, and Bitcoin's influence on global issues, fostering in-depth discussions and development within the crypto industry.
**[9.La bitcoineta]( https://x.com/labitcoineta?s=21)**
* **Introduction**
La Bitcoineta is an initiative launched by the Argentine community in 2018, designed to promote the adoption and understanding of Bitcoin through a unique and powerful tool: a van and a group of volunteers. This traveling educational project has visited hundreds of towns across Latin America, Africa, and Europe, reaching thousands of people and covering hundreds of thousands of kilometers with the aim of spreading its mission and activities.With its innovative and mobile approach, Bitcoineta has become a globally recognized educational project.
**[10.Motiv Peru]( https://x.com/motivperu?s=21)**
* **Introduction**
Motiv is a non-profit organization founded in 2020, focused on addressing systemic poverty through Bitcoin and innovative projects, aiming to provide better opportunities for survival and prosperity to underserved communities. Its founders, Rich Swisher and Vali Popescu, witnessed firsthand the tragic impact of poverty and lack of basic living conditions in a remote village in the Andes Mountains of Peru, where children were dying due to preventable causes. This inspired them to create Motiv, with the goal of empowering vulnerable populations. By leveraging global support and partnerships, Motiv uses Bitcoin to help local communities break free from poverty and improve their lives, striving to bring positive change and hope to those in need.
* **Latest Updates**
Recently, MOTIV Perú has made significant progress in promoting Bitcoin and the circular economy. The organization continues to transform communities across Peru through various initiatives. For example, in the Comas district of Lima, entrepreneurial women are paying for their classes with Bitcoin and learning how to make delicious desserts, further advancing the local circular economy. Additionally, MOTIV Perú held its [first Bitcoin training]( https://x.com/MotivPeru/status/1858925719805395180) in Carabayllo-Lima, helping Peruvians understand the nature of money and the advantages of Bitcoin. MOTIV is also assisting communities in areas like Tarapoto and Ancon, where locals are using Bitcoin for daily transactions, driving financial freedom and economic empowerment.
**[11.Montanha bitcoin]( https://x.com/montanhabitcoin)**
* **Introduction**
Building a circular economy in Sao thome, Brazil.
* **Latest Updates**
Recently, The community has had no recent updates. The latest event dates back to June 2024, highlighting a water contamination incident.
**[12.Amityage honduras]( https://x.com/AmityAge)**
* **Introduction**
Amityage Honduras is the first Bitcoin education center in Honduras, located on Roatán Island in the Prosperá zone. The center's mission is to educate the local community about Bitcoin and spread this knowledge throughout Central America and the Caribbean. It is dedicated to helping businesses on the island adopt Bitcoin as a payment method, teaching children financial literacy, and empowering individuals to achieve financial sovereignty through Bitcoin. The center aims to empower the local community through education and innovation, fostering economic independence and sustainable development.
* **Latest Updates**
Recently, Amityage Honduras is actively promoting Bitcoin education by participating in various international Bitcoin events and organizing local courses to help more people understand Bitcoin. Community members took part in significant events such as AdoptingBTC 2024 and BitcoinUnconference, and hosted workshops around the theme of “How to Enter the World of Bitcoin Education.” In Haidmühle, Germany, AmityAge completed a four-day [Bitcoin Educators Academy]( https://x.com/AmityAge/status/1853785976729989591), where the curriculum included topics like using simple analogies to explain Bitcoin and public speaking exercises. Additionally, the community hosted Bitcoin education courses on Roatán Island and provided a free Bitcoin event for beginners at the Crawfish Rock community, further spreading Bitcoin knowledge.
**[13.Lima - Orange Pill Perú]( https://yakihonne.com/users/nprofile1qqsyhra6ydf5j8dcyqfvddf2lfwn0fpkrls2apylypjxeqqsu227nus34w4sv)**
nostr:npub1fw8m5g6nfywmsgqjc66j47jax7jrv8lq46zf7grydjqppc54a8eql47qrx
* **Introduction**
Orange Pill Peru is a community-driven initiative dedicated to empowering Peruvians through Bitcoin education. With a focus on transforming the financial landscape, Orange Pill Peru provides resources for individuals to learn about Bitcoin, connect with like-minded enthusiasts, and grow their knowledge through various events and workshops. The community serves as a hub for both beginners and professionals, offering a supportive environment to explore the fundamentals of Bitcoin, its history, and its potential to shape the future of finance.
* **Latest Updates**
Recently, there have been no major updates. They actively engage in Bitcoin education and industry updates by sharing and reposting Bitcoin-related content. They support MOTIV Perú's financial freedom education project in the Ancon community in Lima, emphasizing the empowerment of women through Bitcoin. Additionally, the community has shared information about the upcoming [Bitcoin Medellin Conference]( https://x.com/BTCMedellinConf/status/1858890066178793753) scheduled for January 2025.
**[14.La Antigua Bitcoin]( https://x.com/antiguabtc)**
* **Introduction**
La Antigua Bitcoin is a community-based initiative in La Antigua Guatemala, focusing on promoting Bitcoin adoption in local businesses. The community works to create awareness and facilitate the use of Bitcoin as a payment method in various establishments throughout the city. By encouraging merchants to accept Bitcoin, La Antigua Bitcoin aims to integrate cryptocurrency into the everyday economy, driving financial innovation and expanding access to decentralized financial systems within the region.
* **Latest Updates**
Recently, the Antigua Bitcoin community has had few updates, with a focus on organizing its first meetup in collaboration with “[Run with Bitcoin]( https://x.com/antiguabtc/status/1725895204740173835)” on November 24, 2023. The event garnered significant attention within the community, featuring interactions with a special guest. The aim of the event was to further promote Bitcoin adoption in Antigua, Guatemala, and encourage exchange and collaboration between Bitcoin enthusiasts and the local community.
**[15.Horizonte Bitcoin]( https://yakihonne.com/users/nprofile1qqs80n72hysgx32djuj8kxpt6j86duqm90a4rtmshg7pggnlru9dhzcwcy9cc)**
nostr:npub1wl8u4wfqsdz5m9ey0vvzh4y05mcpk2lm2xhhpw3uzs3878c2mw9sr2ksxk
* **Introduction**
Project that aims to contribute to the Bitcoinization of the economy and encourage Entrepreneurship and Decentralization.
* **Latest Updates**
Recently, The community has had no recent updates. The latest event dates back to Oct 2024, which shared a message encouraging women to learn more about Bitcoin and connect with others in the field, highlighted a meetup, Satoshe's Lounge, for women, providing a space to learn, discuss, and share knowledge about Bitcoin.
**[16.Escuelita Bitcoin]( https://yakihonne.com/users/npub1awggmqvlw8pa0kp9qq5law8zsvp2a8suztk0357j7e0nt746suwspt7lwx)**
nostr:npub1awggmqvlw8pa0kp9qq5law8zsvp2a8suztk0357j7e0nt746suwspt7lwx
* **Introduction**
Educational Project for Little School.
* **Latest Updates**
Recently, the Escuelita Bitcoin team has grown to five members and is actively advancing Bitcoin education and community development. Team members have hosted several workshops in Paraguay and Mexico, spreading Bitcoin knowledge within local communities and encouraging merchants to accept Bitcoin payments, particularly in Ciudad del Este, Paraguay. The team is raising funds through platforms like Geyser. fund and Kuno.anne.media to support the expansion of their educational initiatives and help locals better understand and use Bitcoin. Escuelita Bitcoin also emphasizes privacy education, promoting the use of tools like CakeWallet and Monero. Through collaborations with other organizations and individuals, the team is extending the reach of Bitcoin education, fostering the adoption of Bitcoin in Latin America and emerging markets.
**[17.Bitcoin é aqui! Rolante/Riozinho-RS-BRASIL]( https://yakihonne.com/users/npub168dqt5c8ue3uj8ynlk0lhwalnp7uy39lvzf9tm09wy3htxwmw7qq5nerj4)**
nostr:npub168dqt5c8ue3uj8ynlk0lhwalnp7uy39lvzf9tm09wy3htxwmw7qq5nerj4
* **Introduction**
Bitcoin é Aqui! Rolante is located in Rolante, Brazil, and is dedicated to creating a lifestyle and tourism destination where 40% of businesses now accept Bitcoin as a payment method, showcasing the community's success in integrating Bitcoin into the local economy. Residents and visitors can use it to pay for all services, including accommodation, tours, local goods, medical services, and even construction and solar energy equipment. This reflects the practical application and convenience of its use in everyday life, aiming to create a digitally-driven environment powered by Bitcoin.
* **Latest Updates**
Recently, the Bitcoin é Aqui! Rolante has been actively promoting the adoption and use of Bitcoin in Brazil and beyond. The community has organized several educational events aimed at spreading basic Bitcoin knowledge and its practical applications in daily life, particularly through online videos and lectures. These efforts help people understand how Bitcoin plays a crucial role in the global financial system. The community has also been actively involved in promoting Bitcoin payments, supporting their adoption by local businesses and in the tourism industry.
**[18.Bitcoin Forte]( https://x.com/Bitcoin_Forte)**
* **Introduction**
Bitcoin Forte is a voluntary initiative aimed at introducing Bitcoin as a currency to Praia do Forte in Bahia, Brazil. The project provides valuable information about Bitcoin’s importance and encourages local merchants to adopt it as a payment method. By highlighting Bitcoin's international use, simplicity, and security, Bitcoin Forte aims to facilitate its adoption among both tourists and businesses.The community promotes Bitcoin as a stable and controlled currency, helping to avoid systemic price inflation. Bitcoin Forte simplifies the process for businesses by offering tools such as QR codes and the “Satoshi POS Wallet” app, which connects to a merchant’s primary wallet for seamless transactions.
* **Latest Updates**
Recently, the community has had no recent updates. The latest event dates back to July 2024, introducing Airbtc, a platform similar to Airbnb, but it only accepts Bitcoin as payment.
**[19.Bitcoin Paraguay]( https://x.com/BTCParaguay)**
* **Introduction**
Bitcoin Paraguay is a community dedicated to connecting individuals in Paraguay who are interested in Bitcoin, promoting its adoption, and fostering the development of local circular economies. The community’s mission is to increase Bitcoin adoption by collaborating with local businesses and nonprofit organizations, helping to create a more sustainable local economy. Through regular events, talks, and resource sharing, Bitcoin Paraguay provides education and support to its members while actively exploring Bitcoin's application across various sectors in Paraguay.
* **Latest Updates**
Recently, the Bitcoin Paraguay community has made significant progress in promoting Bitcoin adoption. On November 5, they successfully hosted the [fifth Bitcoin meetup]( https://x.com/BTCParaguay/status/1853661077575250158) in Asunción, attracting 110 attendees. The event included two Spanish-language presentations and a Lightning Network onboarding training session, with food and drinks available for purchase using Bitcoin. The event was made possible with strong support from sponsors Blink Wallet and Hacking Lives. On November 13, Josef Tetek visited Bitcoin Paraguay to help promote the adoption of Vexl in the country. The community also shared their progress through articles, with Jake, a community member, publishing an article in the Asunción Times on how Bitcoin Paraguay is improving people's lives.
**[20.Bitcoin Amantikir]( https://x.com/BtcAmantikir)**
* **Introduction**
They are starting the first community in the Serra da Mantiqueira to use and extol people about the bitcoin economy.
* **Latest Updates**
Recently, the Bitcoin Amantikir community has made significant progress in promoting Bitcoin as a payment method and fostering a circular economy in Santo Antônio do Pinhal. Various businesses, including a pet store, transportation service providers, a hotel, a fruit shop, and a tourist attraction, have started accepting Bitcoin payments. Additionally, the community is organizing a Bitcoin financial education course on December 2nd at Munay Pousada, aimed at helping young people aged 14-18 acquire essential financial knowledge and understand the importance of Bitcoin.
**[21.La Crypta]( https://x.com/LaCryptaOk)**
nostr:npub1rujdpkd8mwezrvpqd2rx2zphfaztqrtsfg6w3vdnljdghs2q8qrqtt9u68
* **Introduction**
La Crypta is an open-source community dedicated to advancing the adoption of the Nostr protocol and Bitcoin through developer-friendly tools and resources. By providing an integrated open-source stack, La Crypta empowers developers to sync with multiple relays, showcase profiles with badges, and facilitate seamless messaging, making it easier to build and utilize decentralized social platforms. Events like hackathons further enhance collaboration and attract new members, fostering innovation in decentralized social media.
* **Latest Updates**
LaWallet, their open-source wallet, integrates Bitcoin, Lightning, and Nostr to provide a seamless learning experience. With over 8,000 NFC cards distributed across conferences in regions like Argentina, Brazil, and Spain, LaWallet enables easy adoption while prioritizing user privacy. The wallet’s functionality is now supported by Alby’s official browser extension, further boosting accessibility.
-

@ 6f4d57a2:be4cc879
2024-12-10 13:32:05
งาน คือ เงิน เงิน คือ งาน บันดาลสุข…เงินซื้อได้ทุกอย่างจริงหรือ ? เงินทำให้เรามีความสุขจริงหรือ ? มีเงินแล้วชีวิตจะดีขึ้นจริงหรือ ?
เงินซื้อเพื่อนได้ ! เงินซื้อญาติพี่น้องได้ ! เงินซื้อความรักได้ ! เงินซื้อความถูกต้องได้ ! เงินช่วยยื้อชีวิตได้ ! อำนาจแห่งเงินตรา !
เงินสำคัญสำหรับทุกคนจริงไหม ? ปัจจุบันตามสื่อต่างๆ ข่าวที่เผนแพร่ออกมาเราจะเห็นว่าบางคนมีเงินมากมาย ทรัพย์สินหลากหลาย ที่ดิน ทองคำ เครื่องประดับ ความมั่งคั่งที่มี อาหารการกินสมบูรณ์ พาหนะที่สวยหรู เดินทางสะดวกสบาย ผู้คนล้อมหน้าล้อมหลัง มีชื่อเสียง หลายคนซื้อสิ่งเหล่านี้มาด้วยเงิน เงินเท่านั้นที่ทำให้สิ่งต่างๆ ยังคงอยู่ ดังนั้นคนผู้นี้จึงมุ่งมั่นหาเงินต่อไป เพื่อสนองตอบต่อความต้องการของทรัพย์สินรอบตัว และผู้คนข้างกาย(ลาเฮาละวะกูวะตะอิลลาฮ์บิลลาฮ์)
อัลลอฮฺ ตรัสไว้ว่า
وَلَا تُصَعِّرْ خَدَّكَ لِلنَّاسِ وَلَا تَمْشِ فِي الْأَرْضِ مَرَحًا إِنَّ اللَّهَ لَا يُحِبُّ كُلَّ مُخْتَالٍ فَخُورٍ
“และเจ้าอย่าหันแก้ม (ใบหน้า) ของเจ้าให้แก่ผู้คนอย่างยโส และอย่าเดินไปตามแผ่นดินอย่างไร้มารยาท
แท้จริง อัลลอฮฺมิทรงชอบทุกผู้หยิ่งจองหอง และผู้คุยโวโอ้อวด”
(ลุกมาน : 18)
สิ่งหนึ่งที่ซื้อไม่ได้เลย คือ “ความสุข ความสบายใจ” ความรักอย่างบริสุทธิ์ใจ และความพอดีในชีวิต เพื่อให้เกิดความพอเพียงในสิ่งที่มี ฉะนั้นจึงมีคนมากมายที่ต้องจบชีวิตตนเอง เพราะหาความสุขไม่ได้ “ความตาย” จึงเป็นจุดสุดท้ายเพื่อต้องการค้นพบทางออกจากวังวนของวัตถุนิยม บางคนทนทุกข์ทรมานกับทรัพย์สินที่มี กลัวว่าจะหมดไป กลัวว่าจะมีคนเอาไป กลัวว่าจะไม่พอใช้ โลภจนชีวิตทรมาน ความตายจึงมาพรากทุกสิ่งออกจากการยึดติด ความกังวลในทรัพย์สิน ความตระหนี่ถี่เหนียว จนตายอย่างอ้างว้าง ตายเพียงคนเดียว ความตายมาถึงที่นอนของเขา บ้านของเขา แม้ทรัพย์สินมากมาย แต่สุดท้าย ตายด้วยความอ้างว้างทุกราย (อินนาลิลลาฮ์ วะอินนาอิลัยฮิรอญีอูน)
อัลลอฮฺ ซุบฮานะฮูวะตะอาลา ได้ตรัสอีกว่า
“และหากเจ้าได้เห็นขณะที่มลาอิกะฮ์เอาวิญญาณของบรรดาผู้ปฏิเสธศรัทธาอยู่นั้น พวกเขาจะตีใบหน้าของพวกเขา และหลังของพวกเขา
และ (กล่าวว่า) พวกเจ้าจงลิ้มรสการลงโทษแห่งการเผาที่ลุกไหม้เสียเถิด”
(อัลอัมฟาล 8 : 50)
สิ่งที่หาซื้อไม่ได้ ในห้างหรู ? ในโชว์รูมแบรนเนม ? ในรถซุปเปอร์คาร์ ? ในร้านเครื่องประดับเพชร ? ไม่มีที่ไหนประกาศขาย ไม่มีที่ไหนแอบอ้างและการันตี นั่นคือ ‘ค ว า ม สุ ข’
ความสุขกาย – พอใจในสิ่งที่มี พอใจอาหารที่สะอาดทานได้ พอใจในสุขภาพร่างกายที่แข็งแรง พอใจในการดำเนินวิถีชีวิตในความถูกต้อง
ความสุขใจ – มีความรักต่อผู้อื่นด้วยการไม่หวังผลประโยชน์ หยิบยื่นในสิ่งที่ตนมีเพื่อช่วยเหลืออย่างไม่หวังผล แม้ไม่มีทรัพย์แต่สามารถให้ความร่วมมือในการสร้างสรรคืสิ่งดีงามเพื่อสังคม
ความสุขจากการพอ – โดยการใช้ความรู้ในการพัฒนาโลก และไม่ทำลายทรัพยากรธรรมชาติ ไม่ทำลายสิ่งแวดล้อม จากการบริโภคอย่างตระกละตระกราม การใช้สินค้าอุปโภคอย่างทิ้งขว้าง การสะสมสินค้าที่ไร้สาระเป็นเหตุแห่งการสิ้นเปลือง เหตุแห่งความโลภ จึงไม่รู้จัก ‘พ อ’ และ ‘เพียง’
ความสุข ไม่สามารถหาซื้อได้ แต่ต้องสร้างเองให้เกิดขึ้นเป็นรูปธรรม ไม่จำเป็นต้องใช้เงิน แต่จำเป็นอย่างยิ่งที่ต้องใช้ใจที่บริสุทธิ์ในทุกการกระทำ และต้องมีใจที่พอเพียง เพื่อให้ทุกคนได้อย่างเพียงพอ ความสุขไม่ได้สร้างง่าย แต่ไม่ยากเกินความสามารถของมนุษย์ถ้ารู้จักวิธี และวิถีการดำเนินไปหาความสุขได้นั้นมีแค่ทางเดียวเท่านั้น ไม่ต้องวกวน และซับซ้อน หาให้เจอแล้วคุณจะพบความสุข
อายะฮฺที่ 97 อัลลอฮฺ ซุบฮานะฮูวะตะอาลาตรัสว่า
مَنْ عَمِلَ صَالِحًا مِّن ذَكَرٍ أَوْ أُنثَىٰ وَهُوَ مُؤْمِنٌ فَلَنُحْيِيَنَّهُ حَيَاةً طَيِّبَةً ۖ
“ผู้ใดที่ปฏิบัติความดี ไม่ว่าชายหรือหญิง โดยที่เขาเป็นผู้ศรัทธา
แน่นอน เราจะให้เขามีชีวิตที่ดีงาม(ทั้งในโลกดุนยานี้และโลกอาคิเราะฮฺ)”
มนุษย์มุ่งหาความสุข เพราะการกระตุ้นจากสื่อสาร ทีวี การได้ยินได้ฟังจากโซเชี่ยล การได้ดูจากวีดีโอ ที่ควบคุมโดยพวกวัตถุนิยมที่ปฏิเสธการศรัทธาในพระเจ้าของพวกเขา กระตุ้นให้คนแสวงหาเงิน เพื่อนำมาซื้อหนทางแห่งความสุข
พยายามฉายภาพความสุขด้วยการมีเงินซื้อสินค้าแบรนหรู…เพราะเป็นสินค้าที่พวกเขาผลิต และขายในราคาแพง
ใช้คำคมต่างๆ เพื่อหลอกล่อว่าความสุขต้องใช้เงิน กระตุ้นคำว่าเงิน คือความจำเป็นของชีวิตเพียงอย่างเดียว
ใช้บุคคล นักแสดง ดารา คนที่คิดว่ามีชื่อเสียง ฉายภาพแห่งความสุขจากการมีเงิน…ทั้งๆที่บางคน ฆ่าตัวตายเพราะไม่มีความสุข
พยายามใช้ผู้หญิงที่แก้ผ้าแล้วมีความสุข…โดยถอดความละอายออกจากพวกเธอ อย่างไร้ยางอาย
พยามยามใช้พวกสับสนทางเพศฉายภาพแห่งความสุข…ทั้งๆ ที่นั่นคือ ความสกปรกโสมมของสังคม
“อัลลอฮฺ ได้สาปแช่งผู้ชายที่ทำตัวเป็นหญิง และหญิงที่ทำตัวเป็นชาย”
(บันทึกโดย อิมาม อัลบุคอรีย์)
“ความละอาย เป็นส่วนหนึ่งของการศรัทธา ผู้ที่ศรัทธา คือชาวสวรรค์
ผู้ที่ไม่มีความละอายนั้น เป็นส่วนหนึ่งของคนที่ไร้ค่า และผู้ไร้ค่านั้น คือ ชาวนรก”
(บันทึกโดย อัตติรมิซีย์)
การไม่รู้เท่าทันในสื่อต่างๆ และกระแสออนไลน์ ของกลุ่มวัตถุนิยม พวกนี้เพียงต้องการให้มนุษย์เป็นทาส ทาสทางความคิด ทาสในการเลียนแบบ ทาสในการกิน ทาสในการแต่งกาย ทาสในการดำเนินชีวิต ถ้ากลุ่มทุนชี้ขวา คนส่วนมากก็ต้องไปทางขวา ถ้ากลุ่มทุนชี้ซ้ายคนส่วนมากก็ต้องไปทางซ้าย ถ้าเขาบอกว่าปีนี้สีแดง แฟชั่นก็ต้องสีแดง ถ้ากลุ่มทุนบอกว่าต้องใส่หมวก ปีนี้ก็ต้องใส่หมวกตามแฟชั่น พวกเขาใช้คำว่า ‘แ ฟ ชั่ น’ ในการควบคุมมนุษย์ หาเงินเพื่อสนองตอบแฟชั่น ตามกระแส ตามแฟชั่น คือการเป็นทาสอย่างเต็มใจ
﴿ وَإِذَا سَمِعُوا اللَّغْوَ أَعْرَضُوا عَنْهُ وَقَالُوا لَنَا أَعْمَالُنَا وَلَكُمْ أَعْمَالُكُمْ سَلَامٌ عَلَيْكُمْ لَا نَبْتَغِي الْجَاهِلِينَ ﴾ [القصص: 55]
“และเมื่อพวกเขาได้ยินเรื่องไร้สาระ พวกเขาก็ผินหลังออกห้างไปจากมัน และกล่าวว่า
“การงานของเราก็จะได้แก่เรา และการงานของพวกท่านก็จะได้แก่พวกท่าน ศานติแด่พวกท่าน เราจะไม่ขอร่วมกับพวกงมงาย”
เราต้องใช้เงิน แต่อย่าให้เงินมาใช้เรา อย่าให้เงินมาควบคุมเรา เงินสามารถซื้อสินค้า อุปโภค บริโภคได้ เพื่อการดำเนินชีวิต เพื่อที่เราจะได้มีพลังในการรับใช้พระเจ้า เพื่อที่เราจะได้มีแรงในการทำความดี
ความโลภ จึงสั่งใช้ให้มนุษย์แสวงหาเงิน ด้วยความอยากได้ อยากมี อยากเด่น อยากโอ้อวด เงินจึงสั่งใช้ให้มนุษย์ ตัดขาดจากศีลธรรม ตัดสิ้นซึ่งจรรยามารยาท ขาดความยับยั้งชั่งใจ ขาดสติสัมปชัญญะ ขาดความคิดดี เงินจึงหลอกล่อให้มนุษย์ทำความชั่วเพื่อที่จะได้เป็นผู้ครอบครองเงิน ด้วยการทำในสิ่งที่ชั่วให้กลายเป็นสิ่งที่ปกติ
จากหะดีษ กะฮฺบ บิน มาลิก อัลอันซอรีย์ รอฎิยัลลอฮูอันฮู จากท่านนบี ศ็อลลัลลอฮูอะลัยอิวะสัลลัม ได้กล่าวว่า
مَا ذِئْبَانِ جَائِعَانِ أُرْسِلَا فِي غَنَمٍ، بِأَفْسَدَ لَهَا مِنْ حِرْصِ الْمَرْءِ عَلَى الْمَالِ وَالشَّرَفِ لِدِينِهِ
“หมาป่าสองตัวที่หิวโหย ถูกส่งไปยังแกะ จะไม่สร้างความเสียหายได้ เท่ากับความโลภของคน ๆ หนึ่ง ในทรัพย์สิน และชื่อเสียง ที่จะมีต่อศาสนาของเขา”
(อิหม่ามอะหมัด)
การทำให้การพนัน กลายเป็นเรื่องที่ต้องสนับสนุนเพื่อเศรษฐกิจ เพื่อผู้คนจะได้มีเงิน ทั้งๆที่ มีคนได้ก็ต้องมีคนเสีย การพนันไม่ได้เพิ่มสิ่งใด นอกจากการแก่งแย่ง การเอาเปรียบซึ่งกันและกัน การอธรรมต่ออีกฝ่าย โดยที่คิดว่าเป็นเรื่องปกติ คนที่ชนะจากการพนัน ก็จะได้เงิน เงิน เงิน และเงินเท่านั้น แม้จะมีการฆ่ากัน ปล้นสดมภ์ แย่งชิง สังคมวุ่นวาย และล่มสลายในระดับครอบครัว ทำลายเยาวชนที่เป็นอนาคตของชาติ
อัลลอฮฺ ซุบฮานะฮูวะตะอาลาได้ตรัสไว้ในอัลกุรอาน ซูเราะฮฺอัลมาอิดะฮฺ อายะฮฺที่ 90 ว่า
يَا أَيُّهَا الَّذِيْنَ آمَنُوْا إِنَّمَا الْخَمْرُ وَالْمَيْسِرُ وَالأَنْصَابُ وَالأَزْلاَمُ رِجْسٌ مِنْ عَمَلِ الشَّيْطَانِ فَاجْتَنِبُوْهُ لَعَلَّكُمْ تُفْلِحُوْنَ ،
“ผู้ศรัทธาทั้งหลาย แท้จริง สุรายาเมาเหล้าเบียร์ การพนัน การขันต่อ แท่นหินสำหรับเชือดสัตว์บูชายัญ
และ การเสี่ยงติ้วนั้น เป็น สิ่งสกปรกโสมม น่ารังเกียจที่มาจาก การงานของชัยฏอน …”
เงิน หลอกล่อให้ไร้ความละอาย ด้วยการยกโสเภณีให้เป็นอาชีพปกติ เพราะได้เงิน โดยไม่สนใจศีลธรรมในหลักการศาสนา ไม่ว่าจะศาสนาไหนก็แล้วแต่ เพราะการเป็นโสเภณีได้เงิน เพื่อหมุนเวียนในเศรษฐกิจ แม้สิ่งนี้คือจุดเริ่มต้นของโรคร้ายแรงต่างๆ และโรคที่จะไม่มีทางรักษาก็เกิดมาจากการสมสู่ที่สกปรก ไม่รับผิดชอบต่อสังคม โรคที่เป็นแล้วยังไม่มียารักษา และนี่คือสาเหตุแห่งการล่มสลายของครอบครัว การไม่รับผิดชอบของผู้ชาย เด็กไม่มีพ่อ เด็กกำพร้า เด็กถูกทอดทิ้ง ท้องไม่พร้อม การเลี้ยงดูในสภาพแวดล้อมที่เลวร้าย เยาวชนจะเติบโตขึ้นมามีคุณภาพได้อย่างไร
ในอัลกุรอานซูเราะฮฺอัลอิสรออ์ อายะฮฺที่ 32 อัลลอฮฺ ซุบฮานะฮูวะตะอาลาตรัสว่า
وَلَا تَقۡرَبُواْ ٱلزِّنَىٰٓۖ إِنَّهُۥ كَانَ فَٰحِشَةٗ وَسَآءَ سَبِيلٗا
“และพวกเจ้าอย่าได้เข้าใกล้การทำซินา(หรือการผิดประเวณี) แท้จริง มันเป็นสิ่งที่ชั่วช้าลามก และเป็นหนทางที่เลวร้าย”
เมื่อกิยามะฮฺใกล้เข้ามาส่วนหนึ่งจาก “สัญญาณเล็ก จะมีการผิดประเวณี (ซินา) มากมาย”
การค้าขายอย่างเอารัดเอาเปรียบ ขายให้ได้มากเพื่อมีเงินเยอะๆ โดยไม่สนใจว่าสินค้าที่ขายจะมีคุณภาพหรือไม่ ขายโดยที่ไม่สนใจว่าความต้องการจริงๆ ของผู้บริโภค ขายออกให้มากที่สุด และวัตถุดิบที่นำมาทำสินค้า ก็ต้องเอามาจากธรรมชาติ การขายสินค้าเกินความต้องการ คือการทำลายทรัพยากรธรรมชาติ และสิ่งแวดล้อม การบริโภคที่เกินเลย ทำลายระบบนิเวศ และวงจรชีวิตของธรรมชาติ
يَا أَيُّهَا الَّذِينَ آمَنُوا لَا تَأْكُلُوا أَمْوَالَكُم بَيْنَكُم بِالْبَاطِلِ
“ผู้ศรัทธาทั้งหลาย! จงอย่ากินทรัพย์ของพวกเจ้า ในระหว่างพวกเจ้าโดยมิชอบ”
(อัน-นิสาอฺ 29)
เงิน ทำให้มนุษย์ไม่รู้จักพอ การมีอย่างไม่สิ้นสุด ความอยากได้อย่างไม่สิ้นสุด การแสวงหาอย่างไม่สิ้นสุด แม้เงินจะเป็นสาเหตุ แห่งความหายนะสำหรับคนที่เป็นทาสเงิน แต่สำหรับผู้ศรัทธาแล้ว เงิน สามารถสร้างสรรค์สิ่งที่ดีได้มากมาย แต่การจะหลุดจากทาสของเงิน จึงต้องเรียนรู้วิธี และปฏิบัติในวิถีแห่งการหลุดพ้นจากทาส มีแค่ทางเดียวเท่านั้นที่เราจะหลุดพ้นจากความเป็นทาสของเงิน และการเป็นทาสของมนุษย์ที่ดำเนินตามวิถีแห่งวัตถุนิยม นั่นคือเราต้องเรียนรู้จากตัวอย่างของบุคคลที่หลุดพ้นคือ ท่านนบีมุฮัมมัดศอลลัลลอฮูอลัยอิวะซัลลัม และการดำเนินชีวิตตามแบบฉบับของอัลอิสลาม ตามบทบัญญัติแห่งพระเจ้าของมนุษย์ เพื่อย้ายจากสถานะการเป็นทาสเงิน มาเป็นบ่าวที่ดีของ อัลลอฮ์ เมื่อนั้นคุณก็จะเป็นเจ้าของเงิน เป็นเจ้านายของเงิน
ท่านร่อซูลุลลอฮฺ ศ็อลลัลลอฮุอะลับฮิวะซัลลัมกล่าวว่า
النَّارُ أَوْلَى بِهِلَا يَرْبُو لَحْمٌ نَبَتَ مِنْ سُحْتٍ إِلَّا كَانَتْ
“ไม่มีเนื้อหนังมังสาใดที่เจริญเติบโตมาจากของที่ชั่วร้าย (ของที่หะรอม) นอกจาก นรก นั้นจะเป็นที่พำนักอันสาสมสำหรับเขา”
สุดท้าย สิ่งที่ทำลายมนุษย์ คือ เงิน …และเงินมีหน้าที่ในการคัดแยกให้ได้รับรู้ว่า ใครคือ ผู้ศรัทธา และใครคือสัตว์เดรัจฉานในคราบผู้ปฏิเสธศรัทธา ขอให้เราห่างไกลจากการเป็นทาสเงินด้วยเถิด….อามีน
اللَّهُمَّ إِنِّي أَعُوذُ بِكَ مِنْ قَلْبٍ لاَ يَخْشَعُ، ومِنْ دُعَاءٍ لاَ يُسْمَعُ، وَمِنْ نَفْسٍ لاَ تَشْبَعُ، وَمِنْ عِلْمٍ لاَ يَنْفَعُ، أَعُوذُ بِكَ مِنْ هَؤُلاَءِ الأَرْبَعِ
“โอ้องค์อภิบาลของฉัน ฉันขอความคุ้มครองจากพระองค์ ให้พ้นจากหัวใจที่ไม่นอบน้อม,
ดุอาอฺที่ไม่ถูกรับฟังและจากชีวิตที่ไม่รู้จักเอิบอิ่ม และจากความรู้ที่ไม่ยังประโยชน์
ฉันขอความคุ้มครองจากพระองค์ ให้พ้นลักษณะสี่ประการนี้ด้วยเถิด”
-

@ 26838110:80edc65d
2024-12-10 12:32:43
# Using Nostr as a Blog through Npub.pro
Now that X.com is closed and cannot be freely accessed without account anymore, creators and companies need a new way to broadcast updates and gather feedback from users.
## Our Needs
We had first two major requirements. The first one was to have a way to publish updates and have the possibility for anyone to reply to them.
The second major requirement was to have these posts available online and indexable by search engines.
## Nostr
After trying Warpcast and looking into Threads, Mastodon and Bluesky, we chose Nostr to chronicle the development of the world and game of Dragonbane Creation.
Nostr is perfect for our needs for serveral reasons:
1. Posts are publicly accessible and available in a variety of clients.
2. Posts are not linked to a single platform and they cannot be boosted or deboosted.
3. Posts can be easily read and written programmatically.
4. Once Nostr is more widespread, it also means that posts can be indexed by search engines and can count as multiple SEO links (one for each indexed client).
## Npub.pro
Having notes is only one part of the equation to have a blog based on Nostr. The second part I discovered relatively quickly after I started posting on Nostr. Npub.pro is a way to create a free website to display notes and have them available as standalone pages with a comment section in a customizable theme.
What I love about Npub.pro are how easy it is to customize the blog and the ability to self-host.

After setting up our blog, I also tried recreating a basic version on the main Dragonbane Creation website as I already had the code to interact with Nostr in Javascript. However, I decided to keep using Npub.pro in order to avoid having to maintain the code for a blog and as it fulfills all of our needs and to self host it.
The downsides of using Npub.pro are that it is extremely slow to load, even when self-hosting and using a good CDN. It also lacks important customization options such as a way to disable comments and zapping.

If you want to set up your own, you can do it here:
https://npub.pro/#themes-onboarding
If you want to see how our blog looks like:
https://blog.dragonbanecreation.com
#grownostr #npubpro
-

@ be7bf5de:09420d0a
2024-11-13 01:08:36
At NosFabrica, we envision a future of healthcare where the individual is in charge of their health data and empowered to take responsibility for their own health. We are building health applications on Nostr and bitcoin to enable individuals own their health data. Nostr's architecture will allow different healthcare providers to write data onto the individual's relay. We see many potential use cases to solve specific problems in healthcare when the individual in a world where everyone has a comprehensive, portable and interoperable health record over time. We are looking to show what is possible with the "other stuff" on Nostr, starting by developing micro-apps so you can start compiling your health data, which you control.
If you're like most people on earth, your eyes aren't perfect. About half of us - 4 billion humans - have eye glasses, yet [nearly a billion people](https://ssir.org/articles/entry/better_vision_for_the_poor#:~:text=Estimates%20for%20the%20number%20of,live%20below%20their%20full%20potential.) can't get glasses due to inaccessibility of eye care or affordability.
With our microapp, [Lazer Eyes](https://lazereyes.nosfabrica.com/), eye care providers can now write an eyeglasses or contacts prescription directly onto your own health relay. The optometrist simply needs to enter in your Nostr public key profile (nprofile), which relay to write the data to, and your prescription data; the encrypted prescription will be sent in an encrypted note directly to your relay. You can now send this signed note to your eye glasses provider to fulfill your glasses or contacts order.
If you're using Amethyst today, you will be able to see this prescription rendered into your DMs. In our NosFabrica future vision, different clients would be able to show you this piece of your health record alongside other health information with different user interfaces and experiences. You will then have the power to selectively disclose this information, as needed.
**There are many benefits to using Nostr for health as an individual:**
1. **Patient Ownership and Control**
- Patients have full control of their prescription, and they can share it securely with confidence and even privately if required with eyewear providers or optometrists whenever needed.
- Patients no longer rely on email or paper copies that can be easily lost or tampered with. Emailing a PDF to a patient brings the issue of requiring an optometrist signature leading to excess time taken to generate, print, sign, scan and email the copy. Public / private key cryptography provides a verifiable, time saving option in this case.
- Continuity of care and ability to track changes in prescription over time - there are numerous forum posts where patients have found it difficult to get their prescription data from their optometrist practice when requesting it months or years later.
- Removes the need for the patient to contact their old opticians and go through a process of trying to request their details, which can be time consuming.
2. **Identity Verification**
- Optometrists sign prescriptions with a cryptographic key that patients could verify using their private Nostr identity (also known as a public/private key pair). This ensures that the prescription is authentic, accurate, and hasn't been altered after issuance. This would remove the need for issuing a “signed prescription” that currently has to be done in the physical sense, as a print out and issued to the patient. Have the option to have an indisputable and verifiable ‘Optometrist Identity Key’ would enable this legal requirement (in the UK) to go completely digital over Nostr.
- The decentralized nature of Nostr ensures that prescriptions can be easily verified and traced back to the original issuer, avoiding forgery or fraud.
3. **Privacy**:
- Unlike traditional methods where patient information is stored on centralized databases of the electronic medical record company (eg, Epic), or large health systems (eg, Ascension), Nostr keeps patient data decentralized and private, accessible only through permissioned sharing. This ensures no third party can access, manipulate, or misuse this sensitive information.
4. **Immutable Records**
- Once a prescription is issued and signed on Nostr, it is stored immutably on the decentralized network. This ensures a permanent and trustworthy ledger of the patient's eye health history. This feature adds to accountability and should bring a higher standard to complete and accurate prescribing across all practices.
- These records can persist over time and are portable to travel with you, wherever you seek care or glasses.
5. **Global Access**
- Patients can use their Nostr-stored prescription with any provider across the globe, without needing to worry about differing national data standards or carrying physical documents when they travel or move.
- This opens up a wider use case when considering the 2 Billion + individuals who currently cannot get access to sight care services.
**Benefits for Optometrist Practices and Operators:**
1. **Improved Patient Retention and Care through Trust and Transparency**
- By empowering patients with ownership of their data, practices foster **trust and loyalty**, reducing churn over time. If patients know they can rely on your practice for transparency, secure record-keeping, and access to the latest technology, they are more likely to return for future eye exams and other services.
- A decentralized, tamper-proof record of prescriptions can **improve administrative efficiency**. No more handling lost prescriptions, disputes about validity, or delays in getting updated information to patients or other providers.
- The decentralized storage of prescriptions allows optometrists to securely share and access patient data, making cross-practice collaboration easier for referrals, second opinions, or specialized care.
2. **Cost Savings on Paperwork and Administration**
- Digitizing and decentralizing prescription records could lead to long-term savings on **administrative costs**, such as paperwork management, prescription re-issues, and managing patient data in outdated systems.
- Optometrists can ensure their records are always accessible, accurate, and trusted by all parties (patients, insurers, other clinics).
- By reducing the burden of handling prescription storage and verification manually, the practice can focus more on patient care.
3. **Adaptation to Future Consumer Behavior and building a Tech-Savvy Reputation**
- As patients increasingly take control of their health data and seek decentralized solutions, practices that adapt to this trend are future-proofing their business model. Over time, **patients will expect more control over their medical data**, and being ahead of this shift will ensure long-term relevance.
- Practices that embrace new technologies like Nostr can market themselves as **tech-forward** and adaptable to future trends, gaining an edge over more traditional competitors. This reputation is especially important as younger generations increasingly value privacy and digital autonomy. A Nostr-based service helps position the practice as aligned with these values.
4. **Integration with Bitcoin**
- By integrating a service built on Nostr, naturally linked with the bitcoin ecosystem, the practice can also introduce **bitcoin payments** as a novel way to reduce transaction fees and differentiate their practice from the competition.
- **Attract bitcoiners**: The optics practice can appeal to the Bitcoin community, who value decentralization and would appreciate paying with bitcoin or using a decentralized protocol for prescription management. This opens up a new market of patients interested in technology and financial independence.
5. **Upsell Opportunities and Revenue Diversification**
- The practice can still maintain a **competitive eyewear sales strategy** by offering upsell opportunities. When patients receive their prescription digitally, they can be automatically sent tailored offers for high-quality lenses, frames, or even add-ons like blue light coatings or progressive lenses, keeping them within the practice’s ecosystem. Practices can offer value-added eyewear options, such as free adjustments, repairs, or personalized lens consultations, which online retailers can’t easily match.
- The Nostr system can open doors to additional services beyond eyewear sales, including personalized consulting services, specialized testing (e.g., for contact lenses, binocular vision, myopia control), and more frequent checkups due to the ease of updating and verifying records.
Of course, utilizing this tool means providers need to help onboard individuals onto Nostr. In many ways, we see providers as playing into the Nostr network and flywheel effect. This is better technology with global access - and we invite you to consider other micro-apps that can continue to build out the decentralized healthcare ecosystem built on Nostr and bitcoin.
We have partnered with the Bitcoin Optometrist, [Dr Alan Bryden](https://www.brydenopticians.com/), to continue to refine the micro-application and start testing its use. We'd like to thank Dr Alan for his insights that contributed to this micro-app and write-up. Check out his site and nonprofit, [Sats for Sight](https://www.brydenopticians.com/satsforsight), to learn more about utilizing bitcoin to provide eyeglasses to those in need, along with his HODL eyewear line.
We're excited about the future of building healthcare applications on nostr and bitcoin. If you have ideas or are facing any health challenges, we're conducting product discovery interviews to understand your biggest pain points when it comes to managing and optimizing your health and healthcare data. Please reach out to jon@nosfabrica.com or [schedule time here](https://calendly.com/jon-nosfabrica/30min) to learn more about how to get involved!
**Note**: Lazer Eyes is currently only available for testing purposes as we evaluate regulatory considerations across jurisdictions.
-

@ 26838110:80edc65d
2024-12-10 08:38:42
The development of the game is going well.
I am developing all the systems at once to ensure that all of the foundations are well-made from the beginning and don't need to be reworker later.
All of the 3D components are now ready in their most basic form, including the ability to build custom ships.

The 3D engine is now integrated with the interface and both can access the same information. This makes creating the minimap trivial. The asteroid field has been tested with 20000 asteroids at 60FPS.

Space will also have locations to explore and random encounters with other ships.

The ship creation will not be based on voxels like here but will have a basic elements on which other components can be attached.

The heightmap is already integrated with the Physics engine (Havok). The yellow box is a cave entrance to test switching location and the purple box is a trader to test dialogs.
If you access the website from a desktop, you can test part of it here:
[game](https://www.dragonbanecreation.com/en/games/aurora)
-

@ eac63075:b4988b48
2024-11-09 17:57:27
*Based on a recent paper that included collaboration from renowned experts such as [Lynn Alden](nostr:nprofile1qyt8wumn8ghj7un9d3shjtntv9khqtnnd96x2tcpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtcqyr4tpe6k6v4cp0x5vneas39cqspsxp66z04tcdve5a3vntr6hy057nwgm4w), [Steve Lee](https://x.com/moneyball), and [Ren Crypto Fish](https://twitter.com/0xren_cf), we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.*
[PT-BR version](https://www.eddieoz.com/consenso-no-bitcoin-como-a-rede-evolui-sem-comprometer-a-seguranca/)
**Podcast**
https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
**Presentation**
https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
### 1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
**Evolution of Consensus in Bitcoin**
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
---
### 2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
**Validation of Blocks and Transactions**
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
**Chain Selection**
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
**Soft Forks vs. Hard Forks**
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
- **Soft Forks**: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
- **Hard Forks**: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
---
### 3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
**1. Economic Nodes**
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
**2. Investors**
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
**3. Media Influencers**
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
**4. Miners**
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
**5. Protocol Developers**
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
**6. Users and Application Developers**
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
---
### 4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
**Flag Day**
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
- **Advantages**: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
- **Disadvantages**: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
**BIP34 and BIP9**
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
- **Advantages**: Allows the network to activate updates gradually, giving more time for participants to adapt.
- **Disadvantages**: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
**User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)**
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
- **Advantages**: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
- **Disadvantages**: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
**BIP8 (LOT=True)**
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
- **Advantages**: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
- **Disadvantages**: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
---
### 5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
**Network Fragility with Alternative Implementations**
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
**Chain Splits and Impact on Stakeholders**
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
- **Institutional Investors and ETFs**: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
- **Miners**: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
- **Economic Nodes**: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
**Regulatory Impacts and Institutional Investors**
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
**Security Considerations in Soft Forks and Hard Forks**
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
**Bounty Claim Risks and Attack Scenarios**
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
---
### 6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
**1. Careful Evaluation of Proposal Maturity**
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
**2. Extensive Testing in Secure and Compatible Networks**
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
**3. Importance of Stakeholder Engagement**
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
**4. Key Questions for Evaluating Consensus Proposals**
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
**5. Coordination and Timing in Implementations**
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
**6. Continuous Monitoring and Re-evaluation**
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
---
### 7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
---
### 8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-

@ 52adc2ef:9f4bc0ba
2024-12-10 07:47:42
ในทุกวันนี้เราได้ยินข่าวสคราม มีมาตลอด ล่าสุด ยูเครน เพิ่งยิงขีปนาวุธใส่รัสเซียอีกครั้ง
หรือจะเป็นสงครามปาเลสไตน์
คำถามคือสงครามต้องใช้เงินเเละประเทศที่ทำสงครามเอาเงินมาจากไหน
สงครามยิ่งรบนาน ยิ่งใช้เงินมาก
เเต่ปัจจุบันสงคราม รบกัน 3-4 ปี หรือ เป็น 10 ปี
มาช่วยคิดหาคำตอบกัน
สรุป
ไขความลับ "ประวัติศาสตร์สงคราม" ที่ไม่มีวันรู้จบ (ดร.วิทย์ x อ.พิริยะ x คุณเฟิร์น)
https://youtu.be/E4MuRL8R-3Y?si=aFNm5BQXBIHcKw7Q
คลิปนี้มีคำตอบเเน่นอนครับผม
### เอาเงินจากไหนมาทำสงคราม
สมัยโบราณมนุษย์ใช้ เเค่ หอก ดาบ ในการทำสงคราม ซึ่งเป็นการทำสงครามที่มีต้นทุนไม่มาก
เเต่หลังปฏิวัติอุตสาหกรรม ต้นทุนเริ่มเปลี่ยนไป
ยุคก่อนเป็นยุคในการเกณฑ์คนในการทำสงคราม หรือเรียกว่า conscription
เเละการทำสงครามต้องใช้เงิน เเหล่งหาเงินคือ การยืมเงิน ออกพันธบัตร หรือ War Bond
เช่น ในสมัย รัสเซียกับญี่ปุ่น ทำสงคราม ญี่ปุ่นได้ทำ War Bond กับ ตระกูล Rothschild
หรืออีกวิธีการ คือ การขายทรัพย์สิน
เช่น สงคราม นโปเลียน ณ ตอนนั้น ฝรั่งเศส มีพื้นที่อยู่ที่ อเมริกา ประมาณ 15 รัฐ ได้ทำการขายให้ทางอมเริกา เป็นเงินจำนวน 15 ล้านเหรียญสหรัฐ
หรือเป็นการกู้เงินธนาคารในการทำสงคราม
สงครามเป็นข้ออ้างในการผลิตเงินมาโดยตลอด โดยรูปแบบของสงครามมี 2 แบบใหญ่ๆคือ
สงครามเเบบปกป้อง
ประชาชนยอมที่จะรวมใจกันช่วยประเทศ เช่น ซื้อ War bond
สงครามเเบบรุกราน
ประเภทนี้จะยากมากที่ประชาชนจะให้ความร่วมมือ ซึ่ง รัฐบาลจะต้องคิดวิธีการในการได้เงินมาทำสงคราม
สงครามโลกครั้งที่ 1 อังกฤษเเละ War Bond
ณ ตอนนั้น อังกฤษช่วยทางฝรั่งเศส เเละ รัสเซีย ในการทำสงคราม กับเยอรมัน อย่างที่ทราบว่า สงครามต้องใช้เงิน
รัฐบาลได้มีการออก War Bond เเต่ประชาชนไม่ให้ความสนใจเนื่องจากไปรุกรานประเทศอื่น ธนาคารจึงตั้งนอมินีขึ้นมาเเละออกข่าว
ว่าขายดีมาก จนทำให้ประชาชนหลงเชื่อเเละเเห่ซื้อจนหมด
สงครามเริ่มมีต้นทุนที่เเพงขึ้นเริ่มจาก World war 1 เริ่มมีเครื่องจักร รถถัง ในการทำสงคราม
เเต่ World war 2 นั้นถือว่าเป็นการรบที่มี เครื่องจักรเต็มตัว เช่น มีเครื่องบินรบเป็นต้น
เเต่หลังจากสงครามโลกครั้งที่ 2 อมเริกาได้เป็นมหาอำนาจของโลก
มีระบบการเงินใหม่ Bretton Woods system
บังคับให้ทองคำทั้งหมดมารวมกันที่อเมริกา จุดนี้ถือว่าเป็นการเริ่มผลัดใบระบบการเงินจาก ระบบมาตรฐานทองคำ มาสู่ มาตรฐานดอลล่าร์
โดย 1 ดอลล่าร์ เท่ากับ 35 ทรอยออนซ์
เเละมีการกำหนดค่าเงินกับเงินดอลล่าร์
เช่น 1 ดอลล่าร์ เท่ากับ 2.5 ปอนด์ เป็นต้น
เมื่อใช้ระบบนี้มาเรื่อยๆ ฝรั่งเศสเริ่มเห็นถึงความไม่ชอบมาพากล
ทางฝรั่งเศสได้ทำการขนเงินเพื่อที่จะเเลกทองคำกับอเมริกา เเต่ ทางอเมริกา ไม่มีทองคำที่จะคืนให้กับ ทางฝรั่งเศส
ในปี 1971
ตอนนั้น ประธานาธิบดี นิกสัน ได้ประกาศยกเลิกการอ้างอิงทองคำ เเละเข้าสู่ระบบการเงินใหม่ทันที โดยเอาทองคำออกจากระบบ
หรือ nixon shock
เเละดอลล่าร์เป็นสกุลหลักของโลกเเล้ว เมื่อ มีการพิมพ์เงิน ทุกประเทศที่ถือดอลล่าร์ก็จะจนลง
หลังจากสงครามโลกครั้งที่ 2 บริษัทเอกชน เป็นผู้ผลิตอาวุธ ซึ่งทำให้สงครามมีผลกับโลกของเศรษฐกิจอย่างหลีกเลี่ยงไม่ได้
ทำให้การผลิตอาวุธเป็นสินค้าส่งออก
หลังจากสงครามโลกครั้งที่ 2
เเม้โลกเริ่มใช้เงินดอลล่าร์เป็นฐานกันเเล้ว เเต่ยังยึดโยงกับ ทองคำอยู่ ทำให้ประชาชนยังมีส่วนได้ส่วนเสียกับสงครามอยู่
เเต่หลังจากยกเลิกมาตรฐานทองคำไป สงครามกลายเป็นสงครามตัวเเทน เป็นหน้าที่ของ Professional ในการทำสงคราม
รัฐบาลสามารถมีอำนาจพิมพ์เงินในการทำสงครามได้เลย โดยไม่ต้องขอเงินประชาชน มาในรูปแบบ เงินช่วยเหลือ
ไปช่วยประเทศอื่นๆ ขอกันได้ง่ายๆ กู้กับ Lender last resort ได้เลย
ทำให้ความยึดโยงกับประชาชน น้อยลง
เเต่มีสงครามตัวเเทนมากขึ้น
เช่น สงครามเวียดนาม สงครามอัฟกานิสถาน หรือเเม้กระทั่งสงคราม รัสเซีย ยูเครน
ส่วนปัจจัยที่ประชาชนสนใจสงครามน้อยลงเนื่องจาก เทคโนโลยีทหาร ที่เป็นเเบบ ไฮเทคมากขึ้น
ใช้กำลังพลจำนวนน้อย
น้ำมันกับความต้องการดอลล่าร์
อีกช่วงที่เกิดขึ้น เนื่องจากโลกได้ค้นพบพลังงานที่ทั้งโลกนั้นขาดไม่ได้นั้นคือ น้ำมัน
อเมริกานั้นมีความสนิทสนมกับทางกลุ่ม opac เเละขอให้ การซื้อขายน้ำมันต้องเเปลงเป็นดอลล่าร์ก่อนเท่านั้น
นี่ทำให้ความต้องการใช้ดอลล่าร์มีมากขึ้นอย่างชาญฉลาด
**สภาพคล่องที่ไม่มีประสิทธืภาพจะนำมาสู่ความพังพินาศ**
**Inflation is a nation buster**
นักเศรษฐศาสตร์รู้อยู่เเล้วว่า อยากจะทำลายประเทศไหน ให้สร้างเงินเฟ้อ ซึ่งไม่ใช่เรื่องใหม่
สิ่งที่เเปลกเเละใหม่กว่าคือบอกว่า การมีเงินเฟ้ออ่อนๆเป็นสิ่งที่ดี
เเละส่วนของอุตสาหกรรมทางทหารนั้นถ้ามองจากงบประมาณ อาจจะไม่มาก เเต่จะซ่อนอยู่ที่อื่นๆ
เช่น อยู่ในงานวิจัยต่างๆ เพราะรัฐบาลเป็นคนให้การสนับสนุน กับโครงการเหล่านี้ วิจัยอาหาร ยา เครื่องยนต์
เพราะลูกค้าคือรัฐบาล
อุตสาหรรมเกี่ยวกับ Military Industrail complex เติบโตอย่างมาก
เช่น เหตุการณ์ไปรบที่อัฟกานิสถาน รัฐบาลไม่ได้ไปเองเเต่จ้าง บริษัทเอกชน outsource เป็นคนจัดการทั้งหมด
การทหารแฝงอยู่ในธุรกิจเอกชนทั่วไป
**ทำไมต้องทำสงครามเมื่ออเมริกามีอำนาจทางการทหาร ที่เเข็งเเกร่งอยู่เเล้ว**
any spending is good spending
goverment spending is war
อยากให้ตัวเลข GDP ดีขึ้นก็เเค่ทำสงคราม เบิกเงินช่วยเหลือ GDP ก็ดีตาม
เเละด้วยความเป็นมนุษย์ อำนาจ มีเเล้วก็อยากจะมีเพิ่ม ไม่เคยพอ
ยิ่งพิมพ์เงินทำสงครามคนที่ถือเงิน US ก็ยิ่งเสียอำนาจการจับจ่ายใช้สอยเพราะทุกประเทศมี US เป็นเงินสำรอง
ปล้นเงินจากเราได้ง่ายๆ
เเต่
Bitcoin มาเเก้ปัญหาเรื่องการพิมพ์เงินจากรัฐบาล เอาอำนาจการพิพ์เงินออกไป
เเละถ้ารัฐบาลจะทำสงครามก็ต้องมีส่วนร่วมกับประชาชน
สงครามจะเป็นเเบบสั้นลง เพราะต้นทุนสูงเหมือนสมัยก่อน
สรุปสุดท้าย
โลกยังไงก็มีสงคราม เเต่การที่มีระบบการเงินที่เสกเงินได้ทำให้สงครามไม่มีวันจบ !
-

@ a012dc82:6458a70d
2024-12-10 05:32:42
**Table Of Content**
- The Lone Star State's Embrace of Bitcoin Mining
- Legislation and the Miner's Triumph
- A Testament to Texan Openness
- The Economic Implications
- The Global Perspective
- Conclusion
- FAQ
In the vast expanse of the digital age, where boundaries are constantly being redrawn, Texas emerges as an unlikely hero. The state, with its deep-rooted traditions and rugged landscapes, has become a beacon for the future of digital currency. As the world grapples with the implications of decentralized finance, Texas stands tall, bridging the gap between the old and the new. This is the story of how the Lone Star State became the epicenter of the Bitcoin mining revolution.
**The Lone Star State's Embrace of Bitcoin Mining**
It's not every day that a state becomes a hotspot for a global phenomenon, especially one as groundbreaking as Bitcoin mining. But Texas, with its vast landscapes and iconic cowboy culture, has done just that. The state, known for its oil rigs and cattle ranches, has now become synonymous with the hum of Bitcoin mining rigs. It's like the Gold Rush of the 21st century, but instead of panning for gold, folks are mining digital currency.
**Legislation and the Miner's Triumph**
Now, you might be wondering, how did Texas, of all places, become this global mecca for Bitcoin mining? Well, it's a tale of business, politics, and a bit of good ol' Texan spirit. For instance, there was this proposed legislation, SB 1751, that had the potential to throw a wrench in the works. This bill, which breezed through the state senate initially, aimed to cut down the incentives miners received from the power grid and put an end to mining tax abatements. Just to give you a sense of the scale, this could've set Riot back by a whopping $30 million! But here's where the story takes a twist. After the bill made its way through the Senate, the mining industry didn't just sit back and accept their fate. Oh no, they took the bull by the horns. They met with politicians, laid out their case, and made it clear how beneficial they were to the grid. And guess what? Their efforts bore fruit. The bill, which once seemed like a sure thing, met its end in the House. And boy, did the miners celebrate that victory!
**A Testament to Texan Openness**
The relationship between Texas and the Bitcoin mining community is unique. It's not just about business; it's about understanding, collaboration, and mutual respect. Regulators in Texas have been incredibly receptive to Bitcoin miners, recognizing the myriad benefits these miners bring to the grid. Texas has opened its arms wide, welcoming an industry that's reshaping the global financial landscape.
**The Economic Implications**
Beyond the hum of the mining rigs and the intricacies of legislation, there's a broader economic narrative unfolding. Texas' embrace of Bitcoin mining is not just about digital currency; it's about job creation, infrastructure development, and fostering innovation. As more miners set up shop, local economies benefit, and the state solidifies its position as a hub for technological advancement.
**The Global Perspective**
The world is watching, and Texas is setting a precedent. Other states and countries are taking note of how Texas has managed to integrate Bitcoin mining into its economic and legislative framework. The state's success story serves as an inspiration for regions looking to tap into the potential of digital currencies and the industries they spawn.
**Conclusion**
The tale of how Texas, with its rich history and tradition, has become a beacon for the future of finance is a testament to the state's adaptability, its willingness to evolve, and its undying spirit of enterprise. As the world continues its march towards a digital future, Texas stands tall, not just as a participant but as a leader. The future is not just bright; it's digital.
**FAQ**
**What's the significance of Texas in the Bitcoin mining industry?**
Texas has emerged as a global hotspot for Bitcoin mining, attracting miners with its favorable regulations and infrastructure.
**How did Texas respond to the proposed SB 1751 legislation?**
While the bill initially passed the Senate, it was later rejected in the House after miners and industry representatives made their case.
**Why are regulators in Texas supportive of Bitcoin miners?**
Texas regulators recognize the economic benefits and technological advancements that Bitcoin miners bring to the state.
**Is Texas' Bitcoin mining boom just about digital currency?**
No, it's also about job creation, infrastructure development, and fostering innovation in the state.
**How is Texas influencing other regions regarding Bitcoin mining?**
Texas' success in integrating Bitcoin mining is serving as a role model for other states and countries looking to tap into the potential of digital currencies.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-

@ eac63075:b4988b48
2024-11-07 21:27:53
Every night, you draw your curtains without thinking twice. It's instinctive—a simple act that protects your personal space. Yet in our digital lives, we've somehow accepted living in houses made entirely of glass, with countless unseen observers watching our every move.
https://www.fountain.fm/episode/wPZLCJ3fD6vzsWQ3XSE1
## Why Privacy Matters to Everyone
Privacy isn't just for those with something to hide; it's a fundamental human need. Think about the conversations you have with friends, the late-night web searches you make, the personal moments you capture in photos. Would you want all of that broadcasted to the world?
I remember my friend Lisa planning a surprise party for her husband. She searched for gift ideas and coordinated with friends through social media. To her dismay, targeted ads for the exact gift she intended to buy started popping up on their shared devices at home. The surprise was ruined. It wasn't malicious, but it was a stark reminder of how our online activities are constantly monitored.
When a major retailer's customer database was breached, my neighbor Sarah discovered her shopping history, credit card details, and even her children's names were exposed to criminals. She hadn't realized how much personal information she'd unknowingly shared through routine purchases. It was a wake-up call that privacy breaches can affect anyone, not just the tech-savvy or those in high-profile positions.
Edward Snowden once said, **"Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say."** Privacy isn't about secrecy; it's about autonomy over our personal information.
## The Rise of the Cypherpunks
Back in the '90s, a group known as the cypherpunks saw the writing on the wall. They recognized that as we moved into a digital era, our personal freedoms could be at risk. So they took action.
One of them, Eric Hughes, famously wrote, **"Privacy is necessary for an open society in the electronic age."** They developed encryption tools to protect individual privacy, laying the groundwork for technologies like Bitcoin and cryptocurrencies. These innovations were about more than digital money; they were about empowering individuals to take control of their own data.
## When Technology Knows Too Much
Fast forward to today, and artificial intelligence (AI) is everywhere—in our phones, homes, and even cars. While AI brings convenience, it also raises serious privacy concerns.
Remember when you mentioned needing new running shoes, and suddenly every ad on your browser was for footwear? It's not your imagination. AI algorithms analyze our conversations, searches, and purchases to predict what we'll want next. But where does it stop?
A few years ago, a major retailer guessed a teenager was pregnant based on her shopping habits before she had told her family. They sent her targeted coupons for baby products, leading to a very uncomfortable situation at home. This isn't just marketing—it's intrusion.
Naomi Brockwell, a privacy advocate, [warns](https://x.com/naomibrockwell/status/1833055298288058624), **"Our relationship with financial privacy has fundamentally changed. What was once seen as a constitutional right and personal freedom is now simply part of the trade-off for using digital payments. Our baseline for what’s acceptable has shifted."** It's a wake-up call that our digital footprints are larger and more revealing than we might think.
### Privacy-Preserving AI
While AI often threatens privacy, emerging technologies like **federated learning** offer hope. This approach allows AI models to learn from data without directly accessing personal information. Imagine your phone improving its predictive text without sending your messages to a central server. It's AI that respects your privacy.
## The Watchful Eye: Mass Surveillance and AI
Governments and corporations often justify mass surveillance as a means to keep us safe. But at what cost? When every email, message, or phone call can be monitored, we're sacrificing more than just data—we're giving up our freedom to think and communicate without fear.
Think about how you'd behave if someone followed you around with a camera all day. You might avoid certain places or people, censor your conversations, or feel constantly on edge. That's the chilling effect of mass surveillance.
I spoke with Alex, a journalist who covers political activism. "After attending a peaceful protest, I noticed unusual activity on my devices," he told me. "It made me second-guess my work, wondering who's watching." This isn't paranoia; it's a reality for many who challenge the status quo.
## Building Digital Fortresses: Cryptographic Innovations
So how do we reclaim our privacy? Cryptography offers some solutions.
### Zero-Knowledge Proofs: Proving Without Revealing
**Zero-knowledge proofs** allow you to prove you know something without revealing the actual information. Imagine showing a bouncer a card that confirms you're over 21 without exposing your birth date or any other details. In the digital world, this means verifying your identity or eligibility without handing over all your personal data.
### Homomorphic Encryption: Secure Processing
Then there's **homomorphic encryption**, which lets companies process your data without actually seeing it. Think of it like sending a locked suitcase with your belongings; they can weigh it or move it, but they can't open it to see what's inside.
### Quantum-Resistant Algorithms: Future-Proofing Privacy
As quantum computers become more powerful, they could potentially break current encryption methods. **Quantum-resistant algorithms** are being developed to safeguard our data against these future threats. It's like reinforcing your digital locks today to withstand the super lock-picking tools of tomorrow.
## Decentralization: Taking Back Control
Decentralization aims to put power back into the hands of individuals. Bitcoin let you be your own bank, controlling your finances without a middleman. Decentralized social media platforms like Nostr, Bluesky or Fascaster allow you to own your content without algorithms dictating what you see or who sees you.
### Decentralized Identity Systems
**Decentralized identity systems** let you prove who you are without revealing more than necessary. It's like showing only your age at a bar instead of handing over your entire driver's license. You maintain control over your personal information.
But with great power comes great responsibility. Without a bank to reset your password or customer service to recover your account, the onus is on you to protect your assets and information.
## Practical Tips to Protect Your Privacy
You don't have to be a tech guru to safeguard your privacy. Here are some steps you can take today:
- **Use Encrypted Messaging Apps**: Switch to apps like **Signal, SimpleX or Session** for secure communication. Your messages will be end-to-end encrypted, meaning only you and the recipient can read them.
- **Limit Social Media Sharing**: Be mindful of what you post. Do you really need to share your location or personal details publicly?
- **Choose Privacy-Focused Browsers and Search Engines**: Use browsers like **Brave** or **Firefox** and search engines like **DuckDuckGo** that don't track your every move.
- **Secure Your Passwords**: Use strong, unique passwords for each account, and consider a password manager like **Bitwarden**. Enable two-factor authentication whenever possible.
- **Use Encrypted Email Services**: Consider email providers like **ProtonMail** that offer end-to-end encryption for your communications.
- **Regularly Audit App Permissions**: Check which apps have access to your location, microphone, and contacts. Revoke permissions that aren't necessary.
- **Be Wary of Public Wi-Fi**: Public networks can be a hotbed for hackers. If you must use them, a VPN like **ProtonVPN** can add a layer of security.
- **Consider Privacy-Focused Alternatives**: Explore services like **Nextcloud** for cloud storage or **Jitsi Meet** for video conferencing, which prioritize user privacy.
- **Keep Software Updated**: Regular updates often include security patches. Don't ignore them.
- **Stay Informed and Skeptical**: Phishing scams are getting more sophisticated. Think before you click on suspicious links or download attachments.
## Final Thoughts
Privacy isn't a lost cause; it's a right worth fighting for. As Edward Snowden reminds us, **"Privacy is the fountainhead of all other rights."**
By taking control of our data and digital habits, we can navigate the online world with greater confidence and peace of mind. After all, wouldn't it be nice to live in a digital home where we decide when to close the curtains?
## Read more
**OPSEC and Digital Hygiene Plan:** <https://www.eddieoz.com/opsec-and-digital-hygiene-plan/>
-

@ 42342239:1d80db24
2024-11-06 09:05:17
*TL;DR:* J.D. Vance recently observed that many in the Democratic Party are attempting to manufacture trust from the top down, neglecting the fact that genuine trust is often born from grassroots connections. There's indeed a stark contrast between trust that's artificially constructed through manipulation and censorship, and trust that's organically cultivated from the ground up.
Trump's vice presidential candidate J.D. Vance appeared on podcast host Joe Rogan's show earlier [in November](https://www.youtube.com/watch?v=fRyyTAs1XY8). According to Vance, large parts of the Democratic Party are trying to create higher trust from above, without understanding that the previously high trust once arose organically: "I think that a lot of them are trying to reimpose that social trust from the top."
Most people understand the importance of high trust. Political scientist Robert D. Putnam, for example, has shown that large social capital, in the form of trust and networks, is a key factor for economic growth, cooperation, and problem-solving. See e.g. his book *Bowling Alone: The Collapse and Revival of American Community (2000)*.
The low trust today is widespread. Trust in the American [federal government is at historically low levels](https://www.pewresearch.org/politics/2024/06/24/public-trust-in-government-1958-2024/). Trust in the media is at [rock-bottom levels](https://www.axios.com/2021/01/21/media-trust-crisis). Even [trust in doctors and hospitals has plummeted](https://jamanetwork.com/journals/jamanetworkopen/fullarticle/2821693#zoi240783r29): at the beginning of 2024, the proportion of people who reported "a great deal of trust" had dropped to 40%, from 72% in April 2020. This can be concerning, as individuals with low trust in doctors and hospitals will be less likely to follow their advice and recommendations. It's therefore not surprising that many want to "rebuild trust" (this was the theme of the World Economic Forum's [annual meeting this year](https://www.weforum.org/events/world-economic-forum-annual-meeting-2024/?nis=5)).
#### How much trust is actually reasonable?
But how much trust is actually reasonable? To determine this, one can ask whether an institution has acted reliably in the past, whether it possesses the knowledge and ability required to deliver what is promised, and whether its interests are in line with our own.
The low trust figures among Americans are likely a reflection of the fact that many of them today question the extent to which the answers to these questions are actually affirmative. During the pandemic, medical experts in the UK incorrectly predicted that [hundreds of thousands](https://www.washingtonexaminer.com/news/confusion-imperial-college-scientist-says-500k-coronavirus-death-projection-in-uk-remains-unchanged) of people would die. In the US, the leading infectious disease expert misled the public about, among other things, face masks, the sitting president lied about both [the effectiveness and safety of vaccines](https://edition.cnn.com/2021/07/22/politics/fact-check-biden-cnn-town-hall-july/index.html), a British health minister wanted to "[scare the pants off people](https://www.affarsvarlden.se/kronika/nudge-vurmare-maste-ner-fran-sina-hoga-hastar-far-noja-sig-med-tjocka-ponnys)," and virus experts even [conspired to mislead about the origin of the SARS-CoV-2 virus](https://www.epochtimes.se/Till-konspirationsteoriernas-forsvar). All while social media companies, under pressure from governments, were forced to [censor information that was actually correct](https://www.youtube.com/watch?v=Ff4fRgnuFgQ).
#### Trust - built on sand or on solid ground?
It's possible to continue on the current path and try to improve trust figures by limiting access to information. For instance, if the public doesn't get access to negative information about authorities or experts, the measured trust can increase. But in that case, trust is merely built on sand, waiting to be undermined by the inexorable forces of truth.
But there's another possibility. Building relationships that are genuine and honest, listening to each other without judgment, and communicating without misleading. Doing things that really matter, and doing them well, showing competence and reliability through actions. In this way, trust can grow naturally and organically. A trust built on solid ground, not on sand. A delicate task. But presidential election or not, isn't it time for us to start building a future where this form of trust is the obvious foundation?
-

@ 6389be64:ef439d32
2024-12-09 23:50:41
Resilience is the ability to withstand shocks, adapt, and bounce back. It’s an essential quality in nature and in life. But what if we could take resilience a step further? What if, instead of merely surviving, a system could improve when faced with stress? This concept, known as anti-fragility, is not just theoretical—it’s practical. Combining two highly resilient natural tools, comfrey and biochar, reveals how we can create systems that thrive under pressure and grow stronger with each challenge.
### **Comfrey: Nature’s Champion of Resilience**
Comfrey is a plant that refuses to fail. Once its deep roots take hold, it thrives in poor soils, withstands drought, and regenerates even after being cut down repeatedly. It’s a hardy survivor, but comfrey doesn’t just endure—it contributes. Known as a dynamic accumulator, it mines nutrients from deep within the earth and brings them to the surface, making them available for other plants.
Beyond its ecological role, comfrey has centuries of medicinal use, earning the nickname "knitbone." Its leaves can heal wounds and restore health, a perfect metaphor for resilience. But as impressive as comfrey is, its true potential is unlocked when paired with another resilient force: biochar.
### **Biochar: The Silent Powerhouse of Soil Regeneration**
Biochar, a carbon-rich material made by burning organic matter in low-oxygen conditions, is a game-changer for soil health. Its unique porous structure retains water, holds nutrients, and provides a haven for beneficial microbes. Soil enriched with biochar becomes drought-resistant, nutrient-rich, and biologically active—qualities that scream resilience.
Historically, ancient civilizations in the Amazon used biochar to transform barren soils into fertile agricultural hubs. Known as *terra preta*, these soils remain productive centuries later, highlighting biochar’s remarkable staying power.
Yet, like comfrey, biochar’s potential is magnified when it’s part of a larger system.
### **The Synergy: Comfrey and Biochar Together**
Resilience turns into anti-fragility when systems go beyond mere survival and start improving under stress. Combining comfrey and biochar achieves exactly that.
1. **Nutrient Cycling and Retention**\
Comfrey’s leaves, rich in nitrogen, potassium, and phosphorus, make an excellent mulch when cut and dropped onto the soil. However, these nutrients can wash away in heavy rains. Enter biochar. Its porous structure locks in the nutrients from comfrey, preventing runoff and keeping them available for plants. Together, they create a system that not only recycles nutrients but amplifies their effectiveness.
2. **Water Management**\
Biochar holds onto water making soil not just drought-resistant but actively water-efficient, improving over time with each rain and dry spell.
3. **Microbial Ecosystems**\
Comfrey enriches soil with organic matter, feeding microbial life. Biochar provides a home for these microbes, protecting them and creating a stable environment for them to multiply. Together, they build a thriving soil ecosystem that becomes more fertile and resilient with each passing season.
Resilient systems can withstand shocks, but anti-fragile systems actively use those shocks to grow stronger. Comfrey and biochar together form an anti-fragile system. Each addition of biochar enhances water and nutrient retention, while comfrey regenerates biomass and enriches the soil. Over time, the system becomes more productive, less dependent on external inputs, and better equipped to handle challenges.
This synergy demonstrates the power of designing systems that don’t just survive—they thrive.
### **Lessons Beyond the Soil**
The partnership of comfrey and biochar offers a valuable lesson for our own lives. Resilience is an admirable trait, but anti-fragility takes us further. By combining complementary strengths and leveraging stress as an opportunity, we can create systems—whether in soil, business, or society—that improve under pressure.
Nature shows us that resilience isn’t the end goal. When we pair resilient tools like comfrey and biochar, we unlock a system that evolves, regenerates, and becomes anti-fragile. By designing with anti-fragility in mind, we don’t just bounce back, we bounce forward.
By designing with anti-fragility in mind, we don’t just bounce back, we bounce forward.
-

@ 4ba8e86d:89d32de4
2024-12-09 23:12:11
A origem e o desenvolvimento do SearXNG começaram em meados de 2021, após o fork do conhecido mecanismo de metabusca Searx, inspirado pelo projeto Seeks. Ele garante privacidade básica ao misturar suas consultas com outras pesquisas, sem armazenar dados de busca. O SearXNG pode ser adicionado à barra de pesquisa do navegador e também configurado como mecanismo de busca padrão.
Embora o SearXNG não ofereça resultados tão personalizados quanto o Google, ele não gera um perfil sobre você. Controle Total sobre Seus Dados: com o SearXNG, você tem controle absoluto sobre suas informações de pesquisa. O histórico de busca é totalmente opcional e pode ser ativado ou desativado conforme sua preferência. Além disso, é possível excluir qualquer entrada a qualquer momento, garantindo sua privacidade. Resultados de Fontes Diversificadas: o SearXNG agrega informações de mais de 70 fontes diferentes, proporcionando uma pesquisa mais abrangente e relevante. Em vez de se limitar a uma única fonte, você obtém uma visão mais ampla e detalhada das informações disponíveis.
O SearXNG respeita sua privacidade, nunca compartilha dados com terceiros e não pode ser usado para comprometer sua segurança.
O SearXNG é um software livre com código 100% aberto, e qualquer pessoa é bem-vinda para contribuir com melhorias. Se você valoriza a privacidade, deseja ser um usuário consciente ou acredita na liberdade digital, faça do SearXNG seu mecanismo de busca padrão ou instale-o em seu próprio servidor.
O SearXNG reconhece sua preocupação com logs, por isso o código-fonte está disponível para que você possa executar sua própria instância:
https://github.com/searxng/searxng
Adicione sua instância à lista de instâncias públicas.
https://searx.space/
para ajudar outras pessoas a recuperar sua privacidade e tornar a internet mais livre. Quanto mais descentralizada for a internet, maior será a liberdade para todos!
Lista de Instâncias Públicas
https://searx.space/
Documentação de Instalação
https://docs.searxng.org/admin/installation.html#installation
SeaxrXNG : Instalação , configuração e publicação.
https://youtu.be/zcrFPje6Ug8?si=oOI6dqHfHij51rvd
https://youtu.be/8WHnO9gJTHk?si=-5SbXUsaVSoSGpps
-

@ dff95033:862fbf40
2024-12-09 22:42:32
<img src="https://blossom.primal.net/0ac86bb186d6ada9099d8c8aad442bd264ee51333e876c142858a3f4ba32d306.png">
## DADOS BIBLIOGRÁFICOS
- Autor: Daniel J. Levitin
- Título: A Mente Organizada: Como Pensar com Clareza na Era da Sobrecarga de Informação
- Título Original: The Organized Mind: Thinking Straight in the Age of Information Overload
- Tradutor: Regina Lyra
- Editora: Objetiva
- Ano de Publicação no Brasil: 2015
- Ano de Publicação Original: 2014
- ISBN (Edição Brasileira): 978-8539006465
- Páginas: 512
- Gênero: Psicologia, Ciência Cognitiva, Desenvolvimento Pessoal
## INTRODUÇÃO
> "Não se pode confiar na memória porque o sistema de arquivamento do cérebro destreinado é uma porcaria. Ele pega tudo que acontece com você e joga de qualquer jeito num grande armário escuro — quando você entra lá procurando algo, só consegue achar as coisas grandes e óbvias, como a morte de sua mãe, ou então coisas de que realmente não precisa. Coisas que você não está procurando, como a letra de ‘Copacabana’. Você não consegue encontrar o que precisa. Mas não entre em pânico, porque ainda está lá.” (The Mentalist, citado por Daniel Levitin em A Mente Organizada)
Quando me deparei com o livro “A Mente Organizada”, de Daniel Levitin, impulsivamente o adicionei à minha lista de leitura — apenas para deixá-lo esperando por meses. É irônico que um livro sobre organização estivesse preso no caos da minha própria lista, não estranhamente em uma era dopamínica — onde cada notificação e distração competem para roubar nossa atenção. No entanto, ao finalmente mergulhar em suas linhas, percebi que a obra é uma verdadeira ode à capacidade humana de organizar o conhecimento e a informação.
## ESTRUTURA E CONTEÚDO
Dividido em três partes, “A Mente Organizada” nos guia por um entendimento prático sobre a mente humana. A Parte Um apresenta o mecanismo de atenção do cérebro, explorando como ele lida com o fluxo incessante de informações e decisões. Levitin discute a importância da atenção e como ela é fundamental para processar a quantidade massiva de dados que enfrentamos diariamente. Ele argumenta que entender esses mecanismos é crucial para melhorar nossa capacidade de foco e eficiência.
A Parte Dois oferece estratégias que colaboram com esse mecanismo, ajudando a organizar nossos ambientes físico, profissional, social e temporal. Levitin sugere métodos práticos, como a categorização e a criação de listas, que podem facilitar a tomada de decisões e reduzir a sensação de sobrecarga informacional. A ênfase na organização do espaço físico e do tempo é particularmente relevante em uma era onde distrações são constantes. Com a estrutura bem definida, Levitin avança para aprofundar seu estilo e explorar a complexidade de transmitir conceitos desafiadores de maneira acessível.
Por fim, a Parte Três discute como preparar a próxima geração para enfrentar os desafios do mundo moderno, equilibrando organização e criatividade. Levitin enfatiza a importância da educação em habilidades organizacionais desde cedo, preparando os jovens para um futuro onde o gerenciamento eficaz da informação será ainda mais crítico. Essa abordagem não apenas prepara os jovens para um futuro de desafios, mas também nos faz refletir sobre o legado que estamos construindo hoje.
## ESTILO E APROFUNDAMENTO
A verbosidade de Levitin pode parecer desafiadora em alguns momentos, mas são nestes pontos que reside o valor do livro. Sua escrita flui como ondas: ora simples e objetiva, ora densa e desafiadora. Essa variação mantém o leitor engajado e instigado, permitindo uma compreensão mais profunda dos conceitos apresentados. Cada nuance tem seu propósito, oferecendo ao leitor as bases para compreender plenamente a obra ou para instigar novas inspirações e perspectivas.
Levitin se esforça para tornar pesquisas e estudos sobre o tema acessíveis a um público amplo, evitando tanto a superficialidade quanto a complexidade excessiva. Essa abordagem é especialmente valiosa em um contexto onde muitos textos acadêmicos podem se tornar herméticos.
## REFLEXÕES PESSOAIS
> Como frisei no decorrer deste livro, o princípio fundamental da organização, o mais crucial para evitar que percamos ou esqueçamos as coisas, é este: descarregue do cérebro para o mundo externo o ônus de organizar." (A Mente Organizada, Daniel Levitin).
Ler A Mente Organizada foi um desafio que me obrigou a encarar a zorra informacional do dia a dia de frente. Não foi apenas uma leitura, mas um embate com os meus próprios hábitos e uma pausa necessária para questionar: estou realmente lidando bem com os estímulos ao meu redor? À deriva em águas turbulentas, precisei aceitar, com humildade, as ferramentas oferecidas pelo livro para enfrentar os desafios atuais.
Senti-me provocado a observar com mais atenção tudo o que carrego, tanto física quanto mentalmente. Quantas ideias, compromissos e pensamentos acumulados passam despercebidos, sem nunca encontrar um lugar ou um significado real? Esse convite à introspecção foi um lembrete poderoso de que, mais do que organizar o que está fora, preciso organizar o que está dentro — e isso começa com um olhar honesto, e sim, doloroso, sobre o impacto que o excesso tem em minha vida.
Esse foi o verdadeiro desafio: perceber que minha forma de organização precisava de um novo olhar. Não basta apenas acumular ideias; é essencial dar-lhes estrutura, conectá-las e transformá-las em algo maior — ou descartá-las, quando necessário. Entender as miríades que moldam meu pensar e agir foi fundamental, e, neste ponto, o livro foi nada menos que revelador. A estética, o particionamento e o naturalismo solidificam as minhas bases, transformando a organização em algo mais do que uma sistemática: ela se torna uma expressão de qualidade de vida e saúde.
## CONCLUSÃO
A Mente Organizada é uma obra que, para alguns, será apenas um folhetim, enquanto para outros será um verdadeiro manancial de sabedoria. Mas, acima de tudo, o que Daniel Levitin nos oferece são possibilidades — um convite à lapidação dessa gema preciosa e instigante que é a busca por sermos melhores do que somos hoje. Se você chegou a este livro, consciente ou não, já deu o primeiro passo nessa jornada.
Assim, caro leitor, deixo em tuas mãos esta obra, singela em proposta, mas grandiosa em potencial. Que ela inspire sua apreciação e, acima de tudo, seu uso.
Fecho esta gaveta aqui e espero ter apreciado o que há dentro dela — ou não. Se trouxe alguma ordem à bagunça, compartilhe e, se puder, contribua com o café — porque até a organização precisa de combustível.
-

@ 8e56fde2:bb433b31
2024-12-09 21:04:00
So let us give a little bit on context first to get the WHOLE PICTURE.
We DoShitters are a trio of friends who one day decided we wanted to create some shit together.
We are artists from different fields, and at the time two of us were struggling from creative block, so we decided to create the ultimate tool to COMBAT CREATIVE BLOCK. It would be an Oracle about the creative process and it would be inspired on the Hero's Journey and on our own journeys as artists; and hence "DoShit!" was born.

Once we knew what we wanted to do, and it started to have a shape, we decided to go through the hardship of self-producing and selling the cards by ourselves directly on our website ( www.doshitters.com ), which allowed us to keep control of the product at all times during production, and to have a direct relationship with our audience and buyers. Besides from guaranteeing we weren't left with the tiniest percentage of the sales pie. (At least in Spain, when you get a big publisher involved, you can forget getting even 10% of sales, and you lose a lot of the creative control of your project).
We invested a lot of our own resources in making sure "DoShit!" was a quality product and we were lucky enough to get the help of a generous patreon who enabled us to create what is now the DoShit! deck. <3

We did local presentations of the product in both Barcelona and Madrid, and got the deck to be sold in cool local stores, where we offered to do live readings and got to talk with people of all kinds about the Shit they wanted to do.
Above all, DoShit! is an inspirational tool.
**And you must be asking yourself, "What does this have to do with Amazon?".
**
Well, one of the problems of self-producing and having local fulfilment of the product is that shipping costs just couldn't compete with what the average consumer has gotten used to because of Amazon's mass scale free shipping.
We were finding that, specially for our followers in the USA, it was impossible to assume shipping costs (which amounted to almost the same cost as the actual deck); but we didn't want to give up on the people who wanted to get inspired by DoShit! but lived on the other side of the world from us, so...
WE DECIDED TO MAKE A DEAL WITH THE DEVIL, aka Amazon.

We knew that selling our product on Amazon was going to result in less revenue from the sales for us, but for us it was mostly about GETTING DoShit! TO A WAREHOUSE IN THE USA to be able to offer the deck with Free Shipping. And that's what we did.
But we didn't know everything that would come as a result, (they don't really advertise the hidden costs and fees, or the speed at which they want you to expedite your sales) and we've been paying for that decision ever since.

In any case, they lured us in with a 3 months no cost promotion. You obviously assumed the cost of shipping it there, and they would take a cut from every sale that happened in their web, but we didn't have any way of knowing the cost that we would need to incur after those first three months.
Another thing that wasn't advertised is that IF YOU ACTUALLY WANT YOUR PRODUCT TO BE FEATURED ANYWHERE, you need to be eligible as an A+ content seller, which also comes at a cost, and you need to pay additionally for sponsored ads; otherwise, your product is basically shut down in a black hole of zero discoverability except for people using the direct link.

The three months went by fast and then the invoices started coming, and the automatic charges on our account started to empty our independent seller bank account.
As you can imagine, independent sellers like us sometimes require of TIME to be able to get the word out, to get people to buy your product... Besides, as artists with other projects on the pipeline, we couldn't really spend much time focusing on sales, nor did we want to. And in all honestly, we refused to give Amazon more money in sponsored ads and other programs to "gain visibility".
We knew we had no way of competing with the big sellers on the platform, but we just thought, "AT LEAST IT'S AVAILABLE FOR THOSE WHO WANT TO BUY IT".

But then, out of the blue, we noticed our link on Amazon wasn't working. A friend tipped us off that it wasn't allowing any sales, it was listed as "currently unavailable", without us having done anything to trigger that change.
Suddenly we received an email from the giant informing us that our account had been set to inactive due to "dormancy", and that we needed to re-verify our identity. Not only that, but since we were in Europe, and they didn't have an address in the US they could send the decks back to, if we didn't get everything solved in time, THEY WERE GOING TO DESTROY THE DECKS THEY HAD IN THEIR WAREHOUSE because of their "Automated removal" policy.
This caught us while we were on holidays, away from our desktops, seller logins and such and we did everything the seller support requested from us as rapidly as possible.
The nightmare of imagining our beautiful decks being destroyed really put us in a state of panic. We hoped everything would be solved after several support tickets stating our case, and pleading that they don't destroy the decks!

In the end, after several communications, they reactivated our listing which had apparently been set to inactive because of "stranded inventory" due to "excess inventory"; which is Amazon talk for: "YOU'RE NOT SELLING FAST ENOUGH".
After having gone through that experience we knew one thing for certain, WE WANTED TO BREAK FREE FROM AMAZON as soon as possible, but we still wanted to offer our DoShit! decks with Free Shipping for our customers; at least this Christmas...

So, best case scenario, all the DoShit! decks that are at Amazon get sold this Christmas campaign, with the jolly merry spirit, people and nostriches all around the world get excited about GIFTING INSPIRATION (and taking advantage of the Free Shipping) and help us to GET THE DECKS OUT OF AMAZON!

But we know this may be wishful thinking T.T ,
That is why we are also looking for independent shops in the USA that feel that DoShit! makes sense in their store, and would want to become the new home of the decks that remain in american soil after the Christmas campaign. So maybe somebody wants to become the "foster home" to these Oracles as they find their new home in 2025, so they decks can go from that abussive giant with high time preference, to a friendly purple shop with low time preference and no hidden tricks.
After all, many people kickstart the year with their minds set on their New Year Resolutions, they want to DO SHIT! So Who Knows?

In any case, to all the small sellers out there, BEWARE OF MAKING THAT PACT WITH THE DEVIL.
We knew we had never wanted to get our Shit on Amazon, we knew the system was rigged again us, but still, we wanted to make it more affordable for people to get their hands on the deck.
Artists struggle enough to have to additionally add exhorbitant shipping costs to acquire a creativity tool like "DoShit!".
And if you, like us, find yourself having to do that pact anyway, we hope our tale will at least help you navigate all the hidden traps that their system throws at you.

IF YOU WANT TO JOIN THE CREATIVE RESCUE MISSION TO FREE THE DECKS,
please, support us as best you can, share our story, recommend our deck, but best of all GIFT THE "DoShit!" DECK THIS CHRISTMAS! <3
You can find it at its captor's site at https://a.co/d/hrKXEBF , or if you'd rather NOT BUY SHIT ON AMAZON, you can always buy it at the Plebeian Market with your Sats, and we'll get one out of Amazon on your account.
(https://plebeian.market/p/f82c481a3ae2a284049631a50373f4b9262c0e0b80977a4de1a71fcc19c5635d/stall/c9744507a49cf647c5612204416b7e22bdab86fbaff85413cfbc41103a0d269a)

THANKS FOR CARING,
This 2025, we wish you all to DO THE SHIT THAT MATTERS TO YOU!
#DoShit! #JoinTheArtmy
-

@ a8ad8bb0:b4495d5c
2024-12-09 20:54:02
Your mindset is the lens through which you view the world. It's the collection of thoughts, attitudes, and beliefs that shape your perceptions, influence your behavior, and ultimately determine your success. A strong, positive mindset is the foundation upon which you can build a fulfilling life, achieve your goals, and overcome obstacles.
The Two Mindsets: Fixed vs. Growth
According to Carol Dweck, a renowned psychologist, there are two primary mindsets: fixed and growth.
1. *Fixed Mindset:* A fixed mindset assumes that abilities, intelligence, and talents are innate and unchangeable. People with a fixed mindset believe that success is solely dependent on natural ability, rather than effort and learning. This mindset can lead to a fear of failure, avoidance of challenges, and a lack of resilience.
2. *Growth Mindset:* A growth mindset, on the other hand, believes that abilities, intelligence, and talents can be developed through dedication, hard work, and persistence. People with a growth mindset see challenges as opportunities for growth, learning, and improvement. This mindset fosters a love of learning, resilience, and a willingness to take risks.
_The Benefits of a Growth Mindset_
Cultivating a growth mindset can have a profound impact on your life. Some of the benefits include:
1. *Increased Resilience:* A growth mindset helps you bounce back from setbacks, failures, and adversity.
2. *Improved Self-Esteem:* By focusing on effort and progress, rather than natural ability, you can develop a more positive and realistic self-image.
3. *Enhanced Creativity:* A growth mindset encourages experimentation, exploration, and learning from failures, leading to increased creativity and innovation.
4. *Better Relationships:* By embracing challenges and viewing failures as opportunities for growth, you can build stronger, more resilient relationships with others.
_How to Cultivate a Growth Mindset_
Developing a growth mindset takes time, effort, and practice. Here are some strategies to help you cultivate a growth mindset:
1. *Embrace Challenges:* View challenges as opportunities for growth, learning, and improvement.
2. *Focus on Effort:* Emphasize the importance of effort, persistence, and hard work, rather than natural ability.
3. *Learn from Failures:* Treat failures as valuable learning experiences, and use them as opportunities for growth and improvement.
4. *Practice Self-Compassion:* Treat yourself with kindness, understanding, and patience, just as you would a close friend.
5. *Seek Feedback:* Encourage feedback from others, and use it as an opportunity to learn, grow, and improve.
Your mindset is the key to unlocking your full potential. By cultivating a growth mindset, you can develop the resilience, creativity, and confidence needed to achieve your goals and overcome obstacles. Remember, your mindset is not fixed; it can be developed and strengthened through practice, effort, and persistence.
#Mindset#positivity#creativity
-

@ 0598a50c:d765ddce
2024-12-09 18:34:52
#### PREAMBLE: I authored/posted the content that follows the "Year 1932..." graphic way back on May 16 2020 ... just a couple of months after opening my new account on the Thinkspot platform. Because I am about to shutter my Thinkspot account, I thought this Post was worthy of a "reprint". Read it, then judge for yourself if my early assessment of COVID19 was mostly "on the mark".

---------
# Preface
This Post conspiratorially investigates just some (out of the many) threads that comprise the confusing fabric that is the "Coronavirus".
*You can be sure this dire international incident is made up of many agendas. Some linked to the profit motive, some linked to Globalization, and others linked to power politics. Inevitably, one can also detect layers of incompetence and deceit.*
Behind the proverbial curtain sit sinister forces who ore looking to craft pubicly "acceptable" ways to administer mandatory vaccines, which are in turn linked to population reduction measures. (Such covert moves actually form part of the overall UN Agenda 2030).
My first few drafts of this post were composed in February 2020. Back then I actually stated that these high-stake maneuvers ... will likely usher-in ever increasing restrictions on your right to travel.
During the month of May 2020, we began to see travel restrictions being anticipated officially, as part of the "new normal" narrative then being touted by government officials. They were also seen being inserted into tentative legislative proposals.
## Some Thought Anchor Points:
**POINT-1:** It is not only a FREE Peoples' RIGHT, but their DUTY to have sufficient arms AND ammunition to maintain a status of independence from any who might attempt to abuse them, which would include their own government. [Annotation on the US 2nd AMENDMENT]
**POINT-2:** You will not gain an unfettered exit from this (or any future) Covid Lockdown by voting. So please get that naive and frankly infantile idea out of your head. Such delusions were once pillars that propped-up our assumptions from yesterday. The future already beckoning will require brand new thinking married to radically fresh political strategies.
# How Many BSL4 Labs In The USA?
Biosafety Level 4 (BSL-4) facilities build upon the containment requirements of BSL-3 and offer the highest level of biological safety.
There are a small number of BSL-4 labs in the United States, and dotted around the world. One of newest being China's Wuhan Facility ... constructed with French technical assistance!
The pathogens handled in a BSL-4 lab are often dangerous and exotic. They typically pose a high risk of aerosol-transmission. Infections caused by such pathogens are frequently fatal without prompt medical treatment or 'antidote vaccines'.
Two examples of microbes worked with in a BSL-4 laboratory include Ebola and Marburg viruses.
I am not in a position to corroborate the following statistics, but according to an answer uploaded to www.experts123.com there are currently four Biosafety Level 4 laboratories in the United States:
- Centers for Disease Control and Prevention (CDC) in Atlanta;
- United States Army Research Institute on Infectious Diseases (USAMRIID) in Frederick, Maryland -- known as Fort Detrick.
- Southwest Institute for Biomedical Research in San Antonio; ... and
- University of Georgia in Athens, which houses a smaller, "shoebox" facility.
**NOTE-01:** The construction of new Biosafety Level 4 laboratories around the continental United Sates was authorized during the "Baby-Bush" Administration.
**NOTE-02:** The new National Bio and Agro-Defense Facility (NBAF), at Kansas State University is to be operated by America's Department of Homeland Security ... and will be used to replace the controversial Plum Island facility, long situated off the eastern point of New York's Long Island.
**NOTE-03:** USAMRIID (Fort Detrick) is the only Level 4 laboratory currently under military protection.
**NOTE-04:** Some claim the total number of operational BSL4 laboratories on American soil is higher than four (4). But it should be understood that some BSL3 laboratories may be given a formal "waiver" to conduct work that is more typical of a BSL4 facility.
Global List of BSL-4 facilities can be read >> [here](https://ourworldindata.org/grapher/number-of-biosafety-level-4-facilities-by-country) | Naturally, you should assume that any facilities (indirectly) attached to the US military overseas -- such as secretive US run facilities in the former Soviet States of Georgia and the Ukraine -- will not be included in any publicly accessible list!
# Bioweapons Expert Dr Francis Boyle
Francis Boyle is a professor of international law at the University of Illinois College of Law. [his official Faculty page: click >> [here](https://law.illinois.edu/faculty-research/faculty-profiles/francis-boyle/)]
He drafted the U.S. domestic implementing legislation for the Biological Weapons Convention, known as the Biological Weapons Anti-Terrorism Act of 1989, which was approved unanimously by both Houses of the U.S. Congress, and signed into law by President George H.W. Bush.
Dr. Boyle's initial suspicion was that Chinese Biowarfare agents working at the Canadian lab in Winnipeg smuggled a vial containing a weaponized Coronavirus to Wuhan’s new laboratory -- China's first and only BSL4 facility: officially designated by the UN's World Health Organization -- from where it subsequently leaked (at least, according to increasing numbers of researchers).
Dr. Boyle states: "My guess is that they were researching SARS, and they weaponized it further by giving it "gain of function" properties, which means it could be more lethal."
>> Gain-of-function mutations -- also called "activating mutations" -- change the gene product such that its effect is made stronger (i.e., enhanced activation) or even is superseded by a different and abnormal function. In other words, gain-of-function is a gene-editing activity designed to make a gene more transmissible and/or more 'lethal'.
Read the full interview >> [here](https://greatgameindia.com/transcript-bioweapons-expert-dr-francis-boyle-on-coronavirus/)
-

@ a58a2663:87bb2918
2024-12-09 13:39:49
1. Concluir com minha filha, até o fim de 2025, a leitura da tradução latina de *Ursinho Pooh*, isto é, *Winnie Ille Pu*, de Alexander Lenard (1910-1972), poeta, ensaísta e tradutor húngaro que viveu no Brasil. Que texto curioso! Estranho estímulo que me chegou para voltar a estudar latim a sério.

2. Importar mais livros pela [Thrift Books](https://www.thriftbooks.com/) e menos pela Loja do Diabo. Seu acervo é excepcional e o frete é mais barato. Às vezes, em menos de duas semanas já estou com o livro em mãos (e olha que resido no Maranhão).
3. Concluir e publicar meu livro *Vida após as Universidades. Escrita & criação em velhos & novos contextos de risco*, desenvolvimento de algumas ideias que insinuei em [Contra a vida intelectual](https://www.kirion.com.br/contra-a-vida-intelectual-ou-iniciacao-a-cultura-p83480), no que diz respeito ao encerramento de um ciclo histórico de modos de fazer investigação erudita.
4. Rematar o terceiro e último módulo de [Convivium - Seminário Permanente de Humanidades](https://ronaldrobson.com/cursos/), **"A Alegoria do Mundo: o Mago, o Filólogo e o Colonizador"**, embrião de um longo ensaio sobre o "projeto humanista" e as vias de saída da modernidade oferecidas pelo pensamento latino-americano. (As inscrições seguem abertas. Caso queira inscrever-se pagando em bitcoin, me mande um e-mail: camoensiii57@protonmail.com).
5. Defender no primeiro semestre minha tese de doutoramento sobre **João Francisco Lisboa** (1812-1863), o maior prosador brasileiro de meados do século XIX. Compreender seu *Jornal de Tímon* implica rever concepções há muitos estabelecidas sobre a formação da literatura brasileira.
6. Escrever pelo menos cinco ensaios de apresentação do pensamento de **Vilém Flusser** e do que pretendo realizar em [FLUSSER_project](https://ronaldrobson.com/flusser_project/). A ideia é divulgá-los em inglês e especialmente aqui pelo Nostr.
7. Ler TUDO de [Ignacio Gómez de Liaño](https://docta.ucm.es/entities/publication/0fd9b6c9-2894-403f-b343-4318c1024ec7).
8. Não ceder à tentação de discutir com imbecil.
-

@ 7688bc83:04f45357
2024-12-09 11:40:42
TG88 là một nền tảng trực tuyến hiện đại, mang đến cho người dùng những trải nghiệm giải trí phong phú và đa dạng. Với giao diện thân thiện và dễ sử dụng, TG88 là sự lựa chọn lý tưởng cho những ai yêu thích các trò chơi mới mẻ và hoạt động thư giãn. Nền tảng này không chỉ cung cấp một không gian giải trí thú vị mà còn đảm bảo sự an toàn và bảo mật cho người tham gia.
**Đa Dạng Lựa Chọn Giải Trí**
Một trong những điểm mạnh của TG88 chính là sự đa dạng trong các lựa chọn giải trí. Từ các trò chơi sáng tạo, trí tuệ đến những hoạt động giải trí thư giãn, TG88 đáp ứng mọi nhu cầu của người dùng. Các trò chơi được thiết kế sinh động, dễ tiếp cận, đảm bảo mọi người đều có thể tham gia mà không gặp khó khăn. TG88 không ngừng cập nhật và giới thiệu những trò chơi mới, tạo ra một không gian giải trí luôn tươi mới và hấp dẫn. https://www-tg88.com
Đặc biệt, TG88 chú trọng đến việc tạo ra những trò chơi phù hợp với nhiều đối tượng người chơi. Dù bạn là người mới bắt đầu hay là người chơi kỳ cựu, TG88 luôn có các lựa chọn thích hợp để bạn khám phá và thưởng thức. Mỗi trò chơi tại TG88 đều được thiết kế với các tính năng thú vị, giúp người chơi có thể tận hưởng giây phút thư giãn hoặc thử thách bản thân một cách tối đa.
**An Toàn và Bảo Mật Tuyệt Đối**
Bảo mật là yếu tố cực kỳ quan trọng trong môi trường trực tuyến, và TG88 hiểu rõ điều này. Nền tảng này sử dụng công nghệ bảo mật tiên tiến để đảm bảo an toàn cho dữ liệu cá nhân và thông tin người dùng. Với hệ thống bảo mật chặt chẽ, người chơi có thể yên tâm khi tham gia vào các hoạt động giải trí mà không phải lo lắng về các vấn đề bảo mật.
Ngoài bảo mật, TG88 cũng cam kết tạo ra một môi trường giải trí công bằng và minh bạch. Mọi trò chơi tại đây đều được kiểm tra và giám sát để đảm bảo tính công bằng, mang đến cho người chơi sự tự tin khi tham gia.
**Tham Gia TG88 Ngay Hôm Nay!**
Với giao diện dễ sử dụng, bảo mật cao và vô số trò chơi hấp dẫn, TG88 là nền tảng lý tưởng cho những ai muốn trải nghiệm một không gian giải trí an toàn và thú vị. Tham gia ngay hôm nay để khám phá những giây phút giải trí tuyệt vời và tận hưởng một thế giới giải trí đa dạng tại TG88!
-

@ e356a30c:11e846f7
2024-12-09 11:26:51
Bitcoin, the world's first and most well-known cryptocurrency, has taken the financial world by storm. Its decentralized nature, secure transactions, and potential for high returns have attracted millions of investors. However, the volatile nature of the market and regulatory uncertainties have also raised concerns.
**The Pros of Bitcoin**
1. Decentralization: Bitcoin operates on a decentralized network, meaning no single entity controls it. This makes it resistant to censorship and manipulation.
2. Security: Bitcoin transactions are secured by blockchain technology, a robust system that records transactions in a transparent and immutable way.
3. Potential for High Returns: Bitcoin's price has experienced significant fluctuations, leading to substantial gains for early investors.
4. Global Accessibility: Bitcoin can be accessed by anyone with an internet connection, regardless of geographic location or financial status.
5. Privacy: Bitcoin transactions can be conducted pseudonymously, providing a level of privacy not offered by traditional financial systems.
**The Cons of Bitcoin**
1. Volatility: Bitcoin's price is highly volatile, making it a risky investment. Price fluctuations can be drastic, and investors may lose significant amounts of money.
2. Regulatory Uncertainty: The regulatory landscape for cryptocurrencies is still evolving, and governments around the world are taking different approaches. This uncertainty can create legal and tax complications for investors.
3. Energy Consumption: Bitcoin mining requires significant amounts of energy, raising concerns about its environmental impact.
4. Security Risks: While blockchain technology is secure, individuals can still be vulnerable to hacking and scams.
5. Limited Practical Use Cases: Bitcoin's primary use case remains as a speculative asset rather than a widely accepted means of payment.
Should You Invest in Bitcoin?
The decision to invest in Bitcoin is a personal one that should be carefully considered. It is essential to conduct thorough research and understand the risks involved. If you're considering investing, here are some tips:
1. Diversify Your Portfolio: Don't put all your eggs in one basket. Diversify your investments across various asset classes to mitigate risk.
2. Start Small: Begin with a small investment to test the waters and gain experience.
3. Long-Term Perspective: Bitcoin is a long-term investment. Don't get caught up in short-term price fluctuations.
4. Stay Informed: Keep up-to-date with the latest news and developments in the cryptocurrency market.
5. Consult a Financial Advisor: Seek advice from a qualified financial advisor to get personalized guidance.
Ultimately, the future of Bitcoin remains uncertain. While it has the potential to revolutionize the financial industry, it also faces significant challenges. As technology continues to evolve, it is likely that cryptocurrencies will play an increasingly important role in the global economy. However, investors should approach this emerging market with caution and a clear understanding of the risks involved.
Reference:
https://ssoemsisd.com/depomin82-an-overview-of-cryptocurrency-and-its-investment-potential/
-

@ 9bfc0ed5:17da5661
2024-12-09 08:53:02
Here are some recent football articles from 2024:
Erik ten Hag could join RB Leipzig
According to Sky Sports, Erik ten Hag could join forces with Jurgen Klopp at RB Leipzig, which could hurt Manchester United's chances of getting David Raum.
Mohamed Salah to sign a new deal at Liverpool
After months of negotiations, Mohamed Salah is close to signing a new two-year deal with Liverpool.
Manchester United considering Patrick Dorgu
Manchester United is considering signing Lecce full-back Patrick Dorgu, who is also a target for Chelsea and Tottenham.
Arsenal expected to resist January approaches for Jakub Kiwior
Arsenal is expected to resist January approaches for Jakub Kiwior, who is of interest across Europe.
Copa América 2024
Yahoo Sports reports that the Copa América 2024 mini-World Cup will be held in the U.S. The tournament is intended to appeal to both Latino fans and casual American viewers.
Kylian Mbappe
Kylian Mbappe's head collided with the shoulder of Austrian defender Kevin Danso during the Group D opener in Duesseldorf.
Slovakia vs Belgium
Slovakia beat Belgium 1-0 at Euro 2024.
England started off their Euro 2024 campaign with a victory against Serbia
England started their Euro 2024 campaign with a victory against Serbia on Sunday.
-

@ 319ad3e7:cc01d50a
2024-11-01 17:25:24
https://image.nostr.build/4824c65d9a07c577bee8591b18ee147e7a457849fbaee53244667ec062914751.jpg
**NOV 2024 | ISSUE 3** | LETTER FROM THE FOUNDER | FOOD ART | LIFE EXPERIENCE | FEATURED RECIPE | KIDS CORNER | MICROFICTION | FOOD NOTE QUOTES | SOUNDS | UPCOMING EVENTS | ECONOMICS | COMMUNITY PHOTO ALBUM | NEW RECIPES
__________________________________________________________________________________________________
## LETTER FROM THE FOUNDER 📝
---
Hello and welcome back to the cozy autumn days with Zap Cooking! I’m thrilled to bring you another issue of our monthly newsletter, a space where we share our favorite moments and celebrate our vibrant community. Sarah, who does an amazing job curating these updates, has crafted this edition to capture the essence of both real-life gatherings and our shared online experiences on Nostr.
In this issue, we’re excited to revisit highlights from Nostr Valley, where Zap Cooking was proud to sponsor and connect with friends in a truly special celebration. It was an incredible honor to see so many of you make the journey to join us for the first annual event—a milestone in Nostr’s history and a testament to the strength of our community.
As always, thank you for being a part of this journey. Your continued support, contributions, and readership mean everything to us. Here’s to more shared moments, connections, and, of course, great cooking!
Gratefully,
Seth
Founder, Zap Cooking
https://i.nostr.build/gwaOKZDlTM45Ht15.jpg
__________________________________________________________________________________________________
## FOOD ART 🎨
---
Zap.Cooking’s favorite food art of the month is the Banana Bread Costume from Bread and Toast! 😀
https://i.nostr.build/MgihZ6m2bQCv6krD.png
Visit Breadandtoast.Com For More! New Single Every Sunday!
__________________________________________________________________________________________________
## LIFE EXPERIENCE ✈️
---
#### Nostr Valley Adventures
https://image.nostr.build/7fd20dd7d9a4ce01657e0a9bed9d60cd6308325bf6cb69ec4f7ca63a6e3fb56e.jpg
The adventures of Nostr Valley began when I was invited to speak on a food panel alongside Seth, the founder of Zap.Cooking, at Happy Valley Brewing in State College Park, Pennsylvania.
Over the course of a month before the event, a fellow fun enthusiast known as The Beave organized a weekend filled with activities and accommodations, including a visit to a gun range and a stay at a charming three-bedroom countryside rental nestled among Pennsylvania's most scenic farm hills.
The Nostr Valley weekend had finally arrived, and I was set to drive six and a half hours to a small airport primarily used by skydivers and flying enthusiasts who park their personal planes in rented hangars. I was to meet a pilot who went by the name "Choke This." Despite the somewhat ominous name, my faith in the Nostr web of trust circles provided a sense of safety as I prepared to fly to Pennsylvania. Still, the thought of traveling alone to a remote area did cross my mind a few times. While it may not have been the wisest decision, I had faith in Nostr.
I began my journey at 1 am, getting ready and preparing my car before hitting the highway around 4 am. Driving on the empty roads was a pleasant experience, and I felt even better when I arrived at the well-kept airport on a beautiful sunny morning at 10:30 am, with not a single cloud in the sky. I knew it was a perfect day for skydiving, which alleviated one of the many flying-related nerves swirling in my head. Great weather? Check!
https://i.nostr.build/LXFm0A5hqmXgo9O0.jpg
After a brief introduction to the non-threatening pilot, we loaded our gear into the rear of the plane and settled in for takeoff, complete with those cool headphones. As we patiently waited for all the skydivers to land from their jumps, I received a crash course on plane safety in case of an emergency landing.
We made our way to the small runway, and with a gentle breeze, we were soaring into the blue skies. The view was absolutely breathtaking. Every time I fly, the scenery reminds me of the model city in the Beetlejuice movie.
For the next three hours, the pilot and I got to know each other. We shared our Nostr stories, backgrounds, and family lives. The pilot also gave an impressive presentation on the features of his aircraft, including a lesson on how to read knots—the unit of speed.
We landed in Maryland to pick up another panel speaker, Mr. Scott Churchill, who would be joining the art panel with Dan, the creator of the Nostr-only comic "Bread and Toast." Scott is a loving father with remarkable artistic skills that included drawing and music.
The three of us entered the airport restaurant and took a window seat overlooking the runway to grab a quick bite. This is where I was introduced to Maryland’s love for Old Bay seasoning. The pilot was eager to order crab cakes, and I was initially going to join him, but as soon as I spotted "CRAB SOUP" on the menu board, my food plans changed. Once we ordered, the food arrived fairly quickly. The kind server placed a bowl of soup in front of me, complete with extra crackers and an Old Bay salt shaker. My face lit up as I exclaimed, “What is this!?” Scott explained that Old Bay is a staple in these parts. I poured the seasoning into my soup and took a taste. “I’m going to do this at home,” I declared before even swallowing the first spoonful. I devoured the rest of the soup, sprinkling Old Bay each time I removed a layer of the flavorful creamy broth. I was hooked.
https://i.nostr.build/CWrwAxMADw18G8m5.jpg
https://i.nostr.build/QgRqUJy7EdVEVNQc.jpg
Once lunch was finished, we boarded the plane. I offered the front seat to Scott since it was his first time flying. He was a mix of emotions about the flight, but he did amazing and even got to fly the plane!
When we landed in State College Park, Pennsylvania, it felt as though we had become a family. There’s nothing quite like trusting strangers with your life for several hours in a flying machine to foster a sense of camaraderie.
We were off to meet our fourth companion—the organizer, the maestro, the one and only, THE BEAVE! He awaited us at the house, and upon our arrival, we felt an immediate sense of comfort.
The house was beautiful, the people were friendly, and it was time to invite other speakers and guests over for a magical steak dinner. Beave started the bonfire while the pilot fired up the grill. Guests began to arrive.
The steaks were so thick and stacked that I dubbed it "Steak Jenga." The guests gathered around the impressive pile of perfectly cooked meat, each grabbing a steak as large as their faces.
https://i.nostr.build/im2ud6A45E41bili.jpg
https://i.nostr.build/4cd8YSnIdz9X7fhz.jpg
https://i.nostr.build/duqyX2xwIjunUlFR.jpg
After dinner, I had the opportunity to taste one of the best-flavored vodkas I had ever encountered: Blake’s Limited Edition x Gypsy Spirits’ Apple Pie Vodka, a vodka infused with Apple Cider & Cinnamon.
https://i.nostr.build/YHt8Em9wSJNGPqGs.jpg
I called it an early night due to all the traveling and being awake since 1 am, especially since I would be speaking on my first panel the next day. I wanted to be fresh and alert for the event. As soon as my head touched the pillow, I fell into a deep sleep. When I woke early the next morning, I felt rested and ready to conquer the day.
Beave and I were the only ones awake, so we headed to the nearest country store to see what breakfast supplies they offered. Upon entering the store, we found a convenience section on the left and a sit-down breakfast and lunch area on the right. We made our way to the cold section, where we discovered local dairy farm milk in half-gallon glass containers for only $3! I had to grab a jug. There were also small bottles of flavored milk, including strawberry milk, for less than $1.50.
https://i.nostr.build/KtCMvKOsTYIozmA8.jpg
Beave and I picked up some eggs and butter, but the real treasure was the donuts. The lady behind the register was an excellent saleswoman, encouraging us to take home a container of these fluffy looking treats. I noticed Beave had already bought some right before I made my way to the register, so I thought, "Why not?" I grabbed a container of smaller individual donuts that would be perfect for sharing with the house.
Once we got to the car, we each took a bite of a donut and immediately began scarfing it down in ecstasy. It was moist, and the bakers hadn’t skimped on the glaze. There was no oily aftertaste—just rich, sweet goodness that I would absolutely recommend.
After returning to the house, we served breakfast and started getting dressed for Nostr Valley.
At this point, I was a bundle of nerves. As we arrived at Happy Valley Brewing, it was heartening to see so many familiar faces from Nostr. Avi Burra, author and host of Plebchain Radio, began hosting the event, introducing all the speakers and panels. Derek Ross, one of the organizers of Nostr Valley, opened the show with a "Nostr 101" speech. Then, the art panel, moderated by Seth—my “boss” from Zap.Cooking—featured Dan and Scott. Avi then demonstrated his Nostr medical application. The food crew, consisting of Seth and me, followed next, moderated by Boston Wine. Next Block made their rounds with Mandana and Ian. The Other Nostr Apps panel featured Derek, Vic, Boston Wine, and Avi. The infamous Open Mike spoke about music with Derek, and the event concluded with closing remarks from the two organizers.
https://i.nostr.build/aoplHjfLu6oJPGr1.png
(see the Community Photo Album for more pictures)
This was my first time speaking on a panel, and to say I was nervous would be an understatement. I practically clung to Seth the entire time and felt as though I blacked out while speaking. Nevertheless, I was proud to have made it through.
Afterward, a large group of us headed to the American Ale House, where we had a private section of the restaurant reserved. Avi and Derek’s shared dish was particularly notable—a nearly $90 certified angus beef tomahawk steak weighing in at 44 ounces.
https://i.nostr.build/Jk5ZJwd8VoBQQGTT.jpg
https://i.nostr.build/7ydShpbQasVMp3hT.webp
For the afterparty, we invited everyone to a bonfire and podcast session at our VRBO for mini podcast recordings. However, I ended up successfully talking for 45 minutes with the first attendee, and by then, everyone else grew tired of waiting. I was ready for bed after such a long day.
On Sunday morning, the sun streamed through my window as I woke up, and I realized it was shooting range day! Beave and I headed over to the country store for more donuts, but unfortunately, it was closed on Sundays. We took a drive to fill up the car with gas and grabbed a breakfast sandwich or two at the gas station. We gathered the rest of the group and made our way to PGC Scotia Shooting Range, where we spent six hours shooting a variety of guns outdoors.
https://i.nostr.build/D3v1y8MebC1lzaa8.jpg
When we returned, we were starving and enjoyed a pleasant pheasant dinner filled with lively conversation.
https://i.nostr.build/M98NWu0oXaVKADaT.jpg
https://i.nostr.build/hxp68wsP5Q4QUp4S.jpg
On Monday, we checked out of the VRBO. The day was cloudy, and the first part of the flight home was bumpy, but the sky cleared after we dropped off the other speaker. Once we landed back at the skydiving airport, I spent the rest of the evening driving home, finally walking in the door at 2 am.
My favorite part of the weekend wasn’t the speaking on stage or all the activities; it was the friendships I gained over those three days. I am truly grateful.
______________________________________________________________________________________________________
## FEATURED RECIPE 🥪
---
https://image.nostr.build/8ec8e09bc081e7f70de446fda8fc85d485c01ed4579b13f511753568b21f3c8b.jpg
---
https://image.nostr.build/ba98258b64d17c6ca0d6148494d8dd9127530aca0826f6fe78809bce9e3dca5a.png
nostr:naddr1qqmhvet8v9hz6cnvw4jj6am0dejx2u36943kzumgv4mj6cnpwdjkgttzd36k2ttrdpjk2um994kkzum5v4e8q6t9vdjsygxxndcac4j0ms6s4nwlly5lyhtjq2kpguxgwjyxpz7kmx8yy6a8vvpsgqqqw4rspyqve4
__________________________________________________________________________________________________
## KIDS CORNER 🐤
---
https://image.nostr.build/c93a2f500f419bc85f429c8ba01240be32e3923b1a60831ae396f1b867d8478c.png
https://image.nostr.build/16f51b2ab39178e25a27b2f32a5890e4eed43872b37dfa48ad121428ad58efbe.png
https://image.nostr.build/b8bbc636081442196ae6dad0eb8426ec34134990f930cf8443fd39884ff579e9.png
https://image.nostr.build/f8211c8170391e2d1e9e589445b4084d5d6997fd54cd5f9518427dfa72b015d6.png
__________________________________________________________________________________________________
## MICROFICTION 📖
---
#### TRICK OR TREAT? | Rustypuppy
“Remember, look into her orange eye, ask for a trick, and say ‘please.’” Janice fluffed the mane of my son’s lion costume and gave him a little push toward the dilapidated barn, decked out in creepy Halloween glory, complete with skeleton graveyard, tree ghosts, and a giant roof spider with glowing eyes.
Henry took two steps forward, then glanced back at me. I smiled and nodded. His brow furrowed, then he got in line with the other kids waiting for their turn at Granny Baba’s front door.
“You’re not traumatizing my five year old for life, are you?” I asked our babysitter.
The teen laughed. “He’s a brave little guy. I didn’t face her until I was seven. Relax, pops. Granny Baba is a rite of passage in this town. He’ll fit in better once he can say he got his trick. Besides, sometimes you gotta go through the scary to get to the good.”
After twelve minutes and eleven seconds, my son ran toward us, his face shining with joy. “I got the trick!” He showed off his jack o’ lantern candy bucket, which had contained the usual assortment of wrapped sugar and artificial ingredients, and now also held a clear plastic bag filled with lumpy darkness.
I side-eyed Janice as she took out the bag, opened it, and ate a handful. Henry did the same before I could stop him.
“This is …. good,” he said, frowning and chewing at the same time. “What’s the trick?”
“It’s healthy,” Janice replied. “All natural, sprouted granola.”
*RECIPE REFERENCE | Sprouted Bliss Granola - Essencial | Vegan | nostr:npub1c6dhrhzkflwr2zkdmlujnujawgp2c9rsep6gscyt6mvcusnt5a3srnzmx3
Follow Rustypuppy | https://rustypuppy.npub.pro/
__________________________________________________________________________________________________
## FOOD NOTE QUOTES 🗒️
---
https://image.nostr.build/471a56680b7a3bdc6c63fa5682579b071de5b9fb65988df8b3673c2e6a4c68eb.png
https://image.nostr.build/75ac9d6bc09e5fd0bdeec01010bf699905c11dbeff3fff5e4a3164a113812d9f.png
__________________________________________________________________________________________________
## SOUNDS 🔊
---
#### MUSIC
### HONEY | MARTIN GROOMS
https://wavlake.com/track/e4c1cf34-ada2-46ba-be1a-b9242479ca0a
| https://image.nostr.build/470907a92d1155aca310a980bacb0e178d9299b78a897d6db3d5189f39ff5a5b.png
#### PODCASTS
### TFTC
Courtney Swan breaks down how these harmful ingredients are fueling hyperactivity in children. |
https://video.nostr.build/49e4c0db7da37748ac04071cab1fdc668b55aa346e08bf8501d6071bd59ab6e6.mp4
These 10 Companies Control The World To POISON YOU! | Marty sat down with Courtney Swan to expose how 10 Companies Control The entire Worlds food supply, and how they're producing food that's poisoning you and your family. | To watch the full episode: https://www.youtube.com/watch?v=WSEiJ6C4MHk
### BENPOD
BenPod.com featuring Twitter Co-Founder, Rabble | NOSTR Breaks Every Social Media Paradigm (BWP58)
https://video.nostr.build/caaa77bb42bbfa2ddc04017ae45f68a95c162822edaa3084ffefeff4776ce0e0.mp4 | To watch the full episode: https://youtu.be/U-eNYRwyADI
### PLEBCHAIN RADIO
Fermenting a Revolution with Ben Justman | Plebchain Radio | QW & Avi discuss the road to plebhood, building Peony Lane Vineyards, running a Bitcoin business, Creed, Nostr and more with Ben Justman. | Peony Lane Vineyard : https://www.peonylanewine.com/ | https://fountain.fm/episode/YMpNVBI3WjDv1Uttl1vd
__________________________________________________________________________________________________
## UPCOMING EVENTS 🥳
---
*Submit your Nostr event with @ZapCooking on Nostr*
##### NOVEMBER 1
SoupBox Debut Listening Party| 7pm EST | ONLINE | zap.stream
##### NOVEMBER 6
The No-Conference Nostr Party at Bitcoin Park | Nashville, Tennessee | https://www.meetup.com/bitcoinpark/events/303283108
##### NOVEMBER 8-9
Brazil's Largest 100% Bitcoin Event | São Paulo | https://www.satsconf.com.br/
##### DECEMBER 15-19
Sats By SW | A V4V Weekend | Austin, Texas | https://media.primal.net/uploads/2/e0/e1/2e0e1258d63c4b758eeeb48cc0892eaf35a99f083d0a1cf7be03d1382fc6b8bd.jpg
##### JANUARY 30-31
Plan B Forum | El Salvador | https://image.nostr.build/86c3212b3677a0176f1a838ea006bfdf9cc43e778f5c406c641b553436917395.jpg
__________________________________________________________________________________________________
## ECONOMICS 🍞
---
#### SAUSAGES | Peter McCormack
"...Mistakes, even trivial ones, are amplified in seconds. Look at the recent Labour Party conference, where Keir Starmer’s speech was meant to lay out his grand vision for fixing the country. Instead, a simple slip of the tongue—calling for the release of “sausages,” instead of “hostages”—became the story. Within hours, memes flooded the internet, and his entire message was lost in the noise..."
https://image.nostr.build/05d035f16769c1cffda143bc6ee5c0a5b86b74bad4c49aa9f98cdc5618ccc526.png
Read more: https://www.petermccormack.com/p/sausages
______________________________________________________________________________________________________
## COMMUNITY PHOTO ALBUM 📷
---
*Community Photo Album by The Beave, Derek Ross, Seth, Scott, T$, JD, Vic, Adam Toad, The Bitcoin Babe, Open Mike, Silberengel, inyahé, Bread and Toast, Nostr Valley, Atlantic Bitcoin Conference, TABconf, CornyChat, NostrNests | Share your Nostr community photos or videos with @ZapCooking*
#### Nostr Valley
https://image.nostr.build/f743bdef24bca2d85eb78d182560e4d6fd8cba857d82252b1fbee23e97df4bbe.jpg
https://i.nostr.build/xTw4pPUDkuTIaFW8.jpg
https://i.nostr.build/O0wDQWEwDrrntToS.jpg
https://i.nostr.build/vYkyGtdl2c8bgkmU.jpg
https://i.nostr.build/uLqQ5a7Blza3n1d0.jpg
https://i.nostr.build/ALGdDpTdMTFXiIu2.jpg
https://i.nostr.build/NbUeiWCkDtYR4fF4.jpg
https://i.nostr.build/JSImWt5lUx4am1iz.jpg
https://i.nostr.build/CoS2Cc5j9Q6pSqBz.jpg
https://i.nostr.build/o30Ljw4lObtlQQfn.jpg
https://i.nostr.build/LRqTNfP9yFl3AgQl.jpg
https://i.nostr.build/qv5PkjTbSgX6vygZ.jpg
https://i.nostr.build/upPFNEEvXV9Jprez.jpg
https://i.nostr.build/sWkZyiawJRP1uPJ0.jpg
https://i.nostr.build/BWr1z0GE7BOlyZhH.jpg
https://i.nostr.build/TgWpmKFc7Nqpt2ED.jpg
https://i.nostr.build/MMX5LLABTCK4jZaY.jpg
https://i.nostr.build/LnbJZmTA09F76um9.jpg
https://i.nostr.build/hACVcv3cASvX9yZf.jpg
#### Atlanta Bitcoin Conference
https://i.nostr.build/Omk1YnOwYjhVShqO.jpg
https://image.nostr.build/e46c9169c4b96bf2f6052c3e49555f7c6656ac061fff9b808a9fba33d0661f61.jpg
https://image.nostr.build/fa282ad995e454cf899dac7a1720435fdc7921b2cf9693cffb9fc4cf23690907.jpg
#### TABConf
The critical innovations at @TABConf for a Saturday night. | Oatmeal-raisin, chocolate-chip, and vegan peanut butter cookies have been baked. Leaving for #meetup in Frankfurt with @Purple Konnektiv ❤️ | Silberengel https://image.nostr.build/f4a4d25220ec2b6797d09c68049639dedefc9d3414ad5587a48a6016ede46d81.jpg
The Peanut Butter Cookie recipe is available on Zap.Cooking!
nostr:npub1l5sga6xg72phsz5422ykujprejwud075ggrr3z2hwyrfgr7eylqstegx9z
_________________________________________________________________________________________________
## NEW RECIPES 🍲
---
Robin Holstein | Soups |
nostr:npub1rz7mvm42y0z3udug5s007sk0kgmcqs2ufa439edx8u2ptqhttews0tuhg4
Essencial | Vegan |
nostr:npub1c6dhrhzkflwr2zkdmlujnujawgp2c9rsep6gscyt6mvcusnt5a3srnzmx3
Lucas M | Pork Meatballs |
nostr:npub1whgjzsdrjxv5csrz2q032hpwxnjp4rpulxl0nexh62vz2dzc683qh8wqu9
Kat | Empanadas |
nostr:npub10us6l7kvn340s2mw4jhluj0jlpt3zthnqftk8xewy80d64lpj96qa7xew6
Chriso🇺🇸🇦🇺🦘⚡️ | Mexican Grilled Chicken |
nostr:npub147wy3decmxy3vs9u4nse80ha7nkcydt7zdge8lc9gk8ddglh4t6qudjwdr
MichZ | Orzo with Asparagus and Prosciutto |
nostr:npub1jdyaqyngdj4tgmmtlm7j7npkr3fwzjcumcwdqf68dc9wd5lf39rqwlfwsu
_________________________________________________________________________________________________
## FIN 🤠
---
https://image.nostr.build/497029805a46bbb4942bcb13a0e8f0238e3c7956282d4d2866ca342d19f54bad.jpg
-

@ 42342239:1d80db24
2024-10-29 19:27:12
The Swedish government recently rejected the Transport Administration's proposal for average speed cameras. The proposal would have meant constant surveillance of all vehicles, and critics argued for instance that it would have posed a threat to national security. Given the prevalence of IT breaches and data leaks today, it's hard not to give them a point, even if the problems are often downplayed by both corporations, governments and organisations. After Facebook (now Meta) leaked account information for over half a billion users, internal mails revealed the company wanted to "normalise the fact that this happens regularly".
IT security focuses on protecting the information in our computer systems and their connections. Cybersecurity is a broader concept that also includes aspects such as human behaviour, environmental factors, and management.
#### Data that has not been collected cannot leak
Knowledge about cybersecurity is often insufficient. For example, it was not long ago that the Swedish Transport Agency decided to outsource the operation of the Swedish vehicle and driving licence register. This was done despite deviations from various laws and criticism from the Security Police. The operation was placed in, among other places, Serbia (which has a close relationship with Russia). The Swedish driving licence register, including personal photos, as well as confidential information about critical infrastructure such as bridges, subways, roads, and ports, became available to personnel without Swedish security clearance.
The government's decision earlier this year not to proceed with a Swedish "super register" is an example of how cybersecurity can be strengthened. The rejection of the Transport Administration's proposal for average speed cameras is another. Data that has not been collected cannot leak out. It cannot be outsourced either.
#### Accounts are risky by definition
But the question is bigger than that. More and more of the products and services we depend on are now subscription services, often including long documents with terms and conditions. Which few people read. If you want to control your air heat pump with your phone, you not only need an app and an account, but also agree to someone storing your data (maybe also selling it or leaking it). The same applies if you want to be able to find your car in the car park. If you do not agree to the constantly updated terms, you lose important functionality.
Every time you are required to create an account, you are put in a dependent position. And our society becomes more fragile - because data is collected and can therefore leak out. It is much harder to lose something you do not have.
At the Korean car manufacturer Kia, huge security holes were recently discovered. IT researchers could quickly scan and control almost any car, including tracking its position, unlocking it, starting the ignition, and accessing cameras and personal information such as name, phone number, and home address. In some cases, even driving routes. All thanks to a "relatively simple flaw" in a web portal.
Instead of being at the mercy of large companies' IT departments, our security would improve if we could control our air heat pump, unlock our car, or our data ourselves. The technology already exists, thanks to the breakthrough of asymmetric encryption in the 1970s. Now we just need the will to change.
-

@ 9bfc0ed5:17da5661
2024-12-09 06:58:34
FIFA
The Best FIFA Football Awards 2024 nominees announced
Published
29 Nov 2024
Football fans from across the globe can now cast their votes in a host of categories, including The Best FIFA Men's 11 and The Best FIFA Women's 11.
FIFA
Voting is now open for the ninth edition of The Best FIFA Football Awards™
Fans can vote for The Best FIFA Men’s 11 and The Best FIFA Women’s 11 for first time
New FIFA Marta Award added to celebrate the best goal in women’s football
FIFA has announced the shortlist of nominees for The Best FIFA Football Awards™ 2024, which will recognise the leading lights in another thrilling year of women’s and men’s football at both club and national-team levels.
Voting is now open on FIFA.com across a number of award categories, with fans set to play a key role in choosing the winners. Voting for The Best FIFA Men’s Player, The Best FIFA Women’s Player, The Best FIFA Men’s Coach, The Best FIFA Women’s Coach, The Best FIFA Men’s Goalkeeper and The Best FIFA Women’s Goalkeeper will be equally weighted between fans, the current captains and coaches of all women’s/men’s national teams, and media representatives.
The winner of the FIFA Fan Award will be chosen entirely by fans, while the recipient of the FIFA Fair Play Award will be decided by an expert panel. Voting for the new FIFA Marta Award and the FIFA Puskás Award will be split equally between fans and a panel of FIFA Legends.
The biggest change in terms of voting for this year’s edition of The Best FIFA Football Awards is that fans will have their say in selecting The Best FIFA Men’s 11 and The Best FIFA Women’s 11. They will be able to choose from a list of 77 nominated players – 22 defenders, midfielders and forwards apiece, plus 11 goalkeepers – slotting them into one of several preset tactical formations to build their team. Votes will be weighted equally between fans and an expert panel.
The FIFA Puskás Award has been redefined as being bestowed on the scorer of the best goal in men’s football regardless of championship or nationality. To honour the best goal scored in women’s football in any league around the world, the FIFA Marta Award, named after the Brazilian legend, will be presented for the very first time.
Voting is open on FIFA.com until 23:59 CET on Tuesday, 10 December 2024. The rules of allocation for all awards are available at the FIFA Digital Hub.
-

@ e356a30c:11e846f7
2024-12-09 06:55:23
Unlike many groundbreaking technologies with a charismatic founder at the helm, Bitcoin stands out for its enigmatic origins. Satoshi Nakamoto, the pseudonymous individual or group behind Bitcoin's creation, remains a mystery. This deliberate anonymity has profound implications for the digital currency's decentralized nature and future.
The absence of a central authority figure ensures that Bitcoin's development and governance are community-driven. This decentralized approach fosters transparency, security, and resilience. Without a single point of failure, Bitcoin is less susceptible to manipulation, censorship, or systemic risks.
Furthermore, the anonymity of Satoshi Nakamoto prevents the concentration of power and influence. It eliminates the potential for personal biases, conflicts of interest, or arbitrary decision-making. Instead, Bitcoin's evolution is guided by a collective consensus mechanism, where network participants validate transactions and secure the blockchain.
While the identity of Satoshi Nakamoto may remain unknown, their innovative idea has sparked a global movement. Bitcoin has inspired countless projects and innovations in the blockchain space, demonstrating the power of decentralized technologies. By embracing decentralization, Bitcoin has paved the way for a more equitable and transparent financial system.
-

@ eac63075:b4988b48
2024-10-26 22:14:19
The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also [addressing her Bill No. 3,341/2024](https://www.camara.leg.br/proposicoesWeb/prop_mostrarintegra?codteor=2473615&filename=Avulso+PL+3341%2F2024&ref=eddieoz.com#:~:text=PROJETO%20DE%20LEI%20N%C2%BA%20....%20%2C%20DE%202024.&text=Congresso%20Nacional%20decreta%3A-,Art.,substitu%C3%ADda%20exclusivamente%20por%20moeda%20digital.), which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
[(PT-BR version here)](https://www.eddieoz.com/drex-e-o-fim-do-dinheiro-fisico-no-brasil/)
## **What is a CBDC?**
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their **programmability**. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
## **Practical Example: The Case of DREX During the Pandemic**
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, [the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence](https://youtu.be/cjUz2VEk4co?feature=shared&t=484&ref=eddieoz.com), limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
## **How Does China's Social Credit System Work?**
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, [including financial behavior, criminal record, social interactions, and even online activities](https://journals.sagepub.com/doi/full/10.1177/1461444819826402?ref=eddieoz.com). This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, [they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods](https://www.businessinsider.com/china-social-credit-system-punishments-and-rewards-explained-2018-4?ref=eddieoz.com), or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
## **DREX and Bill No. 3,341/2024**
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy ([Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG](https://www.camara.leg.br/proposicoesWeb/fichadetramitacao?idProposicao=2259342&fichaAmigavel=nao&ref=eddieoz.com)) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, [Julia drafted her bill, PL No. 3,341/2024](https://www.camara.leg.br/proposicoesWeb/prop_mostrarintegra?codteor=2473615&filename=Avulso+PL+3341%2F2024&ref=eddieoz.com#:~:text=PROJETO%20DE%20LEI%20N%C2%BA%20....%20%2C%20DE%202024.&text=Congresso%20Nacional%20decreta%3A-,Art.,substitu%C3%ADda%20exclusivamente%20por%20moeda%20digital.), which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
## **Risks and Individual Freedom**
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
## **The Relationship Between DREX and Pix**
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
## **International Precedents and Resistance to CBDC**
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
## **Bill No. 3,341/2024 and Popular Pressure**
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
## **What’s at Stake?**
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
## **A Call to Action**
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-

@ f680b95a:01ba70b7
2024-12-09 06:52:05
What is bitcoin like, and how to make profits from it?
What is bitcoin like, and how to make profits
From this article you will learn about, what is bitcoin like, its issuance, and who controls it, as well as about how one can make profits from trading bitcoin
What is bitcoin for?
Bitcoin price has increased by more than 16 times during 2017. Today, the cryptocurrency that doesn’t have physical substance, costs much more than precious metals and oil.
LiteFinance: What is bitcoin for?
BTCUSD: price increase of 16 times from 1.01.2017 to 14.12.2017
However, trading bitcoin involves high risk. If you are ready to take it, you should know, how cryptocurrency functions, as well as main principles of trading it. I will describe them in a simple way, without going into too much technical detail.
Bitcoin is a new generation of digital money, which is used on the Internet. There, everything can be bought for bitcoins, including any currency: euro, dollars and so on. Besides, more and more world large companies accept bitcoin as a payment means. Such giants as MicroSoft, Dell, Expedia are among them. More detailed information, where bitcoin is accepted, can be found on website Usebitcoins.info. The advantage of the cryptocurrency is that you can safely transfer and receive money with its help, using a pseudonym and avoiding banks. Cryptocurrencies are attractive for investing and trading, bitcoins can be traded on the exchange, or one can invest money in it.
How do bitcoins appear?
The main difference between bitcoin and conventional or digital money is no centralization or governmental regulation, that is cryptocurrency issuance is not controlled by any central bank. Coins are issued in digital form, because many computers all over the world operate and use special software to calculate mathematical algorithms. That means, bitcoins aren’t associated with any country. It should be noted, that cryptocurrency is not legal in all the countries, and its circulation isn’t controlled by the government.
The process of cryptocurrency obtaining is mining. A couple of years ago bitcoins could be mined with a personal computer, its power was enough. Now, not everyone can launch cryptocurrency mining software, special script. The matter is that the power of bitcoin network has significantly increased, and bitcoin mining speed increased as well. Now, to mine bitcoins, only special equipment, ASIC, is used. High-technology equipment for bitcoin mining is megawatt mining clusters, built on the base of power stations.
How to buy or sell with bitcoins?
LiteFinance: How to buy or sell with bitcoins?
To store, receive or transfer cryptocurrency, users and companies create special bitcoin wallets. For example, my friend John wants to buy bitcoins, so to store them, he sets up a digital wallet for keeping the cyber key, necessary for bitcoin transactions. There are several kinds of wallets: full client, lightweight client, and web-client. Each of them has its own advantages and drawbacks, which I won’t describe in detail in the article. Let’s return to John and the transaction description.
John wants to order a pizza to be delivered and pay in bitcoins. He sent to his favorite pizzeria his private key, in whose symbols the information about this transaction and public address of bitcoin wallet is encrypted. The information about the transaction is transmitted to all bitcoin network nodes with the application of special algorithms. In a short time, just five to ten minutes, the transaction is confirmed and joined to other transactions, creating a new block of data in blockchain register. Bitcoin network has processed the payment, and John is already waiting for his pizza, on the sofa and in front of the TV.
However, if John bought a plane ticket, having indicated his personal data, and then bought from the same wallet something, interesting for security services, he would be easily identified.
Remember, how you pay for something by your credit card. You don’t give the seller banknotes, but the transaction on the card is entered in the bank’s register, issued your card. The difference between bitcoin and conventional currency is that the transaction is registered not in the bank or a payment system, but in all computers, connected to bitcoin network. The registers are cryptographically secured, the data can’t be changed or faked. To record a transaction in the register, a special signature is used, which is calculated as a very complex computer task and is a kind of “wax seal” to secure the registers.
My friend John ordered a pizza in the USA, payed for the purchase in bitcoins, and a computer, located, for example, in China, calculated this cryptographic signature and received bitcoins as a reward. Thus, mining process started.
-

@ 75869cfa:76819987
2024-12-09 04:34:17
**GM, Nostriches!**
The Nostr Review is a biweekly newsletter focused on nostr statistics, protocol updates, exciting programs, the long-form content ecosystem, and key events happening in the Nostr-verse. If you’re interested, join me in covering updates from the Nostr ecosystem!
**Quick review:**
In the past two weeks, Nostr statistics show over 230,000 daily trusted pubkey events, a 3.5% decrease from the previous period. New user numbers have been a significant increase, Profiles with LN addresses or bios have marked a nearly 100-fold growth, Public writing events surpassed 2,000,000, reflecting an 800% increase. More than 14 million events have been published, with posts leading in volume, totaling about 2 million. Total Zap activity reached over 9.7 million, marking a significant 50% decrease.
Additionally, 18 pull requests were submitted to the Nostr protocol, with 9 merged. A total of 44 Nostr projects were tracked, with 12 releasing product updates, and over 434 long-form articles were published, 30% focusing on Bitcoin and Nostr. During this period, 4 notable events took place, and 4 significant events are upcoming.
**Nostr Statistics**
---
Based on user activity, the total daily trusted pubkeys writing events exceeded 230,000, representing a slight 3.5% decrease compared to the previous period (Nov 11-24). Daily activity peaked at 19519 events, with a low of approximately 16969.
In terms of new user numbers, there has been a significant increase. Profiles with LN addresses or bios have reached approximately 1,859,727, marking a nearly 100-fold growth compared to the previous two weeks. Public writing events surpassed 2,000,000, reflecting an 800% increase over the same period. The daily peak hit 304,317, exceeding the total for the previous two weeks combined.
Regarding event publishing, the total number of note events published has surpassed 14 million, marking a significant increase of approximately 27%. Posts continue to be the most dominant in volume, totaling about 2 million (a slight decrease of 5%). Reposts (353,266) and reactions (553,926) also saw a small decline, around 1%.
For zap activity, the total zap amount is approximately 9.7 million, showing a significant decrease of over 50% compared to the previous period.
In terms of relay usage, the top five relays by user count are: wss://bostr.bitcointxoko.com/,wss://feeds.nostr.band/,wss://realy.nostr.band/,wss://realys.diggoo.com/,wss://realy.lumina.rocks/
Data source: https://stats.nostr.band/
**NIPs**
---
[**NIP-0A - Contact List v2**]( https://github.com/nostr-protocol/nips/pull/1630)
nostr:npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c is proposing that NIP-0A - Contact List v2 can prevent contact list clobbering issues.This method could be used for any other event kinds that have editable lists. He is not arguing for a contact list v2 actually, rather, the focus is on conflict-free replicated data types, in order to prevent conflicts. CRDTs aren't really necessary in practice if people always use the person's outbox relays and don't use two clients at the same time. However, many conflicts were observed early on.Contact lists are already very long for some people, and while we could compress some of this data, not by a huge amount given the printable character set nature of JSON.
**[Consistent “method” naming for NIP 47(NWC) Response]( https://github.com/nostr-protocol/nips/pull/1629)**
[Gudnessuche]( https://github.com/Gudnessuche) is proposing that consistent “method” naming for NIP 47(NWC) Response adds consistency to the event structure in (NWC).Currently, requests and responses have different keys to identify their method type, which may cause confusion or misunderstandings.This change aims to standardize the key names across all request and response events, making it easier for developers to understand and implement the protocol.
**[NIP-34: Git Remote Nostr URL format and helper spec]( https://github.com/nostr-protocol/nips/pull/1624)**
[DanConwayDev]( https://github.com/DanConwayDev) is proposing that add the Git Remote Nostr URL format which can be used as a normal git clone address when ngit is installed. This used by ngit and gitworkshop.dev, minus the usage of nip05 addresses which nostr:npub1elta7cneng3w8p9y4dw633qzdjr4kyvaparuyuttyrx6e8xp7xnq32cume is working on adding. It is also partially supported experimental WOP tools like lez's git-remote blossom and Guga implementation of git-remote-nostr. Add a wider git remote helper spec implemented by the git plugin bundled with 'ngit'. This is probably less useful for inclusion in the NIP but he is not sure where else to put it.
**[NIP-42 Extension: auth-by-payment]( https://github.com/nostr-protocol/nips/pull/1609)**
nostr:npub1hw6amg8p24ne08c9gdq8hhpqx0t0pwanpae9z25crn7m9uy7yarse465gr is proposing that this Extension of NIP-42 allows relays to add an extra NUT-18 argument to AUTH messages, that gives the user the option to authorize by providing a cashu payment. This allows relay operators to monetize with pay-as-you-go connections without the need to keep track of subscriptions and/or whitelists.This would allow the user to use ephemeral pubkeys to sign this message as well, giving them more privacy.
**Notable Projects**
---
**[Amethyst v0.93.0]( https://yakihonne.com/notes/nevent1qgs24yz8xftq8kkdf7q5yzf4v7tn2ek78v0zp2y427mj3sa7f34ggjcqyru7y2xs27dsy4syfd220qph7phdlgrvyjrzcd526lszkh9200fsjhk5jn7)**
nostr:npub142gywvjkq0dv6nupggyn2euhx4nduwc7yz5f24ah9rpmunr2s39se3xrj0
**New Features:**
* New Android Image/Video Picker
* Adds support for pronouns on profile
* Migrates Video uploads from NIP-94 to NIP-71 Video events
* Migrates Picture uploads from NIP-94 to NIP-68 Picture events
* Adds support for BUD-01, BUD-02, and BUD-03
* Adds support for NIP-22 Comments
* Adds nip05 field to the hidden words filtering by nostr:npub1e2yuky03caw4ke3zy68lg0fz3r4gkt94hx4fjmlelacyljgyk79svn3eef
* Adds support for q tags with addresses
* Adds search.nos.today to bootstrapping relays for search
* Adds DM and Search default buttons to the relay screens
* Adds hidden words filter to search, hashtag and geotag feeds
* Applies hidden words even to hashtags that were not included in the content of the event.
* Adds support for saving reactions, zaps, translations user preferences on private outbox relays
**UI Improvements:**
* Adds animations to the zap, reaction and boost popups by @Giovanni
* Lighter chat bubbles
* Date separators on chats
* Adds unfollow to note dropdown
* Improves (Show More) presence to only when it actually makes a difference.
* Adds UI for when the location permission is rejected.
* Improves error message for the signup page when the display name is blank
* Adds extra padding for the zap setup screen
* Pre-process search to avoid showing and hiding posts after hidden words where processed by the UI.
* Rotate on full screen video if the device orientation is not locked by nostr:npub1a3tx8wcrt789skl6gg7rqwj4wey0j53eesr4z6asd4h4jwrd62jq0wkq4k
Additionally, this update addresses 18 bug fixes, introduces 13 code improvements, and enhances performance by optimizing thread preloading. Additionally, a new cache system for reply levels when viewing threads has been implemented for a smoother experience.
**[Damus1.11]( https://yakihonne.com/notes/nevent1qgsraldwhvwcjgltmxwfu7kw8dqef2692yhzheuurd7k3kfy8cxjdqgqypd9f0yxcsvdm07n3dcxz2e8xfuqrfumert0xuccutqj0xgmslhjsra564d)**
nostr:npub18m76awca3y37hkvuneavuw6pjj4525fw90necxmadrvjg0sdy6qsngq955
* Multi image uploads
* A video player that actually works
* Share sheet action
* Seamless scroll
* And more
**[Yakihonne]( https://yakihonne.com/notes/nevent1qgszpxr0hql8whvk6xyv5hya7yxwd4snur4hu4mg5rctz2ehekkzrvcqypqu6hhna8j0sfw6dc7qaj9jvume2cswc645z9q64vnj8j7mg07m2g4tnaa)**
nostr:npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q
**For Mobile:**
* All-in-One Content Hub: Create notes, articles, videos, curations, and smart widgets all in one place.
* New Media Servers: Added support for @nostr:npub18jnd0, Nostr check, and more.
* Thread Timeline Enhancements: Smoother and clearer thread viewing.
* Nip 44 Gift Messages: Now enabled by default.
* App-Wide Improvements: Faster, smoother, better.
* Full compatibility with NWC secrets created outside the Alby wallet is now possible.
* Provide an option to scan invoice QR and pay it.
* Bug Fixes: Notifications, wallets, and feeds are now more reliable.
**For Web**:
* Upgraded Note Editor: GIFs, emojis, and real-time previews to enhance your creativity.
* Enhanced Long-Form Content: A fresh design to make writing a joy.
* Custom Media Uploaders: Support for more media options and servers.
* Expanded Search: Find more notes, media, and users with ease.
* Browsing Suggestions: Discover new notes, media, users, and more.
* General Improvements: Smoother performance and optimizations.
* Bug Fixes: Making things more seamless for you.
Additionally, Hot fixes for the YakiHonne Web 4.1.2
**[0xchat 1.4.3]( https://yakihonne.com/notes/nevent1qqsgxlaky0w6nmrwdr4my8l7eskp90802jca4q99g8leuxay0kxqaaczyp0v559qftawle2kt8ahfqgtgfj5ugngcxkv5mjnsqdesckmwj5r5qcyqqqqqqgfzj09q)**
nostr:npub1tm99pgz2lth724jeld6gzz6zv48zy6xp4n9xu5uqrwvx9km54qaqkkxn72
* Fixed the issue where inbox/outbox relays could not be added.
* Fixed the issue where push notifications for voice calls had no sound.
* Fixed the lag issue when loading private chat videos.
* Fixed the issue where custom emoji reactions were not displayed.
**[Olas 0.1.5]( https://yakihonne.com/notes/nevent1qgs04xzt6ldm9qhs0ctw0t58kf4z57umjzmjg6jywu0seadwtqqc75sqyzr622fdnx32y07jtyw3hl0uyk3wacjr5eenpk77985gdghtk4ydcq4yfzw)**
nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft
Olas 0.1.5 for iOS has officially shipped to TestFlight
* Reposts
* Zaps (via Nostr Wallet Connect for now)
* Swipe-to-zap
* Performance improvements
**[Nos 1.0.3]( https://)**
nostr:npub1pu3vqm4vzqpxsnhuc684dp2qaq6z69sf65yte4p39spcucv5lzmqswtfch
Nos 1.0.3 is now on TestFlight for all our beta testers and waiting on Apple’s for review for our App Store users in Australia and New Zealand.
* Added support for user setting and displaying pronouns.
* Added display of website URLs for user profiles.
* Updated note header UI to make it more readable.
* Fixed galleries expanding past the width of the screen when there are lots of links or images.
* Fixed quoted note composer not expanding to fit mentions.
**[DEG Mods site update]( https://yakihonne.com/notes/nevent1qqszrcj7rslc879ct0tfg6wum0k42hzmjg56lee76qld802zqtlru9qzyr6t78a4h297sw0hp3enzue7xz0hszpzkvglv0spl8wg4wa59rud2qcyqqqqqqgeh60c9)**
nostr:npub17jl3ldd6305rnacvwvchx03snauqsg4nz8mruq0emj9thdpglr2sst825x
* Add a Repost tagging system.
* (Technical) Refactored code for the mods and mod page
* Design tweaks for the "view more" part of a Mod post's page
* Design tweaks for blog posts
* Games added:S.T.A.L.K.E.R. 2: Heart of Chornobyl
**[WasabiWallet 2.3.1]( https://yakihonne.com/notes/nevent1qqszc0xmmnytdrlyg5gr8q9yxlk6yyjn35xdad6u0xfzyede4aukyqszyzfm6rr08n96u3ec3vq6cm8qktqpxy2defxq34hzwyk5lac5qk3uxqcyqqqqqqglas93a)**
nostr:npub1jw7scmeuewhywwytqxkxec9jcqf3znw2fsyddcn3948lw9q950ps9y35fg
This version is a stability release packed with bug fixes and preparatory changes for upcoming features:
* Bug Fixes
* Settings Layout
* Tor upgraded to v13.5.9
* Buy Anything Button Disabled
**[KYCNOT.me]( https://yakihonne.com/article/naddr1qvzqqqr4gupzqwwv20y78a75nq9jr049a0y2twwd7lax2w2rpddgym5265n3dpjkqqsrgve5xc6rwvf4xq6kgv34v33njdm9v9jrwvejv5uxgve4xcenxese0gpjf)**
nostr:npub188x98j0r7l2fszeph6j7hj99h8xl07n989pskk5zd69d2fcksetq5mgcqf
**UI Improvements:**
* The service list view is now more visually engaging, it displays additional information in a more aesthetically pleasing manner. Both filtering and searching functionalities have been optimized for speed and user experience.
* Service pages have been also redesigned to highlight key information at the top, with the KYC Level box always accessible. The display of service attributes is now more visually intuitive.
* The new self-made Captcha is robust, addressing the reliability issues encountered with the previous version.
**Terms of Service Summarizer:**
* A significant upgrade is the Terms of Service summarizer/reviewer, now powered by AI (GPT-4-turbo). It efficiently condenses each service's ToS, extracting and presenting critical points, including any warnings.
* processing over 40 ToS pages via the OpenAI API using a self-crafted and thoroughly tested prompt.
Additionally, updates and upgrades have been implemented across Nostr Comments, Database, Scoring, Listings, API, and Pages.
**[notedeck]( https://yakihonne.com/article/naddr1qvzqqqr4gupzqnyk6a37ktlqryg00eezpd78and7rfcq2le5fw0hns527zqv8m3sqqpzutsknd2xt)**
nostr:npub1fjtdwclt9lspjy8huu3qklr7eklp5uq90u6yh8mec290pqxraccqlufnas
* Update user relay-list via polling
* Add user mute list sync via polling
* Skip muted content
* debug: add crate features which enable egui DebugOptions
* ci: fix linux packages
* Release v0.2.0 - Notedeck Alpha
* fix linux packages again
* ui: use proper response in wide-rendered note
* ui: fix quote repost hitbox
* ui: fix duplicate hitbox widget ids
* anim: smoothly animate delete button from 0 size
* nav: refactor title rendering for flexibility
* column: switch to simplified strings for column headers
* column: use simplified column string titles for now
* column: switch to profile pictures in header
* column: improve nav style
* column: only show delete button when not navigating
* column: reduce bounciness when navigating
**[Amber 3.0.1]( https://yakihonne.com/article/naddr1qvzqqqr4gupzpmhrj8hvx4g76gaevyp8mc34ts8jmzdf9wh5nrvmwjrrw7xsh97zqqgryctxvcmxvctzv5erwvm9v5mrg029ewh)**
nostr:npub1am3ermkr250dywukzqnaug64cred3x5jht6f3kdhfp3h0rgtjlpqecxrv7
* New design (still a work in progress)
* Removed the push notification server
* Open the permissions page with the correct account
* Fix crash when signing in with ncryptsec
* Fix icon size on notifications
* Fix relay connection when changing the default relays
* Option to setup a custom pin for the app
* Button to copy your public key
* Fix layout on Android < 15
* Fix multi event screen
* Fetch profile data
* Show relay message when event is rejected
* Fix profile icon size
* Don’t close app when using nostrconnect arcade
* Better check for valid relays
* Fix padding and scrolling
* Support for secret when using nostrconnect
* Fix empty relay notice,and more
**[Citrine 0.5.7]( https://yakihonne.com/article/naddr1qvzqqqr4gupzpwp7d7pfaxe7pulc3hphc2fflkf3fv4l0gaug0f9u63q8feuya6cqqgxzcnrxy6rwefevvckgeryxcerqph2d3j)**
nostr:npub1hqlxlq57nvlq70ugmsmu9y5lmyc5k2lh5w7y85j7dgsr5u7zwavq5agspw
* Fix rotation resetting the app state when downloading your notes
* Fix timeout when downloading your notes when you have a lot of notes
**Long-Form Content Eco**
---
In the past two weeks, more than 434 long-form articles have been published, including over 84 articles on Bitcoin and more than 43 related to Nostr, accounting for 30% of the total content.
These articles about Nostr thoroughly explore its transformative role in decentralized social networking, highlighting its potential to revolutionize communication, provide censorship-resistant platforms, and promote the free flow of information. They delve into Nostr's technical aspects, including the integration of Nostr SDK across platforms, building high-performance relay networks, and innovative uses in micropayments with ecash wallets. The articles also examine the dynamic growth of the Nostr ecosystem, covering key statistics, community expansion, and strategies driving global projects. In addition to reflecting on Nostr's current achievements, they envision its future potential in areas like content creation and data sharing, while addressing challenges related to scalability and privacy.
The Bitcoin articles discuss its transformative role in the global financial ecosystem, emphasizing its potential as a store of value, a decentralized currency, and a driver of economic freedom. They explore Bitcoin's historical evolution, technical innovations, and its impact on broader financial systems, including comparisons with CBDCs and other cryptocurrencies. The articles highlight key developments, such as Bitcoin hitting significant price milestones, its integration into everyday financial practices, and the challenges posed by regulatory and market dynamics. Additionally, they delve into topics like mining sustainability, self-custody, the importance of education, and the cultural and ideological implications of Bitcoin in fostering decentralized trust and financial inclusion.
Thankyou, nostr:npub1zafcms4xya5ap9zr7xxr0jlrtrattwlesytn2s42030lzu0dwlzqpd26k5, nostr:npub1nje4ghpkjsxe5thcd4gdt3agl2usxyxv3xxyx39ul3xgytl5009q87l02j, nostr:npub1cj6ndx5akfazux7f0vjl4fyx9k0ulf682p437fe03a9ndwqjm0tqj886t6, nostr:npub1gkgyk28lurjuhyfjlxsga9mw6lc0c47c8pmcr65usre9d3qjcx6q9cyk5m, nostr:npub1yaul8k059377u9lsu67de7y637w4jtgeuwcmh5n7788l6xnlnrgs3tvjmf, nostr:npub1n3rmk5g03eej40rg2x83azxnml879lxxynxegfawl36e6qqrs8gqllmkh7, nostr:npub19mf4jm44umnup4he4cdqrjk3us966qhdnc3zrlpjx93y4x95e3uq9qkfu2, nostr:npub1ljm9zuj2k4d0lsgnpl2vh0rwtls7yrptpxu9js0v7y9hfplncnksn38rxz, nostr:npub1nxy4qpqnld6kmpphjykvx2lqwvxmuxluddwjamm4nc29ds3elyzsm5avr7, nostr:npub1u8vk3aex0y8hk607zjy5636nkhzhm8g5l4v8qeveusxmkhvs7ajqgs8lr6, nostr:npub1xjwkhqsmd5qs0k4jrfu27x86j0g736xuklzdkpd5dnjd6y4j5kcs72w6e7, nostr:npub1wptqtktghpk3rvuerx54e9fjy0s57nvk5paggevh2t83ndpjgquq8zwcqe, nostr:npub1lgwcxfg2zlml6kse69md0h0kpvmdx9vrz37yx6qea5g4uly33qhqs3quhd, nostr:npub1dk8z5f8pkrn2746xuhfk347a0g6fsxh20wk492fh9h8lkha2efxqgeq55a,
and others, for your work. Enriching Nostr’s long-form content ecosystem is crucial.
**Nostriches Global Meet Ups**
---
Recently, several Nostr events have been hosted in different countries.
* **[BtrustGathering]( https://x.com/btrust_builders/status/1865056237756297542)** successfully took place in Kenya on December 4-5, 2024. This annual event brought the Btrust team together to collaborate and lay a solid foundation for the future of open-source Bitcoin development. Over two days, the team outlined their vision for 2025, discussed strategies for funding engineers and sustaining open-source projects, and shared updates on the Bitcoin Open Source Software (₿OSS) program to better support builders.
* **[The Nigeria Bitcoin Conference]( https://x.com/naijabitcoinorg/status/1861183120940118299)** was successfully held from December 5th to 7th, 2024, at PopHAUS in Lagos, Nigeria. The event brought together global and local participants from the Bitcoin industry, including exchange founders, developers, investors, policymakers, miners, artists, and more, for three days of in-depth discussions and learning. The conference featured a variety of activities, including keynote speeches, interactive discussions, educational workshops, and a three-day hackathon challenge focused on technical innovations in Bitcoin Core and the Lightning Network.
* **[The Bitcoin Africa Story Meetup]( https://x.com/story_bitcoin/status/1864633005488108015)** successfully took place on Saturday, December 7, 2024, in Lagos, Nigeria. The event offered an engaging platform to explore Bitcoin's role in Africa and foster discussions and interactions among participants.
nostr:npub17hkxr0chnut66nn28rwwqmv6sqazjy24t24zwv4ppfrlhwjhr9cs49h2la
* **[Btrust Developer Day]( https://x.com/btrustteam/status/1838630559184228490)** took place on Sunday, December 8, 2024, in Nairobi, Kenya, as part of the Africa Bitcoin Conference (ABC 2024). This event provided a platform for African developers to explore Bitcoin technology, learn from industry leaders, and collaborate on projects. It featured lightning talks, panel discussions, hands-on workshops, project showcases, and networking opportunities, making it a valuable experience for Bitcoin developers, open-source developers, technologists, and Bitcoin enthusiasts.
Here are the upcoming Nostr events in November that you might want to check out.
* **[The Africa Bitcoin Conference 2024]( https://afrobitcoin.org/speakers/)** will take place from December 9 to 11, 2024, in Nairobi, Kenya, featuring key programs such as Btrust Developer Day, TBD Hackathon, ABC Social Impact Award, Afro Bitcoin Fellowship, and Africa Bitcoin Day. The event will host nearly 70 distinguished speakers, including nostr:npub1ju2sw9unanr94p5wama3ydv90hcke34wcnmnxedummspaayz55qswlya32, nostr:npub16hssgmdhw9e9j6z8na45lzz4grdsfjqlp5hf8dtcqnp0glseeu3seecguf, nostr:npub1m7uxdt50d2jw35q79zlszlsvy79t7dpdxptz6rfsrsamra7l8ttsq752yl, nostr:npub1gaxapm9t9damh6q2lpc04ptcyeh0ysfdfzzs997agu3ae80ftrns7t985l, focusing on topics such as Bitcoin adoption, regulation, innovation, and security. This conference offers attendees valuable opportunities for in-depth discussions and knowledge sharing.
* **[The Dadas Bitcoin Workshop]( https://x.com/btc_dada/status/1864689798054904046)** will be held on Tuesday, December 10, 2024. This event is open to everyone and invites several changemakers who are driving innovation in the Bitcoin ecosystem, including nostr:npub1urhnkns9rt4c9mk6t9xctjkzmlkawxkdpzjnxdxhx82mqm7hfpuq0j7ue, nostr:npub1z5umqa38xfv94y3fpver2khw2qar2v54jetl24939j4f0yyhggdqrh5lwd, among others. The workshop will feature guest speakers sharing how Bitcoin has transformed their lives and careers. The event promises major surprises, along with gifts and rewards, and will foster vibrant discussions and connections that will have a lasting impact on participants.
* **[Bitcoin Layer 2's vs Bitcoin Sidechains]( https://x.com/BitcoinReach/status/1864341326717964475)** will take place on December 10, 2024, at 7 PM CAT, hosted by Rootstock on X Space. This online discussion, featuring guests such as nostr:npub1c8cp58lhn4vte3q2fejp7luqczx7u0njk5h0p0hry3atflk7g2hqc7xzqk and others, will delve into the differences between Bitcoin Layer 2 solutions and sidechains, highlighting their applications in smart contracts and DeFi.
* **[The 5th Bitcoin Educators Unconference]( https://x.com/MyfirstBitcoin_/status/1865056123780231547)** will be held on April 10, 2025, in Nashville, Tennessee. This event is specifically designed for educators, meetup organizers, community leaders, and grassroots experts, aiming to provide a platform for Bitcoin educators to collaborate and share insights. Participants will have the opportunity to exchange experiences, discuss best practices in Bitcoin education, and help drive the adoption and application of Bitcoin.
Additionally, We warmly invite event organizers who have held recent activities to reach out to us so we can work together to promote the prosperity and development of the Nostr ecosystem.
Thanks for reading! If there’s anything I missed, feel free to reach out and help improve the completeness and accuracy of my coverage.
-

@ 33baa074:3bb3a297
2024-12-09 03:26:18
[water leak sensor](https://www.renkeer.com/water-leak-detection/) are widely used outdoors, especially in places where water immersion and leakage need to be prevented. Here are some specific outdoor application cases:
Air conditioning water pan
Application scenario: The water pan of the air conditioning outdoor unit is prone to water accumulation, especially in rainy season or hot weather.
Function: The water immersion sensor can detect the water accumulation in the water pan. Once the water level exceeds the preset value, an alarm will be issued immediately to prevent equipment damage caused by water accumulation.
Quote: The air conditioning industry is another field where water immersion sensors are widely used. It can be used to detect the water immersion of the air conditioning outdoor unit and the water level changes of the air conditioning water tank, effectively preventing damage to air conditioning equipment caused by water immersion.
Pump room
Application scenario: The pump room is an important part of the industrial and municipal water supply system and is prone to water leakage.
Function: The water immersion sensor can monitor the water level changes in the pump room in real time. Once a water leak is found, an alarm will be issued immediately to ensure that timely measures are taken to avoid greater losses.
Quote: The water immersion sensor can efficiently replace manual inspections, monitor water leakage in all water source areas such as rainwater seepage and water pipes, and can monitor and warn of water leakage hazards in real time.
Roof
Application scenario: The roof is one of the most prone parts of a building to leakage, especially in the rainy season.
Function: The water immersion sensor can be installed in key parts of the roof, such as drains, skylights, etc., to monitor whether there is water leakage in real time, issue an alarm in time, and avoid indoor damage caused by roof leakage.
Quote: The sensor is an integral structure, the connecting wires and probes are placed outside, easy to install, and there are no internal adjustable parts. You only need to adjust the detection height of the probe. It is particularly suitable for installation in air-conditioning water pans, pump tanks, outdoor and roof places such as leakage or water detection alarm.
Urban water logging prevention
Application scenario: Urban roads and underground passages are prone to water logging in the rainy season, affecting traffic and pedestrian safety.
Function: The water immersion sensor can be installed in sections and underground passages prone to water logging, monitor water level changes in real time, and immediately issue an alarm once the water level exceeds the preset value to remind relevant departments to take measures.
Quote: It can be applied to common places prone to water logging such as homes (kitchens, bathrooms), machine rooms, pump rooms, warehouses, flower farming, farms, and urban water logging prevention.
Flower cultivation and farms
Application scenarios: Flower cultivation and farms need to maintain appropriate humidity, but too much moisture can cause damage to plants and animals.
Function: Water immersion sensors can monitor the water level of soil and pools to ensure that the moisture is within the appropriate range and avoid losses caused by over watering or leakage.
Quote: It can be applied to common places prone to water accumulation such as homes (kitchens, bathrooms), machine rooms, pump rooms, warehouses, flower cultivation, farms, and urban water logging prevention.
Underground pipelines
Application scenarios: Underground pipelines are an important part of urban infrastructure and are prone to water leakage.
Function: Water immersion sensors can be installed at key parts of pipelines, such as joints and elbows, to monitor water level changes in the pipeline in real time. Once a leak is found, an alarm will be issued immediately to ensure timely repair.
Quote: When the liquid level in the pipeline reaches the per-set threshold, the system will automatically issue an alarm, allowing staff to quickly handle it and avoid flooding the pipeline.
Water immersion sensors have a wide range of outdoor application scenarios, from air conditioning water pans, pump rooms, roofs to urban water-logging prevention, flower cultivation and underground pipelines, and can play an important role. These sensors not only improve the operational safety of facilities, but also reduce economic losses and safety hazards caused by flooding.
-

@ a012dc82:6458a70d
2024-12-09 02:50:56
**Table Of Content**
- The McGlone Prediction
- A Candid Chat with Scott Melker
- Economic Indicators
- The Housing Market
- Bitcoin vs. NASDAQ
- Bitcoin ETFs
- Conclusion
- FAQ
In the dynamic realm of cryptocurrency, predictions come and go, but few make waves like those from Bloomberg Intelligence's Mike McGlone. With a keen eye on the economic landscape, McGlone foresees a potential rise of Bitcoin to a staggering $100,000. However, this ascent isn't without its challenges. Dive into our detailed analysis to understand the economic hurdles and the factors that might propel Bitcoin to new heights.
**The McGlone Prediction**
Mike McGlone, the senior macro strategist at Bloomberg Intelligence, is no stranger to bold predictions. In the ever-evolving world of cryptocurrency, he's made a name for himself with his insightful forecasts. This time around, he's got his eyes set on a whopping $100,000 price tag for Bitcoin. But it's not all smooth sailing. McGlone acknowledges the economic challenges that lie ahead, and it's these very hurdles that might fuel Bitcoin's rise.
**A Candid Chat with Scott Melker**
In a recent head-to-head with crypto influencer Scott Melker, McGlone didn't hold back. He reiterated his unwavering belief in Bitcoin's long-term potential. But here's the twist: before we see Bitcoin basking in the glory of six figures, it might take a nosedive, potentially even below the $20,000 mark. It's a rollercoaster of emotions for crypto enthusiasts, but McGlone's track record suggests we should sit up and listen.
**Economic Indicators**
McGlone's predictions aren't just plucked from thin air. He's been meticulously analyzing the financial landscape. Those Treasury bills yielding over 5%? They've caught his attention. The Federal Reserve's monetary tightening antics? They're on his radar too. These indicators, among others, paint a picture of the economic challenges that could shape Bitcoin's trajectory.
**The Housing Market**
One can't discuss economic hurdles without mentioning the housing market. McGlone has been closely monitoring the Case-Shiller index, a tool that tracks US real estate prices. After reaching its zenith in June 2022, the index has been on a downward spiral, eerily reminiscent of the 2006 slump. This decline could be a harbinger of things to come, potentially influencing Bitcoin's path.
**Bitcoin vs. NASDAQ**
Drawing parallels between Bitcoin and the NASDAQ offers intriguing insights. Since its $30,000 peak in 2020, Bitcoin's price has remained stagnant. In stark contrast, the NASDAQ has flourished, registering a 20% growth. With powerhouse assets like AI technology under its belt, the NASDAQ's robust performance serves as a benchmark, highlighting Bitcoin's potential amidst economic challenges.
**Bitcoin ETFs**
The introduction of Bitcoin ETFs was met with much fanfare. However, the anticipated surge in Bitcoin's performance was a no-show. McGlone attributes this to an overly optimistic sentiment clouding pragmatic judgment. With the Federal Reserve reigning in the monetary supply, it's akin to pulling the rug from under Bitcoin's feet. Yet, in this challenging macroeconomic environment, McGlone sees a silver lining for Bitcoin's ascent.
**Conclusion**
McGlone's vision for Bitcoin is both optimistic and grounded. While the road to $100,000 is fraught with challenges, these very obstacles might be the catalyst for Bitcoin's meteoric rise. As the crypto world watches with bated breath, only time will reveal the accuracy of McGlone's predictions. One thing's for sure: the journey promises to be exhilarating.
**FAQ**
**Who is Mike McGlone?**
Mike McGlone is a senior macro strategist at Bloomberg Intelligence, known for his insightful cryptocurrency forecasts.
**What is McGlone's latest prediction for Bitcoin?**
McGlone predicts that Bitcoin could potentially rise to $100,000, albeit facing several economic challenges.
**Why is the housing market significant in this context?**
McGlone references the Case-Shiller index, which tracks US real estate prices, as an indicator of potential economic hurdles that could influence Bitcoin's trajectory.
**How does the NASDAQ's performance compare to Bitcoin's?**
While Bitcoin's price has stagnated since 2020, the NASDAQ has seen a 20% growth, serving as a comparative benchmark.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-

@ 42342239:1d80db24
2024-10-23 12:28:41
*TL;DR: The mathematics of trust says that news reporting will fall flat when the population becomes suspicious of the media. Which is now the case for growing subgroups in the U.S. as well as in Sweden.*
A recent wedding celebration for Sweden Democrats leader Jimmie Åkesson resulted in controversy, as one of the guests in attendance was reportedly linked to organized crime. Following this “wedding scandal”, a columnist noted that the party’s voters had not been significantly affected. Instead of a decrease in trust - which one might have expected - 10% of them stated that their confidence in the party had actually increased. “Over the years, the Sweden Democrats have surprisingly emerged unscathed from their numerous scandals,” she wrote. But is this really so surprising?
In mathematics, a probability is expressed as the likelihood of something occurring given one or more conditions. For example, one can express a probability as “the likelihood that a certain stock will rise in price, given that the company has presented a positive quarterly report.” In this case, the company’s quarterly report is the basis for the assessment. If we add more information, such as the company’s strong market position and a large order from an important customer, the probability increases further. The more information we have to go on, the more precise we can be in our assessment.
From this perspective, the Sweden Democrats’ “numerous scandals” should lead to a more negative assessment of the party. But this perspective omits something important.
A couple of years ago, the term “gaslighting” was chosen as the word of the year in the US. The term comes from a 1944 film of the same name and refers to a type of psychological manipulation, as applied to the lovely Ingrid Bergman. Today, the term is used in politics, for example, when a large group of people is misled to achieve political goals. The techniques used can be very effective but have a limitation. When the target becomes aware of what is happening, everything changes. Then the target becomes vigilant and views all new information with great suspicion.
The Sweden Democrats’ “numerous scandals” should lead to a more negative assessment of the party. But if SD voters to a greater extent than others believe that the source of the information is unreliable, for example, by omitting information or adding unnecessary information, the conclusion is different. The Swedish SOM survey shows that these voters have lower trust in journalists and also lower confidence in the objectivity of the news. Like a victim of gaslighting, they view negative reporting with suspicion. The arguments can no longer get through. A kind of immunity has developed.
In the US, trust in the media is at an all-time low. So when American media writes that “Trump speaks like Hitler, Stalin, and Mussolini,” that his idea of deporting illegal immigrants would cost hundreds of billions of dollars, or gets worked up over his soda consumption, the consequence is likely to be similar to here at home.
The mathematics of trust says that reporting will fall flat when the population becomes suspicious of the media. Or as the Swedish columnist put it: like water off a duck’s back.
*Cover image: Ingrid Bergman 1946. RKO Radio Pictures - eBay, Public Domain, Wikimedia Commons*
-

@ a012dc82:6458a70d
2024-12-08 13:32:10
**Table Of Content**
- The Rise of Bitcoin Mining
- Riot Platforms: The New Kid on the Block
- Local Residents Speak Out
- The Environmental Angle
- Economic Implications
- The Road Ahead: Solutions and Compromises
- Conclusion
- FAQ
Deep in the heart of Texas, a new challenge is brewing. The vast state, known for its oil rigs, cowboy culture, and iconic history, is now grappling with a modern dilemma. The world's largest Bitcoin mine has set up shop, and it's causing quite the commotion. As the digital gold rush intensifies, the Lone Star State finds itself at the crossroads of progress and preservation. Residents, policymakers, and industry leaders are all weighing in, making it a hot topic of discussion from Houston to Dallas.
**The Rise of Bitcoin Mining**
Bitcoin, the pioneering digital currency that's taken the world by storm, relies on a process called mining. This isn't about pickaxes and gold pans, but powerful computers solving complex algorithms. As the value of Bitcoin has soared, so has the race to mine it. Texas, with its cheap energy and vast landscapes, has become a hotspot. However, this boom brings its own set of challenges, from infrastructure strains to environmental concerns.
**Riot Platforms: The New Kid on the Block**
Enter Riot Platforms, the behemoth at the center of the storm. As the world's most significant Bitcoin mining operation, it's drawing power and attention in equal measure. While it promises prosperity and progress, it also poses questions. How much strain can the Texan grid take? And at what cost to the community? With its massive operations, Riot Platforms is both a beacon of opportunity and a potential point of contention.
**Local Residents Speak Out**
For the folks calling Texas home, this isn't just a tech debate. It's about their daily lives, their neighborhoods, and their futures. There are fears of power outages, skyrocketing electricity bills, and even potential environmental fallout. The heart of the matter? Balancing the promise of the future with the needs of the present. Town hall meetings, community forums, and local discussions are buzzing with opinions and concerns.
**The Environmental Angle**
Let's face it, Bitcoin mining isn't exactly green. The energy consumption is staggering, often compared to that of entire countries. With Texas' grid already dancing a delicate balance, the addition of massive mining operations is like adding fuel to the fire. The question on everyone's lips: Is there a sustainable way forward? Environmentalists and activists are pushing for greener solutions, making it a pivotal point in the debate.
**Economic Implications**
But it's not all storm clouds. The silver lining? Economic growth. Bitcoin mining is bringing jobs, investments, and a tech boom to regions that might have been left behind. For many, this is a golden opportunity, a chance to ride the wave of the future. But is it a future everyone wants? Economists and industry experts are analyzing the long-term implications, weighing the pros and cons of this digital revolution.
**The Road Ahead: Solutions and Compromises**
All is not lost. As the debate rages, innovators are seeking solutions. Think renewable energy sources, improved grid infrastructure, and even tweaks to the mining process itself. The goal? To find a middle ground where tech and tradition can coexist. Stakeholders are coming together, brainstorming ways to ensure that Texas remains both progressive and preserved.
**Conclusion**
The Bitcoin mining grid challenge is more than just a Texan issue; it's a global conversation about the future of energy, economy, and the environment. As Texas grapples with this modern gold rush, the world watches, waits, and wonders: What's the next move for the Lone Star State? With its rich history of innovation and resilience, many are optimistic that Texas will find a path forward that benefits all.
**FAQ**
**What is the main issue in Texas regarding Bitcoin mining?**
Texas is grappling with the challenges posed by the world's largest Bitcoin mine, Riot Platforms, which has raised concerns about energy consumption, grid strain, and environmental impact.
**Why is Bitcoin mining a concern for the environment?**
Bitcoin mining consumes vast amounts of energy, often compared to entire countries, leading to concerns about its carbon footprint and sustainability.
**How are local residents reacting to the Bitcoin mining operations?**
Many Texans are concerned about potential power outages, increased electricity bills, and the broader community impact of such large-scale mining operations.
**Are there any economic benefits to Bitcoin mining in Texas?**
Yes, Bitcoin mining has brought jobs, investments, and technological advancements to the state, offering economic growth opportunities.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-

@ e356a30c:11e846f7
2024-12-08 13:10:51
Bitcoin's recent surge to record highs has sent shockwaves through the cryptocurrency market, sparking renewed interest and debate about the future of digital currencies. As Bitcoin's value climbs, it casts a long shadow over the broader crypto landscape, influencing the performance of other cryptocurrencies and attracting new investors to the space.
Bitcoin's price surge can be attributed to several factors, including increased institutional adoption, favorable regulatory developments, and growing global economic uncertainty. As more traditional financial institutions and corporations recognize Bitcoin's potential as a store of value and a hedge against inflation, they are allocating a portion of their portfolios to Bitcoin, driving up demand and prices.
Additionally, recent regulatory moves in some jurisdictions have created a more favorable environment for cryptocurrencies, boosting investor confidence and attracting new capital to the market.
The impact of Bitcoin's price surge on other cryptocurrencies is multifaceted. On the one hand, it can lead to a broader "crypto winter," where investors flock to Bitcoin, leaving other cryptocurrencies struggling to gain traction. This can be particularly detrimental to smaller, less established cryptocurrencies that rely on market sentiment and investor interest to maintain their value. On the other hand, Bitcoin's success can also serve as a catalyst for broader crypto adoption, as investors become more familiar with the concept of digital currencies and the potential benefits they offer. This could lead to increased interest in other cryptocurrencies, particularly those with innovative technologies or unique use cases.
The surge in Bitcoin's value has also attracted a new wave of investors to the cryptocurrency market, including retail investors and institutional investors. This influx of new capital can provide a much-needed boost to the crypto market, driving innovation and development within the industry. However, it also raises concerns about market volatility and the potential for speculative bubbles. As more investors enter the market, it is crucial to maintain a level of caution and to avoid making investment decisions based on hype or fear.
In conclusion, Bitcoin's recent price surge has had a significant impact on the cryptocurrency market, both positively and negatively. While it has attracted new investors and boosted market sentiment, it has also led to increased volatility and potential risks for investors. As the crypto market continues to evolve, it is essential to stay informed about the latest developments and to make informed investment decisions based on sound analysis and risk management principles.
#bitcoin
-

@ 42342239:1d80db24
2024-10-22 07:57:17
It was recently reported that Sweden's Minister for Culture, Parisa Liljestrand, wishes to put an end to anonymous accounts on social media. The issue has been at the forefront following revelations of political parties using pseudonymous accounts on social media platforms earlier this year.
The importance of the internet is also well-known. As early as 2015, Roberta Alenius, who was then the press secretary for Fredrik Reinfeldt (Moderate Party), openly spoke about her experiences with the Social Democrats' and Moderates' internet activists: Twitter actually set the agenda for journalism at the time.
The Minister for Culture now claims, amongst other things, that anonymous accounts pose a threat to democracy, that they deceive people, and that they can be used to mislead, etc. It is indeed easy to find arguments against anonymity; perhaps the most common one is the 'nothing to hide, nothing to fear' argument.
One of the many problems with this argument is that it assumes that abuse of power never occurs. History has much to teach us here. Sometimes, authorities can act in an arbitrary, discriminatory, or even oppressive manner, at least in hindsight. Take, for instance, the struggles of the homosexual community, the courageous dissidents who defied communist regimes, or the women who fought for their right to vote in the suffragette movement.
It was difficult for homosexuals to be open about their sexuality in Sweden in the 1970s. Many risked losing their jobs, being ostracised, or harassed. Anonymity was therefore a necessity for many. Homosexuality was actually classified as a mental illness in Sweden until 1979.
A couple of decades earlier, dissidents in communist regimes in Europe used pseudonyms when publishing samizdat magazines. The Czech author and dissident Václav Havel, who later became the President of the Czech Republic, used a pseudonym when publishing his texts. The same was true for the Russian author and literary prize winner Alexander Solzhenitsyn. Indeed, in Central and Eastern Europe, anonymity was of the utmost importance.
One hundred years ago, women all over the world fought for the right to vote and to be treated as equals. Many were open in their struggle, but for others, anonymity was a necessity as they risked being socially ostracised, losing their jobs, or even being arrested.
Full transparency is not always possible or desirable. Anonymity can promote creativity and innovation as it gives people the opportunity to experiment and try out new ideas without fear of being judged or criticised. This applies not only to individuals but also to our society, in terms of ideas, laws, norms, and culture.
It is also a strange paradox that those who wish to limit freedom of speech and abolish anonymity simultaneously claim to be concerned about the possible return of fascism. The solutions they advocate are, in fact, precisely what would make it easier for a tyrannical regime to maintain its power. To advocate for the abolition of anonymity, one must also be of the (absurd) opinion that the development of history has now reached its definitive end.
-

@ 123711f7:c0a0c17e
2024-12-08 07:44:04
Donald Trump told supporters Monday he is “not a Nazi,” using a rally in the final week of a bitter White House race to refute accusations of authoritarianism, including from a former top aide who branded him a fascist.
*
As he and rival Kamala Harris, the current vice president, entered the final stretch of one of the closest US elections in modern times, each candidate and their teams have ramped up the political rhetoric, inflaming an already tense campaign.
Democrat Harris, who has accused Trump of stoking divisions, crisscrossed Michigan on Monday while the Republican visited Georgia, another of the decisive swing states, where he said critics are accusing him of being a modern-day “Hitler.”
“The newest line from Kamala and her campaign is that everyone who isn’t voting for her is a Nazi,” Trump told a boisterous rally in Atlanta.
-

@ eac63075:b4988b48
2024-10-21 08:11:11
Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
### **Sections:**
- **Introduction**
- **What Is Chat Control?**
- **Why Is the EU Pushing for Chat Control?**
- **The Privacy Concerns and Risks**
- **The Technical Debate: Encryption and Backdoors**
- **Global Reactions and the Debate in Europe**
- **Possible Consequences for Messaging Services**
- **What Happens Next? The Future of Chat Control**
- **Conclusion**
---
### **What Is Chat Control?**
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
#### **Origins of the Proposal**
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
#### **How Messaging Services Work**
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
<img src="https://blossom.primal.net/31ace3b729fb9f6b4de286686f31a71db6dd7e3a363f868e1255a6f287eb0b94.png">
#### **Key Elements of Chat Control**
- **Automated Content Scanning**: Service providers would use algorithms to scan messages for illegal content.
- **Circumvention of Encryption**: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- **Mandatory Reporting**: If illegal content is detected, providers would be required to report it to authorities.
- **Broad Applicability**: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
#### **Why It Matters**
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
---
### **Why Is the EU Pushing for Chat Control?**
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
#### **Protecting Children and Preventing Crime**
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
#### **Legal Context and Legislative Drivers**
The push for Chat Control is rooted in several legislative initiatives:
- **ePrivacy Directive**: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
- **Temporary Derogation**: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
- **Regulation Proposals**: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
#### **Balancing Security and Privacy**
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
- **Targeted Scanning**: Focusing on specific threats rather than broad, indiscriminate monitoring.
- **Judicial Oversight**: Requiring court orders or oversight for accessing private communications.
- **Data Protection Safeguards**: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
<img src="https://blossom.primal.net/9533aedc9f83564d53633eac1a6d431d1e311028a478dd4b7f3a59b2c449e95a.png">
#### **The Urgency Behind the Push**
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
#### **Criticism and Controversy**
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
---
### **The Privacy Concerns and Risks**
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
#### **Infringement on Privacy Rights**
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
#### **Erosion of End-to-End Encryption**
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
#### **Concerns from Privacy Advocates**
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- **Security Risks**: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- **Global Implications**: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- **Ineffectiveness Against Crime**: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
<img src="https://blossom.primal.net/51722887ebf55c827cc20bcfade3ea9b3628265b7fa3547504b2fff45f34f175.png">
#### **Potential for Government Overreach**
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
#### **Real-World Implications for Users**
- **False Positives**: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- **Chilling Effect**: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- **Data Misuse**: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
#### **Legal and Ethical Concerns**
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- **Violation of Fundamental Rights**: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- **Questionable Effectiveness**: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
#### **Opposition from Member States and Organizations**
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
---
### **The Technical Debate: Encryption and Backdoors**
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
#### **What Is End-to-End Encryption (E2EE)?**
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- **Security Assurance**: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- **Widespread Use**: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
#### **How Chat Control Affects Encryption**
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- **Introduce Backdoors**: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- **Client-Side Scanning**: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
#### **The Risks of Weakening Encryption**
**1. Compromised Security for All Users**
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- **Exploitable Gaps**: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- **Universal Impact**: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
**2. Undermining Trust in Digital Services**
- **User Confidence**: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- **Business Implications**: Companies relying on secure communications might face increased risks, affecting economic activities.
**3. Ineffectiveness Against Skilled Adversaries**
- **Alternative Methods**: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- **False Sense of Security**: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
#### **Signal’s Response and Stance**
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- **Refusal to Weaken Encryption**: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- **Advocacy for Privacy**: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
#### **Understanding Backdoors**
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- **Security Vulnerabilities**: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- **Ethical Concerns**: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
<img src="https://blossom.primal.net/67f45fd79ccdb7e2e2ecdc56297207dc0d1d073acb216857b6165b3bf9906997.png">
#### **The Slippery Slope Argument**
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- **Expanded Surveillance**: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- **Erosion of Rights**: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
#### **Potential Technological Alternatives**
Some suggest that it's possible to fight illegal content without undermining encryption:
- **Metadata Analysis**: Focusing on patterns of communication rather than content.
- **Enhanced Reporting Mechanisms**: Encouraging users to report illegal content voluntarily.
- **Investing in Law Enforcement Capabilities**: Strengthening traditional investigative methods without compromising digital security.
####
The technical community largely agrees that weakening encryption is not the solution:
- **Consensus on Security**: Strong encryption is essential for the safety and privacy of all internet users.
- **Call for Dialogue**: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
---
### **Global Reactions and the Debate in Europe**
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
#### **Support for Chat Control**
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- **Enhanced Security**: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- **Responsibility of Service Providers**: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- **Public Safety Priorities**: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
#### **Opposition within the EU**
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
**Germany**
- **Stance**: Germany has been one of the most vocal opponents of the proposed measures.
- **Reasons**:
- **Constitutional Concerns**: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- **Security Risks**: Weakening encryption is seen as a threat to cybersecurity.
- **Legal Challenges**: Potential conflicts with national laws protecting personal data and communication secrecy.
**Netherlands**
- **Recent Developments**: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- **Arguments**:
- **Effectiveness Doubts**: Skepticism about the actual effectiveness of the measures in combating crime.
- **Negative Impact on Privacy**: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
#### **Privacy Advocacy Groups**
**European Digital Rights (EDRi)**
- **Role**: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- **Position**:
- **Strong Opposition**: EDRi argues that Chat Control is incompatible with fundamental rights.
- **Awareness Campaigns**: Engaging in public campaigns to inform citizens about the potential risks.
- **Policy Engagement**: Lobbying policymakers to consider alternative approaches that respect privacy.
**Politicians and Activists**
**Patrick Breyer**
- **Background**: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- **Actions**:
- **Advocacy**: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- **Public Outreach**: Using social media and public events to raise awareness.
- **Legal Expertise**: Highlighting the legal inconsistencies and potential violations of EU law.
#### **Global Reactions**
**International Organizations**
- **Human Rights Watch and Amnesty International**: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
**Technology Companies**
- **Global Tech Firms**: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- **Industry Associations**: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
<img src="https://blossom.primal.net/e761aa2dd240a1a2e7d943565ccbda427b5a8054bf4e6e17c946711ab6370d5d.png">
#### **The Broader Debate**
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- **Legal Precedents**: How the EU's decision might influence laws and regulations in other countries.
- **Digital Sovereignty**: The desire of nations to control digital spaces within their borders.
- **Civil Liberties**: The importance of protecting freedoms in the face of technological advancements.
#### **Public Opinion**
- **Diverse Views**: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- **Awareness Levels**: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
####
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
---
### **Possible Consequences for Messaging Services**
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
#### **Impact on Encrypted Messaging Services**
**Signal and Similar Platforms**
- **Compliance Challenges**: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
- **Operational Decisions**: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
#### **Potential Blocking or Limiting of Services**
- **Regulatory Enforcement**: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
- **Access Restrictions**: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
#### **Effects on Smaller Providers**
- **Resource Constraints**: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
- **Innovation Stifling**: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
<img src="https://blossom.primal.net/60a9cad69b45cc3ded1d1759312e49a57b3aa997db62e36016f40642943be5e9.png">
#### **User Experience and Trust**
- **Privacy Concerns**: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
- **Migration to Unregulated Platforms**: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
#### **Technical and Security Implications**
- **Increased Vulnerabilities**: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
- **Global Security Risks**: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
#### **Impact on Businesses and Professional Communications**
- **Confidentiality Issues**: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
- **Compliance Complexity**: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
#### **Economic Consequences**
- **Market Fragmentation**: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
- **Loss of Revenue**: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
#### **Responses from Service Providers**
- **Legal Challenges**: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
- **Policy Advocacy**: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
#### **Possible Adaptations**
- **Technological Innovation**: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
- **Transparency Measures**: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
####
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
---
### **What Happens Next? The Future of Chat Control**
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
#### **Current Status of Legislation**
- **Ongoing Negotiations**: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
- **Timeline**: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
#### **Key Influencing Factors**
**1. Legal Challenges and Compliance with EU Law**
- **Fundamental Rights Assessment**: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
- **Court Scrutiny**: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
**2. Technological Feasibility**
- **Development of Privacy-Preserving Technologies**: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
- **Implementation Challenges**: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
**3. Political Dynamics**
- **Member State Positions**: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
- **Public Opinion and Advocacy**: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
**4. Industry Responses**
- **Negotiations with Service Providers**: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
- **Potential for Self-Regulation**: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
#### **Possible Scenarios**
**Optimistic Outcome:**
- **Balanced Regulation**: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
**Pessimistic Outcome:**
- **Adoption of Strict Measures**: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
**Middle Ground:**
- **Incremental Implementation**: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
#### **How to Stay Informed and Protect Your Privacy**
- **Follow Reputable Sources**: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
- **Engage in the Dialogue**: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
- **Utilize Secure Practices**: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
<img src="https://blossom.primal.net/1e2c0cd70d88629c54ac84f928ab107f08f698d2c7f0df511277fb44c1480f0a.png">
#### **The Global Perspective**
- **International Implications**: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
- **Collaboration Opportunities**: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
#### **Looking Ahead**
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
---
### **Conclusion**
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- **Erosion of Trust**: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- **Security Vulnerabilities**: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- **Stifling Innovation**: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- **Global Implications**: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
<img src="https://blossom.primal.net/d3f07d8bc7a49ac291f14eb449879462c76ae407abbe728ddc6f93e11fabe11d.png">
---
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
## Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-

@ 5fb7f8f7:d7d76024
2024-12-08 07:24:17
If you’ve spent any time in Web3 spaces whether on Twitter, Discord, or at live events you’ve probably noticed a curious phenomenon: everyone greets each other with “GM.” This simple, two letter abbreviation for “Good Morning” has transcended its original purpose to become a cultural cornerstone of the Web3 community. But why has GM become the go-to greeting, and what does it signify in this context? Let’s explore.
**A Culture Rooted in Optimism**
At its core, Web3 represents a collective vision of a decentralized future. It’s a space where builders, creators, and innovators come together to reimagine systems, challenge traditional structures, and create new opportunities. In this environment, “GM” isn’t just a way to say hello it’s an expression of shared optimism and camaraderie.
Saying “GM” signals that you’re showing up with positivity and an open mind, ready to engage and contribute to the community’s goals. Whether it’s morning, afternoon, or night, “GM” conveys the same sentiment: a fresh start and the promise of collaboration.
**Simplicity in a Complex World**
Web3 can be intimidating to newcomers. From blockchain mechanics to DeFi protocols, the space is rife with technical jargon and steep learning curves. Amid this complexity, “GM” offers a refreshing simplicity. It’s a universal entry point easy to understand, inclusive, and non-intimidating.
Unlike lengthy introductions or formal greetings, “GM” levels the playing field. Whether you’re a seasoned developer, an NFT artist, or someone just starting to explore the metaverse, “GM” sets a tone of equality and openness.
**Memes and Virality**
In Web3, memes aren’t just jokes; they’re a powerful cultural currency. Memes distill complex ideas into digestible, shareable snippets that foster a sense of belonging.
The “GM” meme exploded in popularity because it’s simple, visual, and infinitely remixable. You’ll find countless variations of “GM” memes featuring everything from pixel art to animated GIFs. Each iteration reinforces the community’s shared identity while making “GM” feel like an inside joke everyone is in on.
**A Signal of Presence**
Web3 thrives on constant interaction. Whether it’s in Discord channels or Twitter threads, showing up matters. Typing “GM” is a lightweight way to announce your presence, letting others know you’re engaged and part of the conversation.
In asynchronous and remote first communities, small rituals like “GM” help maintain a sense of connection across time zones and geographies. It’s a reminder that even though we’re scattered across the globe, we’re all working toward a shared vision.
**The Philosophy Behind GM**
On a deeper level, “GM” embodies Web3’s ethos of abundance and possibility. It’s a rejection of cynicism and a celebration of the idea that every day and every interaction offers a new opportunity to build something meaningful.
In a world often divided by gatekeeping and competition, “GM” is radically inclusive. It’s a small but powerful act of saying, “You belong here. Let’s make something great together.”
The ubiquity of “GM” in Web3 gatherings isn’t just a trend; it’s a reflection of the community’s values. It’s a shorthand for optimism, inclusivity, and the belief that we’re all in this together. Whether you’re a die hard crypto enthusiast or a curious newcomer, adopting “GM” is a way to signal your alignment with these principles.
So, the next time you join a Web3 conversation, try starting with a simple “GM.” You’re not just saying hello; you’re participating in a movement built on hope, creativity, and collaboration. And who doesn’t want to start their day with that?
-

@ 4ec341e6:6dc2fdaf
2024-12-07 22:35:48
Fazendo referencia ao capítulo 2 - “Dizendo não”, o nome deste é o contrário: “Dizendo sim” e fala sobre linguagem de comprometimento, como e quando dizer “SIM” de forma bem clara e comprometida.
> Você diz que fará. Você é honesto. Você de fato o faz.
>
O autor discorre que existe uma linguagem de comprometimento, e uma linguagem de não comprometimento, como exemplos de linguagem de não comprometimento estão: “Espero já ter feito…”, “Temos que fazer…” e “Alguém tem que fazer…”. Ou seja, linguagem que coloca algo à ser feito como fora do controle do programador, se isentando de culpa e/ou responsabilidade.
> Há poucas pessoas que ao falarem algo, realmente estão sendo honestas e cumprem o prometido.
>
O autor ainda diz algo que ele ainda vai explorar nos próximos capítulos: Outras pessoas dependem do seu comprometimento e das suas estimativas, se você diz que algo será entregue, essas pessoas que dependem de você vão se planejar com base nessa informação, o que pode incluir o roadmap das próximas sprints ou comunicação com clientes da empresa, por isso se torna ainda mais importante o comprometimento total com as promessas.
Deve-se usar a linguagem de comprometimento para que não exista dúvidas daquilo que foi prometido.
O autor aborda alguns exemplos e possíveis saídas caso o desenvolvedor seja pressionado à enregar o que se pede. É importante relembrar o capítulo 2 para não usar a palavra **“tentar”**, e ser o mais assertivo possível.
> Não se espera que profissionais digam sim para tudo que se pede à eles. […] mas precisam trabalhar para tornar o sim possível.
>
Também uma frase muito interessante, dado que CEOs, CTOs e gestores de projeto querem que os desenvolvedores digam SIM para absolutamente tudo, como prazos impossíveis, aumento de escopo de *user stories*, demandas não planejadas etc.
-

@ eac63075:b4988b48
2024-10-15 20:18:52
Bitcoin emerged as a promise of financial freedom, challenging the traditional and centralized structures of governments and financial institutions. Since its inception, many enthusiasts have believed in the revolutionary potential of this cryptocurrency. However, over the years, challenges have arisen that have tested this promise, especially concerning centralization, the implementation of secondary layers like the Lightning Network, and issues of governance and privacy.
https://www.fountain.fm/episode/SDZYaFMyLEO1krL6x8RD
## **Centralization and the Exclusivity of Nostr**
Nostr, a decentralized network aiming to be censorship resistant, emerged as an attempt to solve some inherent problems of centralization. However, it faces significant challenges. Many users point out that, despite its promise, Nostr is still not attractive to the general public, being exclusive to a specific niche.
Additionally, issues of centralization still permeate the network. Discussions on GitHub revealed that developers chose not to implement an absolute level of privacy, a decision many considered inadequate. Even with protocols developed to ensure total privacy—such as the non-identification of IPs and communicating parties—the network still lacks this robust implementation.
## **Individual Freedom and Data Protection**
A recurring issue is the importance of demonstrating that real options exist for citizens to protect and preserve their freedom. In a world where most discussions about Bitcoin revolve around its use as an investment asset, there is an urgent need to emphasize its potential as a tool for financial freedom.
The Bitcoin community should focus on development and education, showing that the conscious use of cryptography and decentralized transactions can protect individuals against excessive government surveillance and control. Secure and private communication is fundamental, and Bitcoin, along with privacy technologies, can provide this.
## **Hyperbitcoinization and the Illusion of Store of Value**
Hyperbitcoinization is a concept that refers to the moment when Bitcoin will replace fiat currencies worldwide. However, achieving this state is not simple, especially when Bitcoin is seen primarily as a store of value. Since 2017, this narrative has gained strength, promoting the idea that accumulating Bitcoin will lead to automatic wealth.
However, this perspective is limited. The true value of Bitcoin lies in its use as a transactional currency, not just in its scarcity. The community must work to ensure that Bitcoin is utilized in everyday transactions, strengthening its network and demonstrating its real value.
## **The Role of the Community in Bitcoin's Development**
Bitcoin's strength comes from its community. Developers, users, and enthusiasts, through their actions and support, make Bitcoin a powerful tool. This community is responsible for ensuring that Bitcoin maintains its essence and that its functionalities are accessible to all.
It is crucial that this support network continues promoting the decentralized use of Bitcoin, without intermediaries that can censor or control transactions. Adopting Bitcoin in a centralized manner, through banks or other institutions, contradicts its original proposal and strengthens those who have historically opposed its existence.
## **Sidechains, Second Layers, and the Lightning Network**
Sidechains and second layers, like the Lightning Network, are essential components for Bitcoin's scalability. However, they bring challenges, especially regarding the need to trust intermediaries. For these solutions to be effective, it is fundamental that they allow the unilateral withdrawal of funds, ensuring that users maintain full control over their assets.
The Lightning Network, for example, is a second layer that allows fast and cheap transactions. However, many users face difficulties when dealing with channels that do not close correctly, resulting in locked funds. These problems must be solved for the network to be truly decentralized and functional.
## **The Fight Against Centralization on the Internet**
Centralization is not a problem exclusive to Bitcoin. The internet as a whole faces similar challenges, with data control concentrated in the hands of a few large technology companies. To ensure freedom of expression and online privacy, it is necessary to decentralize these data clusters.
Projects that seek to decentralize the internet are vital for this mission. They not only complement Bitcoin in its quest for financial freedom but also ensure that digital communication and expression are protected against censorship and corporate control.
## **The Future of Bitcoin and the Need for Action**
The future of Bitcoin depends on the community's action. We cannot expect Bitcoin to automatically become a global medium of exchange. A conscious effort is necessary to build an ecosystem where Bitcoin can flow freely, being used in everyday transactions and valued for its utility.
Moreover, with the imminent arrival of central bank digital currencies (CBDCs), time is of the essence. CBDCs represent a significant challenge, as they can further restrict individuals' financial freedom. Therefore, accelerating Bitcoin adoption and ensuring it maintains its decentralized and uncensorable properties is a priority.
## **Conclusion**
Bitcoin remains a powerful tool for financial freedom but faces significant challenges. Centralization, both in the context of secondary networks and the internet in general, poses a threat to its original proposal. However, with the joint action of the community and the continuous development of decentralized solutions, it is possible to maintain Bitcoin as a bastion of individual freedom.
The true revolution of Bitcoin lies in its use as a medium of exchange, not just as a store of value. To achieve hyperbitcoinization, it is necessary to build a robust ecosystem where Bitcoin can circulate freely and be accessible to all. Only then can we fulfill Bitcoin's initial promise and ensure it continues to be a tool for freedom and financial autonomy.
-

@ e6817453:b0ac3c39
2024-12-07 15:06:43
I started a long series of articles about how to model different types of knowledge graphs in the relational model, which makes on-device memory models for AI agents possible.
We model-directed graphs
Also, graphs of entities
We even model hypergraphs
Last time, we discussed why classical triple and simple knowledge graphs are insufficient for AI agents and complex memory, especially in the domain of time-aware or multi-model knowledge.
So why do we need metagraphs, and what kind of challenge could they help us to solve?
- complex and nested event and temporal context and temporal relations as edges
- multi-mode and multilingual knowledge
- human-like memory for AI agents that has multiple contexts and relations between knowledge in neuron-like networks
## MetaGraphs
A meta graph is a concept that extends the idea of a graph by allowing edges to become graphs. Meta Edges connect a set of nodes, which could also be subgraphs. So, at some level, node and edge are pretty similar in properties but act in different roles in a different context.
Also, in some cases, edges could be referenced as nodes.
This approach enables the representation of more complex relationships and hierarchies than a traditional graph structure allows. Let’s break down each term to understand better metagraphs and how they differ from hypergraphs and graphs.
## Graph Basics
- A standard **graph** has a set of **nodes** (or vertices) and **edges** (connections between nodes).
- Edges are generally simple and typically represent a binary relationship between two nodes.
- For instance, an edge in a social network graph might indicate a “friend” relationship between two people (nodes).
## Hypergraph
- A **hypergraph** extends the concept of an edge by allowing it to connect any number of nodes, not just two.
- Each connection, called a **hyperedge**, can link multiple nodes.
- This feature allows hypergraphs to model more complex relationships involving multiple entities simultaneously. For example, a hyperedge in a hypergraph could represent a project team, connecting all team members in a single relation.
- Despite its flexibility, a hypergraph doesn’t capture hierarchical or nested structures; it only generalizes the number of connections in an edge.
## Metagraph
- A **metagraph** allows the edges to be graphs themselves. This means each edge can contain its own nodes and edges, creating nested, hierarchical structures.
- In a meta graph, an edge could represent a relationship defined by a graph. For instance, a meta graph could represent a network of organizations where each organization’s structure (departments and connections) is represented by its own internal graph and treated as an edge in the larger meta graph.
- This recursive structure allows metagraphs to model complex data with multiple layers of abstraction. They can capture multi-node relationships (as in hypergraphs) and detailed, structured information about each relationship.
## Named Graphs and Graph of Graphs
As you can notice, the structure of a metagraph is quite complex and could be complex to model in relational and classical RDF setups. It could create a challenge of luck of tools and software solutions for your problem.
If you need to model nested graphs, you could use a much simpler model of Named graphs, which could take you quite far.

The concept of the named graph came from the RDF community, which needed to group some sets of triples. In this way, you form subgraphs inside an existing graph. You could refer to the subgraph as a regular node. This setup simplifies complex graphs, introduces hierarchies, and even adds features and properties of hypergraphs while keeping a directed nature.
It looks complex, but it is not so hard to model it with a slight modification of a directed graph.
So, the node could host graphs inside. Let's reflect this fact with a location for a node. If a node belongs to a main graph, we could set the location to null or introduce a main node . it is up to you

Nodes could have edges to nodes in different subgraphs. This structure allows any kind of nesting graphs. Edges stay location-free
## Meta Graphs in Relational Model
Let’s try to make several attempts to model different meta-graphs with some constraints.
## Directed Metagraph where edges are not used as nodes and could not contain subgraphs

In this case, the edge always points to two sets of nodes. This introduces an overhead of creating a node set for a single node. In this model, we can model empty node sets that could require application-level constraints to prevent such cases.
## Directed Metagraph where edges are not used as nodes and could contain subgraphs

Adding a node set that could model a subgraph located in an edge is easy but could be separate from in-vertex or out-vert.
I also do not see a direct need to include subgraphs to a node, as we could just use a node set interchangeably, but it still could be a case.
## Directed Metagraph where edges are used as nodes and could contain subgraphs
As you can notice, we operate all the time with node sets. We could simply allow the extension node set to elements set that include node and edge IDs, but in this case, we need to use uuid or any other strategy to differentiate node IDs from edge IDs. In this case, we have a collision of ephemeral edges or ephemeral nodes when we want to change the role and purpose of the node as an edge or vice versa.

A full-scale metagraph model is way too complex for a relational database.
So we need a better model.
Now, we have more flexibility but loose structural constraints. We cannot show that the element should have one vertex, one vertex, or both. This type of constraint has been moved to the application level. Also, the crucial question is about query and retrieval needs.
Any meta-graph model should be more focused on domain and needs and should be used in raw form. We did it for a pure theoretical purpose.
-

@ 42342239:1d80db24
2024-09-26 07:57:04
The boiling frog is a simple tale that illustrates the danger of gradual change: if you put a frog in boiling water, it will quickly jump out to escape the heat. But if you place a frog in warm water and gradually increase the temperature, it won't notice the change and will eventually cook itself. Might the decline in cash usage be construed as an example of this tale?
As long as individuals can freely transact with each other and conduct purchases and sales without intermediaries[^1] such as with cash, our freedoms and rights remain secure from potential threats posed by the payment system. However, as we have seen in several countries such as Sweden over the past 15 years, the use of cash and the amount of banknotes and coins in circulation [have decreased](https://x.com/enlundm/status/1635561551749959680). All to the benefit of various intermediated[^1] electronic alternatives.
The reasons for this trend include:
- The costs associated with cash usage has been [increasing](https://www.riksbank.se/sv/betalningar--kontanter/sa-betalar-svenskarna/betalningsrapport--2024/sakerhet-effektivitet-och-tillganglighet/ar-betalningar-i-sverige-sakra/infrastrukturen-for-kontanter-ar-sarbar-for-forandringar-pa-marknaden/).
- Increased regulatory burdens due to stricter [anti-money laundering](https://underorion.se/en/posts/fatf/) regulations.
- Closed bank branches and [fewer ATMs](https://nyheter24.se/ekonomi/privatekonomi/1237070-sa-manga-bankomater-har-forsvunnit-pa-10-ar-kommer-minska).
- The Riksbank's [aggressive note switches](https://x.com/enlundm/status/1635561551749959680) resulted in a situation where they were no longer [recognized](https://www.svt.se/nyheter/lokalt/skane/valdigt-fa-kanner-igen-dagens-sedlar).
#### Market forces or "market forces"?
Some may argue that the "de-cashing" of society is a consequence of market forces. But does this hold true? Leading economists [at times](https://underorion.se/en/posts/freedom_to_transact/) recommend interventions with the express purpose to mislead the public, such as proposing measures who are "opaque to most voters."
In a working paper on de-cashing by the International Monetary Fund (IMF) from [2017](https://archive.ph/fpRk0#selection-2237.292-2245.0), such thought processes, even recommendations, can be found. IMF economist Alexei Kireyev, formerly a professor at an institute associated with the Soviet Union's KGB (MGIMO) and economic adviser to Michail Gorbachov 1989-91, wrote that:
- "Social conventions may also be disrupted as de-cashing may be viewed as a violation of fundamental rights, including freedom of contract and freedom of ownership."
- Letting the private sector lead "the de-cashing" is preferable, as it will seem "almost entirely benign". The "tempting attempts to impose de-cashing by a decree should be avoided"
- "A targeted outreach program is needed to alleviate suspicions related to de-cashing"
In the text, he also offered suggestions on the most effective approach to diminish the use of cash:
- The de-cashing process could build on the initial and largely uncontested steps, such as the phasing out of large denomination bills, the placement of ceilings on cash transactions, and the reporting of cash moves across the borders.
- Include creating economic incentives to reduce the use of cash in transactions
- Simplify "the opening and use of transferrable deposits, and further computerizing the financial system."
As is customary in such a context, it is noted that the article only describes research and does not necessarily reflect IMF's views. However, isn't it remarkable that all of these proposals have come to fruition and the process continues? Central banks have phased out banknotes with higher denominations. Banks' regulatory complexity seemingly increase by the day (try to get a bank to handle any larger amounts of cash). The transfer of cash from one nation to another has become increasingly burdensome. The European Union has recently introduced restrictions on cash transactions. Even the law governing the Swedish central bank is written so as to guarantee a further undermining of cash. All while the market share is growing for alternatives such as transferable deposits[^1].
#### The old European disease
The Czech Republic's former president Václav Havel, who played a key role in advocating for human rights during the communist repression, [was once asked](https://middlestage.blogspot.com/2008/06/on-vaclav-havels-to-castle-and-back.html) what the new member states in the EU could do to pay back for all the economic support they had received from older member states. He replied that the European Union still suffers from the old European disease, namely the tendency to compromise with evil. And that the new members, who have a recent experience of totalitarianism, are obliged to take a more principled stance - sometimes necessary - and to monitor the European Union in this regard, and educate it.
The American computer scientist and cryptographer David Chaum
said in [1996](https://cryptome.org/jya/digicrash.htm) that "[t]he difference between a bad electronic cash system and well-developed digital cash will determine whether we will have a dictatorship or a real democracy". If Václav Havel were alive today, he would likely share Chaum's sentiment. Indeed, on the current path of "de-cashing", we risk abolishing or limiting our liberties and rights, "including freedom of contract and freedom of ownership" - and this according to an economist at the IMF(!).
As the frog was unwittingly boiled alive, our freedoms are quietly being undermined. The temperature is rising. Will people take notice before our liberties are irreparably damaged?
[^1]: Transferable deposits are intermediated. Intermediated means payments involving one or several intermediares, like a bank, a card issuer or a payment processor. In contrast, a disintermediated payment would entail a direct transactions between parties without go-betweens, such as with cash.
-

@ e6817453:b0ac3c39
2024-12-07 15:03:06
Hey folks! Today, let’s dive into the intriguing world of neurosymbolic approaches, retrieval-augmented generation (RAG), and personal knowledge graphs (PKGs). Together, these concepts hold much potential for bringing true reasoning capabilities to large language models (LLMs). So, let’s break down how symbolic logic, knowledge graphs, and modern AI can come together to empower future AI systems to reason like humans.
## The Neurosymbolic Approach: What It Means ?
Neurosymbolic AI combines two historically separate streams of artificial intelligence: symbolic reasoning and neural networks. Symbolic AI uses formal logic to process knowledge, similar to how we might solve problems or deduce information. On the other hand, neural networks, like those underlying GPT-4, focus on learning patterns from vast amounts of data — they are probabilistic statistical models that excel in generating human-like language and recognizing patterns but often lack deep, explicit reasoning.
While GPT-4 can produce impressive text, it’s still not very effective at reasoning in a truly logical way. Its foundation, transformers, allows it to excel in pattern recognition, but the models struggle with reasoning because, at their core, they rely on statistical probabilities rather than true symbolic logic. This is where neurosymbolic methods and knowledge graphs come in.
## Symbolic Calculations and the Early Vision of AI
If we take a step back to the 1950s, the vision for artificial intelligence was very different. Early AI research was all about symbolic reasoning — where computers could perform logical calculations to derive new knowledge from a given set of rules and facts. Languages like **Lisp** emerged to support this vision, enabling programs to represent data and code as interchangeable symbols. Lisp was designed to be homoiconic, meaning it treated code as manipulatable data, making it capable of self-modification — a huge leap towards AI systems that could, in theory, understand and modify their own operations.
## Lisp: The Earlier AI-Language
**Lisp**, short for “LISt Processor,” was developed by John McCarthy in 1958, and it became the cornerstone of early AI research. Lisp’s power lay in its flexibility and its use of symbolic expressions, which allowed developers to create programs that could manipulate symbols in ways that were very close to human reasoning. One of the most groundbreaking features of Lisp was its ability to treat code as data, known as homoiconicity, which meant that Lisp programs could introspect and transform themselves dynamically. This ability to adapt and modify its own structure gave Lisp an edge in tasks that required a form of self-awareness, which was key in the early days of AI when researchers were exploring what it meant for machines to “think.”
Lisp was not just a programming language—it represented the vision for artificial intelligence, where machines could evolve their understanding and rewrite their own programming. This idea formed the conceptual basis for many of the self-modifying and adaptive algorithms that are still explored today in AI research. Despite its decline in mainstream programming, Lisp’s influence can still be seen in the concepts used in modern machine learning and symbolic AI approaches.
## Prolog: Formal Logic and Deductive Reasoning
In the 1970s, **Prolog** was developed—a language focused on formal logic and deductive reasoning. Unlike Lisp, based on lambda calculus, Prolog operates on formal logic rules, allowing it to perform deductive reasoning and solve logical puzzles. This made Prolog an ideal candidate for expert systems that needed to follow a sequence of logical steps, such as medical diagnostics or strategic planning.
Prolog, like Lisp, allowed symbols to be represented, understood, and used in calculations, creating another homoiconic language that allows reasoning. Prolog’s strength lies in its rule-based structure, which is well-suited for tasks that require logical inference and backtracking. These features made it a powerful tool for expert systems and AI research in the 1970s and 1980s.
The language is declarative in nature, meaning that you define the problem, and Prolog figures out **how** to solve it. By using formal logic and setting constraints, Prolog systems can derive conclusions from known facts, making it highly effective in fields requiring explicit logical frameworks, such as legal reasoning, diagnostics, and natural language understanding. These symbolic approaches were later overshadowed during the AI winter — but the ideas never really disappeared. They just evolved.
## Solvers and Their Role in Complementing LLMs
One of the most powerful features of **Prolog** and similar logic-based systems is their use of **solvers**. Solvers are mechanisms that can take a set of rules and constraints and automatically find solutions that satisfy these conditions. This capability is incredibly useful when combined with LLMs, which excel at generating human-like language but need help with logical consistency and structured reasoning.
For instance, imagine a scenario where an LLM needs to answer a question involving multiple logical steps or a complex query that requires deducing facts from various pieces of information. In this case, a **solver** can derive valid conclusions based on a given set of logical rules, providing structured answers that the LLM can then articulate in natural language. This allows the LLM to retrieve information and ensure the logical integrity of its responses, leading to much more robust answers.
Solvers are also ideal for handling **constraint satisfaction problems** — situations where multiple conditions must be met simultaneously. In practical applications, this could include scheduling tasks, generating optimal recommendations, or even diagnosing issues where a set of symptoms must match possible diagnoses. Prolog’s solver capabilities and LLM’s natural language processing power can make these systems highly effective at providing intelligent, rule-compliant responses that traditional LLMs would struggle to produce alone.
By integrating **neurosymbolic methods** that utilize solvers, we can provide LLMs with a form of deductive reasoning that is missing from pure deep-learning approaches. This combination has the potential to significantly improve the quality of outputs for use-cases that require explicit, structured problem-solving, from legal queries to scientific research and beyond. Solvers give LLMs the backbone they need to not just generate answers but to do so in a way that respects logical rigor and complex constraints.
## Graph of Rules for Enhanced Reasoning
Another powerful concept that complements LLMs is using a **graph of rules**. A graph of rules is essentially a structured collection of logical rules that interconnect in a network-like structure, defining how various entities and their relationships interact. This structured network allows for complex reasoning and information retrieval, as well as the ability to model intricate relationships between different pieces of knowledge.
In a **graph of rules**, each node represents a rule, and the edges define relationships between those rules — such as dependencies or causal links. This structure can be used to enhance LLM capabilities by providing them with a formal set of rules and relationships to follow, which improves logical consistency and reasoning depth. When an LLM encounters a problem or a question that requires multiple logical steps, it can traverse this graph of rules to generate an answer that is not only linguistically fluent but also logically robust.
For example, in a healthcare application, a graph of rules might include nodes for medical symptoms, possible diagnoses, and recommended treatments. When an LLM receives a query regarding a patient’s symptoms, it can use the graph to traverse from symptoms to potential diagnoses and then to treatment options, ensuring that the response is coherent and medically sound. The graph of rules guides reasoning, enabling LLMs to handle complex, multi-step questions that involve chains of reasoning, rather than merely generating surface-level responses.
Graphs of rules also enable **modular reasoning**, where different sets of rules can be activated based on the context or the type of question being asked. This modularity is crucial for creating adaptive AI systems that can apply specific sets of logical frameworks to distinct problem domains, thereby greatly enhancing their versatility. The combination of **neural fluency** with **rule-based structure** gives LLMs the ability to conduct more advanced reasoning, ultimately making them more reliable and effective in domains where accuracy and logical consistency are critical.
By implementing a graph of rules, LLMs are empowered to perform **deductive reasoning** alongside their generative capabilities, creating responses that are not only compelling but also logically aligned with the structured knowledge available in the system. This further enhances their potential applications in fields such as law, engineering, finance, and scientific research — domains where logical consistency is as important as linguistic coherence.
## Enhancing LLMs with Symbolic Reasoning
Now, with LLMs like GPT-4 being mainstream, there is an emerging need to add real reasoning capabilities to them. This is where **neurosymbolic approaches** shine. Instead of pitting neural networks against symbolic reasoning, these methods combine the best of both worlds. The neural aspect provides language fluency and recognition of complex patterns, while the symbolic side offers real reasoning power through formal logic and rule-based frameworks.
**Personal Knowledge Graphs (PKGs)** come into play here as well. Knowledge graphs are data structures that encode entities and their relationships — they’re essentially semantic networks that allow for structured information retrieval. When integrated with neurosymbolic approaches, LLMs can use these graphs to answer questions in a far more contextual and precise way. By retrieving relevant information from a knowledge graph, they can ground their responses in well-defined relationships, thus improving both the relevance and the logical consistency of their answers.
Imagine combining an LLM with a **graph of rules** that allow it to reason through the relationships encoded in a personal knowledge graph. This could involve using **deductive databases** to form a sophisticated way to represent and reason with symbolic data — essentially constructing a powerful hybrid system that uses LLM capabilities for language fluency and rule-based logic for structured problem-solving.
## My Research on Deductive Databases and Knowledge Graphs
I recently did some research on modeling **knowledge graphs using deductive databases**, such as DataLog — which can be thought of as a limited, data-oriented version of Prolog. What I’ve found is that it’s possible to use formal logic to model knowledge graphs, ontologies, and complex relationships elegantly as rules in a deductive system. Unlike classical RDF or traditional ontology-based models, which sometimes struggle with complex or evolving relationships, a deductive approach is more flexible and can easily support dynamic rules and reasoning.
**Prolog** and similar logic-driven frameworks can complement LLMs by handling the parts of reasoning where explicit rule-following is required. LLMs can benefit from these rule-based systems for tasks like entity recognition, logical inferences, and constructing or traversing knowledge graphs. We can even create a **graph of rules** that governs how relationships are formed or how logical deductions can be performed.
The future is really about creating an AI that is capable of both deep contextual understanding (using the powerful generative capacity of LLMs) and true reasoning (through symbolic systems and knowledge graphs). With the neurosymbolic approach, these AIs could be equipped not just to generate information but to explain their reasoning, form logical conclusions, and even improve their own understanding over time — getting us a step closer to true artificial general intelligence.
## Why It Matters for LLM Employment
Using **neurosymbolic RAG (retrieval-augmented generation)** in conjunction with personal knowledge graphs could revolutionize how LLMs work in real-world applications. Imagine an LLM that understands not just language but also the relationships between different concepts — one that can navigate, reason, and explain complex knowledge domains by actively engaging with a personalized set of facts and rules.
This could lead to practical applications in areas like healthcare, finance, legal reasoning, or even personal productivity — where LLMs can help users solve complex problems logically, providing relevant information and well-justified reasoning paths. The combination of **neural fluency** with **symbolic accuracy and deductive power** is precisely the bridge we need to move beyond purely predictive AI to truly intelligent systems.
Let's explore these ideas further if you’re as fascinated by this as I am. Feel free to reach out, follow my YouTube channel, or check out some articles I’ll link below. And if you’re working on anything in this field, I’d love to collaborate!
Until next time, folks. Stay curious, and keep pushing the boundaries of AI!
-

@ d6affa19:9110b177
2024-09-24 18:31:42
i'm in the upstairs office.
lost in some project i've been tinkering with.
i feel driven with purpose.
the door is cracked open.
i always leave the door open.
Her footsteps echo up the stairway.
but my focus is intense;
a solution just beyond my fingertips.
the door creaks open,
a soft whisper of a sound.
i instantly feel Her presence.
a sweet vanilla scent wraps around me,
thick and intoxicating.
Her fingers brush through my hair,
a gentle caress.
She grips my hair, then releases it—
over and over again.
it feels good.
a soothing warmth envelops me.
Her fingers glide, each stroke igniting my senses.
a chill races down my spine.
the monitor becomes a bit distant.
"You're really focused, hmm?" She teases, leaning closer. "I'm just checking in on my sweet boy."
Her tone alluring,
already drawing me in.
"of course, my Queen." i reply, my eyes glued to the screen,
struggling to concentrate.
"thank You," my voice hints at annoyance. "i'm so close to finishing this up."
just when i near a breakthrough, She appears,
a siren pulling me from my path.
how does She know..?
the quiet signals that betray my focus—
that reveal my yearning.
"Hmmmm," She playfully muses.
ugh, i need to concentrate.
but the way this feels...
it pulls me deeper.
Her fingers drift by my ear,
lingering around my neck.
nails grazing my skin,
sending shivers through me.
my heart begins to race.
the screen blurs, reality separates.
"Okay, sweet boy." Her voice is a soft command.
Her nails dig in, a mixture of pain and pleasure.
a sharp contrast to the softness of Her touch.
"I'll be downstairs while you finish."
yet She remains.
i close my eyes, drowning in the sensation.
i should be finishing this project...
but each press feels like a silent command,
an urge to abandon my thoughts,
to succumb to the pull of Her presence.
the way She easily captures my attention...
it makes me feel so vulnerable...
Her grip finally loosens,
and slowly leaves my neck.
it wants more...
i barely hear Her leave.
but the air feels colder.
the warmth of Her presence is fading.
an aching emptiness fills the space...
the weight of Her absence settles in,
another reminder of how easily She commands my thoughts...
desperately, i take in the remnants of Her scent.
i stare at my monitor.
focus shattered,
thoughts scattered like leaves.
i linger for a moment.
fighting the urge to chase after Her.
the pull of Her absence is heavy in the air.
i'm unable to resist.
i rise from my seat.
the door is slightly open.
She always leaves the door open.
i make my way downstairs,
lost in the thoughts of serving Her.
my true purpose...
-

@ 17538dc2:71ed77c4
2024-09-16 15:26:32

# Quiztime
## Oil and gas
Oil and gas is naturally occurring. The prevalent worldview is that oil & gas has a biotic origin. There are real world examples of [abiotic](https://en.wikipedia.org/wiki/Abiogenic_petroleum_origin) oil deposits, which proponents of the status quo have a difficult time reconciling.
Irregardless, when oil & gas is burned, it simply turns to plant food (carbon dioxide + water).
Oil and gas greens the Earth, and increases [fertilization](https://www.sciencedirect.com/science/article/pii/S019689042031195X) and agricultural crop yield across the globe. 
The energy density of oil and gas is only surpassed by that of nuclear power.
Energy produced by oil and gas combustion is generally on-demand, reliable, economically storable & transportable.
## Solar
The sun is an abudant energy source, which keeps Earth warm, and alive. Thank you sun 🌞!
With the exception of places such as the UK, where it is unclear if inhabitants have ever seen the sun, solar rays keep plants, animals, and humans happy & alive on most of planet Earth.
Inventions such as solar panels harness the sun's energy, and convert it to electricity.
Solar panels consist of silicon, rare earth metals, and require toxic metals.
Solar panels have an expected life of decades, are not readily or economically recyclable.
A very low solar energy density practically means that land is inefficiently utilized in solar energy production. Solar used on arable land can no longer be farmed, and where no plains exist solar is known to cause [deforestation](https://www.spiegel.de/international/germany/german-renewable-energy-policy-takes-toll-on-nature-conservation-a-888094.html) and [landslides](https://mainichi.jp/english/articles/20210702/p2a/00m/0bu/002000c).
Solar energy is not reliable, not can it be summoned on demand. Solar energy is not economically storable, and is many cases is not produced at the point of demand.
Despite central planner mandates & subsidies in the US, the #EULAG and elsewhere, due to its intermittent nature, solar power cannot be counted on to replace reliable power generation in nuclear, hydro, or carbon fuel thermoelectric plants.
What this means is that solar does not replace, and yet rather*adds* to reliable energy generation, as most people in the developed world would not be OK with having electricity for at most 1/3 of the day. This increases the price of electricity, which in turn increases energy poverty, and drives businesses to shut down manufacturing, or move to a more energy competitive jurisdiction.
The capital wasted by central planners could have been used to reduce burden on consumers, and businesses, or fund healthcare, infrastructure, or other services.
It should be noted that off grid applications where there is no grid, or energy alternatives can be massively useful for folks otherwise without electricity.
### Which energy source would you consider renewable?
-

@ e6817453:b0ac3c39
2024-12-07 14:57:43

Architecture is one of humanity’s most profound achievements, not just in its physical structures but in the way it reflects organizational thinking. From the pyramids of ancient Egypt to the soaring cathedrals of the Middle Ages, and finally to today’s modular and distributed approaches, architectural endeavors reveal much about how people collaborate — or fail to do so.
This article draws parallels between these three eras of architecture, exploring how their underlying philosophies can inspire modern organizations to rethink collaboration, decision-making, and leadership.
## The Pyramid: A Hierarchical Approach
The Egyptian pyramid stands as a monument to engineering and an entire worldview. Built under the supervision of an architect close to the pharaoh — often seen as a divine figure — the pyramid was the result of a strictly hierarchical system. A single, centralized vision drove the project, with workers, resources, and plans subordinated to one person's will or a small elite group.
This approach mirrors the hierarchical structures found in many enterprises today. Decisions are made at the top, with clear instructions passed down to those tasked with execution. Such a system has undeniable advantages: clarity, speed, and accountability. One person or a small group takes full responsibility for success and failure.
However, this approach relies heavily on an almost limitless supply of resources, whether human, material, or financial. It assumes that the leader’s vision is infallible and that the workforce can be endlessly commanded. While this might work for organizations with vast resources, it can stifle creativity, discourage individual contribution, and fail to adapt to changing circumstances.
## The Cathedral: A Collaborative Chain of Effort
In the Middle Ages, the construction of cathedrals introduced a shift in architectural thinking. These projects often spanned centuries, requiring the participation of multiple generations. The original architect might design the foundation, but later architects and builders adapted and expanded the design based on new technologies, styles, and knowledge.
Unlike the pyramid, the cathedral could not rely on a single leader’s vision. Instead, it became a shared effort — a chain of ideas and contributions. Workers, architects, and benefactors collaborated across time, passing down their knowledge and adapting to challenges as they arose. This collaborative approach allowed for evolution and resilience, as seen in the stylistic and technological differences often visible in different parts of a single cathedral.
This model resonates with modern organizations that embrace collaboration. By involving more voices in the decision-making process, these organizations create systems that are adaptable and resilient. However, collaboration is not without its challenges. Aligning diverse perspectives requires consensus-building, which can slow decision-making. Yet, the end result — a structure or system that reflects the strengths and insights of many — is often worth the effort.
## The Modular Cathedral: A Modern Vision
Today, architecture is evolving once again. Modular buildings and prefabricated structures embody a new level of complexity and cooperation. These projects are no longer confined to a single site or team; components are designed and built by specialists in different locations and then assembled into a cohesive whole.
This modular approach reflects the complexity of modern projects, which often require expertise from vastly different domains. A single person or team cannot possess all the necessary knowledge and skills. Success depends on collaboration, where every contributor — whether a designer, engineer, or builder — plays a critical role.
The “modular cathedral” concept builds on the collaborative model of the Middle Ages but adapts it for today’s interconnected, fast-moving world. It emphasizes not only the value of cooperation but also the importance of empowering contributors at every level to influence the final product. In this model, builders and architects share ideas, insights, and feedback, resulting in structures that are both innovative and functional.
## Lessons for Modern Organizations
## 1\. The Value of Cooperation
While hierarchical models may offer clarity and efficiency, modern challenges demand broader collaboration. The complexity of today’s projects requires input from diverse perspectives and areas of expertise. Organizations that foster cooperation can tap into the collective intelligence of their teams, resulting in more innovative and resilient solutions.
## 2\. Involving Builders in Architecture
In traditional hierarchies, architects make decisions, and builders execute them. But in a cooperative model, builders — those closest to the practical challenges — are given a voice in the design process. This approach improves the final product and increases all contributors' buy-in and engagement.
## 3\. Embracing Complexity
Collaboration can make decision-making more challenging. Consensus takes time, and balancing competing priorities takes work. However, organizations that embrace this complexity often find that the results — more adaptive, inclusive, and robust systems — justify the effort.
## 4\. Shared Success and Accountability
Hierarchical systems concentrate both success and failure in the hands of a few. Collaborative systems distribute these outcomes more broadly, which can make it harder to identify responsibility but also creates a shared sense of ownership and pride.
## The Future is Cooperative
The challenges of modern projects far exceed those of pyramids or cathedrals. They require expertise in areas as diverse as software development, sustainability, and data privacy. No single leader or team can master all these domains. Cooperation, though difficult, is the only viable path forward.
Like the great cathedrals of the past, modern endeavors should aim to bring together diverse voices and expertise. By involving everyone — from architects to builders, from planners to doers — we can create systems that stand the test of time. The future of architecture, both literal and metaphorical, lies not in pyramids but in modular cathedrals: collaborative, inclusive, and resilient.
-

@ 42342239:1d80db24
2024-09-02 12:08:29
The ongoing debate surrounding freedom of expression may revolve more around determining who gets to control the dissemination of information rather than any claimed notion of safeguarding democracy. Similarities can be identified from 500 years ago, following the invention of the printing press.
> What has been will be again, what has been done will be done again; there is nothing new under the sun.
-- Ecclesiastes 1:9
The debate over freedom of expression and its limits continues to rage on. In the UK, citizens are being arrested for [sharing humouristic images](https://www.hrla.org.au/uk_man_arrested_for_social_media_meme). In Ireland, it may soon become illegal to possess "[reckless](https://www.msn.com/en-us/news/world/ireland-hate-speech-law-would-make-it-illegal-to-possess-reckless-memes/ar-AA1kBmGc)" memes. Australia is trying to get X to [hide information](https://reason.com/2024/04/26/australia-tries-to-censor-the-world/). Venezuela's Maduro blocked X earlier this year, as did a judge on Brazil's Supreme Court. In the US, a citizen [has been imprisoned](https://www.theverge.com/2023/10/19/23923733/douglass-mackey-twitter-troll-2016-election-voting-conspiracy) for spreading misleading material following a controversial court ruling. In Germany, the police are searching for a social media user who [called a politician overweight](https://notthebee.com/article/german-police-demand-user-data-of-meanie-who-called-fat-politician-fat). Many are also expressing concerns about deep fakes (AI-generated videos, images, or audio that are designed to deceive).
These questions are not new, however. What we perceive as new questions are often just a reflection of earlier times. After Gutenberg invented the printing press in the 15th century, there were soon hundreds of printing presses across Europe. The Church began using printing presses to mass-produce indulgences. "As soon as the coin in the coffer rings, the soul from purgatory springs" was a phrase used by [a traveling monk](https://www.dw.com/en/luther-is-famous-but-we-know-little-about-him/a-37907857) who sold such indulgences at the time. Martin Luther questioned the reasonableness of this practice. Eventually, he posted [the 95 theses](https://en.wikipedia.org/wiki/Ninety-five_Theses) on the church door in Wittenberg. He also translated the Bible into German. A short time later, his works, also mass-produced, accounted for [a third of all books sold](https://www.history.com/news/printing-press-renaissance) in Germany. Luther refused to recant his provocations as then determined by the Church's central authority. He was excommunicated in 1520 by the Pope and soon declared an outlaw by the Holy Roman Emperor.
This did not stop him. Instead, Luther referred to the Pope as "[Pope Fart-Ass](https://queenmobs.com/2017/12/fecal-fridays-martin-luther-toilet/)" and as the "[Ass-God in Rome](https://queenmobs.com/2017/12/fecal-fridays-martin-luther-toilet/))". He also commissioned caricatures, such as woodcuts showing a female demon giving birth to the Pope and cardinals, of German peasants responding to a papal edict by showing the [Pope their backsides and breaking wind](https://en.wikipedia.org/wiki/Propaganda_during_the_Reformation), and more.
Gutenberg's printing presses contributed to the spread of information in a way similar to how the internet does in today's society. The Church's ability to control the flow of information was undermined, much like how newspapers, radio, and TV have partially lost this power today. The Pope excommunicated Luther, which is reminiscent of those who are de-platformed or banned from various platforms today. The Emperor declared Luther an outlaw, which is similar to how the UK's Prime Minister is imprisoning British citizens today. Luther called the Pope derogatory names, which is reminiscent of the individual who recently had the audacity to call an overweight German minister overweight.
Freedom of expression must be curtailed to combat the spread of false or harmful information in order to protect democracy, or so it is claimed. But perhaps it is more about who gets to control the flow of information?
As is often the case, there is nothing new under the sun.
-

@ e6817453:b0ac3c39
2024-12-07 14:54:46
## Introduction: Personal Knowledge Graphs and Linked Data
We will explore the world of personal knowledge graphs and discuss how they can be used to model complex information structures. Personal knowledge graphs aren’t just abstract collections of nodes and edges—they encode meaningful relationships, contextualizing data in ways that enrich our understanding of it. While the core structure might be a directed graph, we layer semantic meaning on top, enabling nuanced connections between data points.
The origin of knowledge graphs is deeply tied to concepts from linked data and the semantic web, ideas that emerged to better link scattered pieces of information across the web. This approach created an infrastructure where data islands could connect — facilitating everything from more insightful AI to improved personal data management.
In this article, we will explore how these ideas have evolved into tools for modeling AI’s semantic memory and look at how knowledge graphs can serve as a flexible foundation for encoding rich data contexts. We’ll specifically discuss three major paradigms: RDF (Resource Description Framework), property graphs, and a third way of modeling entities as graphs of graphs. Let’s get started.
## Intro to RDF
The Resource Description Framework (RDF) has been one of the fundamental standards for linked data and knowledge graphs. RDF allows data to be modeled as triples: subject, predicate, and object. Essentially, you can think of it as a structured way to describe relationships: “X has a Y called Z.” For instance, “Berlin has a population of 3.5 million.” This modeling approach is quite flexible because RDF uses unique identifiers — usually URIs — to point to data entities, making linking straightforward and coherent.
RDFS, or RDF Schema, extends RDF to provide a basic vocabulary to structure the data even more. This lets us describe not only individual nodes but also relationships among types of data entities, like defining a class hierarchy or setting properties. For example, you could say that “Berlin” is an instance of a “City” and that cities are types of “Geographical Entities.” This kind of organization helps establish semantic meaning within the graph.
## RDF and Advanced Topics
## Lists and Sets in RDF
RDF also provides tools to model more complex data structures such as lists and sets, enabling the grouping of nodes. This extension makes it easier to model more natural, human-like knowledge, for example, describing attributes of an entity that may have multiple values. By adding RDF Schema and OWL (Web Ontology Language), you gain even more expressive power — being able to define logical rules or even derive new relationships from existing data.
## Graph of Graphs
A significant feature of RDF is the ability to form complex nested structures, often referred to as graphs of graphs. This allows you to create “named graphs,” essentially subgraphs that can be independently referenced. For example, you could create a named graph for a particular dataset describing Berlin and another for a different geographical area. Then, you could connect them, allowing for more modular and reusable knowledge modeling.
## Property Graphs
While RDF provides a robust framework, it’s not always the easiest to work with due to its heavy reliance on linking everything explicitly. This is where property graphs come into play. Property graphs are less focused on linking everything through triples and allow more expressive properties directly within nodes and edges.
For example, instead of using triples to represent each detail, a property graph might let you store all properties about an entity (e.g., “Berlin”) directly in a single node. This makes property graphs more intuitive for many developers and engineers because they more closely resemble object-oriented structures: you have entities (nodes) that possess attributes (properties) and are connected to other entities through relationships (edges).
The significant benefit here is a condensed representation, which speeds up traversal and queries in some scenarios. However, this also introduces a trade-off: while property graphs are more straightforward to query and maintain, they lack some complex relationship modeling features RDF offers, particularly when connecting properties to each other.
## Graph of Graphs and Subgraphs for Entity Modeling
A third approach — which takes elements from RDF and property graphs — involves modeling entities using subgraphs or nested graphs. In this model, each entity can be represented as a graph. This allows for a detailed and flexible description of attributes without exploding every detail into individual triples or lump them all together into properties.
For instance, consider a person entity with a complex employment history. Instead of representing every employment detail in one node (as in a property graph), or as several linked nodes (as in RDF), you can treat the employment history as a subgraph. This subgraph could then contain nodes for different jobs, each linked with specific properties and connections. This approach keeps the complexity where it belongs and provides better flexibility when new attributes or entities need to be added.
## Hypergraphs and Metagraphs
When discussing more advanced forms of graphs, we encounter hypergraphs and metagraphs. These take the idea of relationships to a new level. A hypergraph allows an edge to connect more than two nodes, which is extremely useful when modeling scenarios where relationships aren’t just pairwise. For example, a “Project” could connect multiple “People,” “Resources,” and “Outcomes,” all in a single edge. This way, hypergraphs help in reducing the complexity of modeling high-order relationships.
Metagraphs, on the other hand, enable nodes and edges to themselves be represented as graphs. This is an extremely powerful feature when we consider the needs of artificial intelligence, as it allows for the modeling of relationships between relationships, an essential aspect for any system that needs to capture not just facts, but their interdependencies and contexts.
## Balancing Structure and Properties
One of the recurring challenges when modeling knowledge is finding the balance between structure and properties. With RDF, you get high flexibility and standardization, but complexity can quickly escalate as you decompose everything into triples. Property graphs simplify the representation by using attributes but lose out on the depth of connection modeling. Meanwhile, the graph-of-graphs approach and hypergraphs offer advanced modeling capabilities at the cost of increased computational complexity.
So, how do you decide which model to use? It comes down to your use case. RDF and nested graphs are strong contenders if you need deep linkage and are working with highly variable data. For more straightforward, engineer-friendly modeling, property graphs shine. And when dealing with very complex multi-way relationships or meta-level knowledge, hypergraphs and metagraphs provide the necessary tools.
The key takeaway is that only some approaches are perfect. Instead, it’s all about the modeling goals: how do you want to query the graph, what relationships are meaningful, and how much complexity are you willing to manage?
## Conclusion
Modeling AI semantic memory using knowledge graphs is a challenging but rewarding process. The different approaches — RDF, property graphs, and advanced graph modeling techniques like nested graphs and hypergraphs — each offer unique strengths and weaknesses. Whether you are building a personal knowledge graph or scaling up to AI that integrates multiple streams of linked data, it’s essential to understand the trade-offs each approach brings.
In the end, the choice of representation comes down to the nature of your data and your specific needs for querying and maintaining semantic relationships. The world of knowledge graphs is vast, with many tools and frameworks to explore. Stay connected and keep experimenting to find the balance that works for your projects.
-

@ a6631624:24ba1a2f
2024-09-01 21:18:15
Genetics are real. They determine every meaningful aspect of a body - from physical traits to psychological ones - with environment accounting for little of a human's way of being. This is so much so that the trajectory and outcomes of a given human life are already written as soon as they're born.
Nowhere is this more apparent than in twin studies, where again and again, identical twins live virtually the same life after being separated at birth. They show that your political beliefs, your personality, your religiosity, the foods you enjoy, how many friends you have, your income level, your education level, your criminal record, the nature of your death, what you wore today, and so much more are all most likely determined, in range at least, by genetics.
But, genes do not work in isolation. They work together, playing off of and linking between each other, often with the expression of one trait inseparably tied to the expression of another and then, sometimes, yet another.
Invariably, some of these links and ties are between the expression of an internal trait and the expression of a physical trait, accounting for the reality that, in the way that we know the literal face of Down's Syndrome, the same exist - albeit much less extreme - for homosexuality, intelligence, trustworthiness, and extraversion (and many more). All of which can be consistently detected by humans in other humans merely by viewing their faces.
Furthermore, these correlations between physical traits (phenotype) and invisible traits (genotype) don't just end at the neck. Bodily aspects such as bone structure, gait, proportionality, and much more ultimately form one's very mien and, altogether, have much to say about the genetically embedded character of a given human.
All of this is to suggest that, because much of compatibility and general social chemistry is determined by the genetic outside as an indicator of the genetic inside, our bodily design and appearances matter and have very significant implications for the nature of our relationships, with whom we may have them, and the opportunities accessible to us in every other area of life due to them.
This cannot be reasonably or sustainably overridden by means of "social justice" or personal declaration. This instinctually mapped and interpreted physiognomy is so thoroughly embedded into the human social protocol that to ignore it (if you even could) would likely result in your prompt death at the hands of some guys you should've avoided. The ability to, on some level, identify the physical characteristics associated with psychological traits in other humans has evolved specifically because it increases the chances of human survival and reproduction.
It is, in fact, so fundamental and so seamlessly integrated into the being of humans as to be unnoticeable for the majority. Most cannot fathom there being a difference the internal self and the physical body because the fidelity between their own will and their own biological design is perfect. Most people simply are how they look.
## The Outliers
Because humans are genetic (read: physical) creatures, we can see statistical patterns assuring us that making a number assumptions about X kind of person based on the concentration traits among those “like” them is incredibly reasonable. Even in our systems and lived lives, we see that our evolutionarily rooted snap assessments are exceedingly practical and even socially efficient.
But, there are outliers in genetic trends.
Due to either mutation, rare genetic combinations, or some more extraordinary means, outliers in this context are individuals who diverge significantly from the central psychological tendencies of their phenotype group. They may either align more closely with the characteristics of another group or occupy a distinct, individual space.
Gender and race are the two most robust, rigid, and (therefore) social impactful phenotype groups, so when there is psychological incongruence in these particular respects, the result is a social disability. A condition in which one either cannot or finds it extremely distasteful to fill the social roles associated with their appearance, yet is rejected when attempting to take on roles they’re more psychologically suited to fill due to the visual associations and/or physical limitations of their body.
### Gender
For outliers in gender, this social disability has an extremely somatic edge that can entail entire body parts and functions feeling foreign and burdensome. For instance, the most common types of gender outliers – "FtM" or "FtN" – may struggle with the relative lack of physical prowess, female bodily processes, and physical features designed to attract male sexual attention - things that psychologically typical females embrace.
Bodily conditions like these often hinder gender outliers from acting and participating in their interests at a reasonable level of seriousness, ultimately leading to sub-satisfactory life outcomes and an inability to self-actualize.
This mismatch between body and self-consciousness and the difficulty of commanding respect that arises because of it means that gender outliers often find it difficult to interact comfortably with their peers and are often forced into activities and interactions that are not suitable for them in the names of conformity and, at times, safety. On the subject, their thoughts, feelings, and reactions are dismissed and devalued, rather than acknowledged as legitimate experiences.
### Race
Racial outliers can be thought of as individuals with traits that have low probabilities and/or frequencies of occurrence within their breeding group. "Trans identification" is most likely to manifest when this occurs on intrinsic traits with high social relevance and for outliers in race, the big ones are intelligence, it's associated correlates, and the values born of them.
Because of this, racial outliers typically have interests and values that are looked down upon by their breeding group; have shame in regard to their breeding group's history, collective culture, and behaviors; and, for these reasons, experience ostracization by said breeding group and, even when they do not, enjoy a voluntary estrangement from them while prioritizing association with others.
Contrary to common consensus, outliers in gender and race are not necessarily suffering from mental illness or defect. Though the condition itself may result in mental illnesses in some cases and those with other issues may parade or otherwise appear as the outliers, being so is simply a natural result of the way genetics work or, from another lens, trapping Selves in bodies.
Knowing this calls for efforts to alleviate and eventually rectify the issue in a way that corrects the genetic reality and optimizes for the agency and will of the Self - the individual - in context of civilization.
Reasons why and the means of doing so will be explored in the next installment of this series.
-

@ e6817453:b0ac3c39
2024-12-07 14:52:47
The temporal semantics and **temporal and time-aware knowledge graphs. We have different memory models for artificial intelligence agents. We all try to mimic somehow how the brain works, or at least how the declarative memory of the brain works. We have the split of episodic memory** and **semantic memory**. And we also have a lot of theories, right?
## Declarative Memory of the Human Brain
How is the semantic memory formed? We all know that our brain stores semantic memory quite close to the concept we have with the personal knowledge graphs, that it’s connected entities. They form a connection with each other and all those things. So far, so good. And actually, then we have a lot of concepts, how the episodic memory and our experiences gets transmitted to the semantic:
- hippocampus indexing and retrieval
- sanitization of episodic memories
- episodic-semantic shift theory
They all give a different perspective on how different parts of declarative memory cooperate.
We know that episodic memories get semanticized over time. You have semantic knowledge without the notion of time, and probably, your episodic memory is just decayed.
But, you know, it’s still an open question:
> do we want to mimic an AI agent’s memory as a human brain memory, or do we want to create something different?
It’s an open question to which we have no good answer. And if you go to the theory of neuroscience and check how episodic and semantic memory interfere, you will still find a lot of theories, yeah?
Some of them say that you have the hippocampus that keeps the indexes of the memory. Some others will say that you semantic the episodic memory. Some others say that you have some separate process that digests the episodic and experience to the semantics. But all of them agree on the plan that it’s operationally two separate areas of memories and even two separate regions of brain, and the semantic, it’s more, let’s say, protected.
So it’s harder to forget the semantical facts than the episodes and everything. And what I’m thinking about for a long time, it’s this, you know, the semantic memory.
## Temporal Semantics
It’s memory about the facts, but you somehow mix the time information with the semantics. I already described a lot of things, including how we could combine time with knowledge graphs and how people do it.
There are multiple ways we could persist such information, but we all hit the wall because the complexity of time and the semantics of time are highly complex concepts.
## Time in a Semantic context is not a timestamp.
What I mean is that when you have a fact, and you just mentioned that I was there at this particular moment, like, I don’t know, 15:40 on Monday, it’s already awake because we don’t know which Monday, right? So you need to give the exact date, but usually, you do not have experiences like that.
You do not record your memories like that, except you do the journaling and all of the things. So, usually, you have no direct time references. What I mean is that you could say that I was there and it was some event, blah, blah, blah.
Somehow, we form a chain of events that connect with each other and maybe will be connected to some period of time if we are lucky enough. This means that we could not easily represent temporal-aware information as just a timestamp or validity and all of the things.
For sure, the validity of the knowledge graphs (simple quintuple with start and end dates)is a big topic, and it could solve a lot of things. It could solve a lot of the time cases. It’s super simple because you give the end and start dates, and you are done, but it does not answer facts that have a relative time or time information in facts . It could solve many use cases but struggle with facts in an indirect temporal context. I like the simplicity of this idea. But the problem of this approach that in most cases, we simply don’t have these timestamps. We don’t have the timestamp where this information starts and ends. And it’s not modeling many events in our life, especially if you have the processes or ongoing activities or recurrent events.
I’m more about thinking about the time of semantics, where you have a time model as a **hybrid clock** or some **global clock** that does the partial ordering of the events. It’s mean that you have the chain of the experiences and you have the chain of the facts that have the different time contexts.
We could deduct the time from this chain of the events. But it’s a big, big topic for the research. But what I want to achieve, actually, it’s not separation on episodic and semantic memory. It’s having something in between.
## Blockchain of connected events and facts
I call it temporal-aware semantics or time-aware knowledge graphs, where we could encode the semantic fact together with the time component.I doubt that time should be the simple timestamp or the region of the two timestamps. For me, it is more a chain for facts that have a partial order and form a blockchain like a database or a partially ordered Acyclic graph of facts that are temporally connected. We could have some notion of time that is understandable to the agent and a model that allows us to order the events and focus on what the agent knows and how to order this time knowledge and create the chains of the events.
## Time anchors
We may have a particular time in the chain that allows us to arrange a more concrete time for the rest of the events. But it’s still an open topic for research. The temporal semantics gets split into a couple of domains. One domain is how to add time to the knowledge graphs. We already have many different solutions. I described them in my previous articles.
Another domain is the agent's memory and how the memory of the artificial intelligence treats the time. This one, it’s much more complex. Because here, we could not operate with the simple timestamps. We need to have the representation of time that are understandable by model and understandable by the agent that will work with this model. And this one, it’s way bigger topic for the research.”
-

@ 42342239:1d80db24
2024-08-30 06:26:21
> Quis custodiet ipsos custodes?
-- Juvenal (*[Who will watch the watchmen?](https://en.wikipedia.org/wiki/Quis_custodiet_ipsos_custodes)*)
In mid-July, numerous media outlets reported on [the assassination attempt](https://www.epochtimes.se/johan-westerholm-om-mordforsoket-pa-donald-trump) on Donald Trump. FBI Director Christopher Wray stated later that same month that what hit the former president Trump was a bullet. A few days later, it was reported from various [sources](https://x.com/enlundm/status/1817578988933685539) that **search engines no longer acknowledged that an assassination attempt on ex-President Trump had taken place**. When users used automatic completion in Google and Bing (91% respectively 4% market share), these search engines only suggested earlier presidents such as Harry Truman and Theodore Roosevelt, along with Russian President Vladimir Putin as people who could have been subjected to assassination attempts.
The reports were comprehensive enough for the Republican district attorney of Missouri to say that he would investigate matter. The senator from Kansas - also a Republican - planned to make an official request to Google. Google has responded through a spokesman to the New York Post that the company had not "manually changed" search results, but its system includes "protection" against search results "connected to political violence."
**A similar phenomenon occurred during the 2016 presidential election**. At the time, reports emerged of Google, unlike other less widely used search engines, rarely or never suggesting negative search results for Hillary Clinton. The company however provided negative search results for then-candidate Trump. Then, as today, the company denied deliberately favouring any specific political candidate.
These occurrences led to research on how such search suggestions can influence public opinion and voting preferences. For example, the impact of simply removing negative search suggestions has been investigated. [A study published in June 2024](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4535163) reports that such search results can dramatically affect undecided voters. **Reducing negative search suggestions can turn a 50/50 split into a 90/10 split in favour of the candidate for whom negative search suggestions were suppressed**. The researchers concluded that search suggestions can have "a dramatic impact," that this can "shift a large number of votes" and do so without leaving "any trace for authorities to follow." How search engines operate should therefore be considered of great importance by anyone who claims to take democracy seriously. And this regardless of one's political sympathies.
A well-known thought experiment in philosophy asks: "If a tree falls in the forest and no one hears it, does it make a sound?" Translated to today's media landscape: **If an assassination attempt took place on a former president, but search engines don't want to acknowledge it, did it really happen?**
-

@ e6817453:b0ac3c39
2024-12-07 14:50:29
Yesterday was the International Day of Persons with Disabilities, and as someone who has lived experience with disabilities, I feel compelled to broaden our discussion of limits and scalability. Today, we’re not just going to talk about technical boundaries; we’re going to talk about the boundaries that come with being human — the physical, psychological, and cognitive limits that impact the scalability of both our systems and our lives.
**Scalability of Software**
When we talk about scalability in software, we often think about adding more servers, expanding databases, and creating solutions to handle millions of requests per second. It’s easy to visualize what happens when our infrastructure reaches its physical limits. We know a single instance or database won’t suffice, and scaling horizontally, through containers or distributed systems, becomes necessary. The aim is to prevent revenue loss and inefficiencies in our systems, so we have dedicated interviews and tests to evaluate our designs for scalability.
But we use an entire universe of solutions — clusters, microservices, caching layers — to maintain a software system's seamless operation. We understand the constraints of our technologies: the speed of a CPU, the limits of network bandwidth, and even the eventual consistency of distributed databases. Yet, for some reason, we don’t apply the same rigor when considering the scalability of human beings.
**Physical and Mental Limits**
People, just like servers, have their own limits. The difference is that, unlike servers, humans can’t simply receive a RAM upgrade or a CPU boost. People — whether neurotypical or living with disabilities — all have physical, mental, and emotional capacities that define how well they perform. These limits vary widely based on an individual’s current mental state, life circumstances, and overall health. We easily recognize the bottlenecks in our software systems, but we often ignore the limits of our teams, pretending that they are limitless resources. This ignorance can be particularly damaging when we expect people to scale without recognizing their very human boundaries.
**The Challenge of Human Scale**
Scaling organizations or teams isn’t as straightforward as scaling software systems. A server under heavy load will throw an error or crash; people under heavy load often don’t give such immediate feedback. They push through — flexible, determined, but often at a cost. They stretch themselves to the breaking point, resulting in burnout and inefficiency. Burnout is not like a system error you can trace; it’s an invisible burden that gradually renders people ineffective, to the point where they might cause more harm than benefit, both to themselves and to the organization.
The pandemic underscored just how critical these challenges are, as many of us faced overwhelming workloads, blurred work-life boundaries, and mounting stress. These aren’t just individual problems; they’re organizational problems that reflect a poor understanding of the limits of human scalability.
**Humans Are Not Easily Replaceable**
Unlike software components, you can’t simply swap out a human team member as easily as replacing a failing server. Even if we could make people “replaceable” in a superficial sense — by having robust onboarding processes or extensive documentation — it still takes time for someone new to develop the context, the nuanced understanding of systems, and the tacit knowledge that an experienced member holds. To create truly scalable organizations, we must recognize that our people are the most fragile and valuable parts of our system, and we must build processes that respect and protect their limits.
**What Kills Productivity of Individuals**
Many things hinder individual productivity: cognitive overload, unrealistic deadlines, unclear communication, and mismatched tasks. Stress, far from making people better performers, often leads to worse decision-making and a diminished ability to think creatively. A person cannot indefinitely maintain high productivity if they are not mentally well — no matter how driven or talented they are. This is why effective scaling means reducing cognitive load, supporting mental well-being, and ensuring people are placed in roles that suit their skills and capacities.
**Feedback and Errors in a System**
A software system will crash and return an error when something goes wrong — but people don’t function this way. Humans have an incredible capacity for resilience, but this means they often keep going well past their limits. They won’t always provide the “error message” you need; they’ll keep trying until they’re mentally and physically drained. Unlike machines, they’re capable of sustaining damage without immediately signaling it. This flexibility, while admirable, is also dangerous because it obscures problems that should be addressed immediately.
**What Kills Teams and Communication**
Ineffective communication is one of the biggest killers of teams. Lack of transparency — or even worse, pseudo-transparency — creates a culture where team members feel isolated and uninformed. Miscommunications can pile up, just like technical debt, eventually causing the collapse of a project. Teams that operate with open communication, where feedback is genuinely heard and acted upon, are far more scalable than those that don’t.
Another challenge is the misunderstanding of skills and responsibilities. Placing a highly skilled person in a junior role or expecting a junior person to perform like an industry leader both lead to inefficiency and frustration. The “right person, right role” philosophy is critical for creating an effective team, just like choosing the right data structure or algorithm is vital for software performance.
**Right People in the Right Place**
To truly scale, we must remove the factors that destroy human productivity — cognitive overload, stress, lack of communication, and poorly assigned roles. Conway’s Law tells us that the systems we design mirror the communication structures of our organizations. If we want resilient, scalable systems, we must first create resilient, scalable teams. This means putting the right people in the right positions, making sure they are not overburdened, and providing them with the processes they need to succeed.
This shouldn’t be an empty slogan or a feel-good statement for HR brochures. It should be the underlying principle that guides our design choices — not just for software systems, but for our human systems as well.
-

@ 97c70a44:ad98e322
2024-08-29 00:50:27
Nostr is a mess. It always has been and will always be. That's part of the appeal! But it's important that users be able to navigate the rolling seas of this highly partition-tolerant network of kaleidoscopically-interwoven people, bots, topics, relays, clients, events, recommendations, lists, feeds, micro-apps, macro-apps, Chinese spam, and "GM"s.
In order to do this, users must be able to articulate "what" they are looking for, and clients must be able to articulate "how" to find that thing. This "how" is divided into two parts: building a request that will match the desired content (very easy), and selecting a relay that is able to serve that content to the user requesting it (very very hard).
# Why guessing isn't good enough
As a concrete example, let's say the user wants to find everyone in their "network" who is using a particular topic. The process would look something like this:
1. The user clicks the "network" tab and types in the topic they want to browse. This is the "what".
2. The client then translates the term "network" to a list of public keys using whatever definition they prefer (Follows? WoT? Grapevine?), and builds a filter that might look something like this: `[{"authors": pubkeys, "#t": ["mytopic"]}]`. Any relay will happily accept, understand, and respond to that filter.
3. The client then has to decide which relays it should send that filter to. This is the `???` stage of the outbox model, which immediately precedes:
4. Profit
It may not be immediately obvious why selecting the correct relays might be difficult. Most people post to relay.damus.io, and most people read from relay.damus.io, so in most cases you should be good, right?
This approach to relay selection has historically worked "well enough", but it depends on a flawed definition of success. If you only want to find 90% of the content that matches your query, using the top 10 relays will suffice. But nostr is intended to be censorship-resistant. What if those 10 hubs have banned a particular public key? Nostr clients should (at least in theory) be 100% successful in retrieving requested content. Even if someone only posts to their self-hosted relay, you should be able to find their notes if their account is set up properly.
# A naive solution to fixing the FOMO
A 90% hit rate results in a feeling of flakiness, even if users aren't completely aware of what isn't working. Feeds will be incomplete, quoted notes will be missing, replies will be orphaned, user profiles won't load. The natural response to the FOMO this creates is for users to "try harder" by adding more relays.
On the read side, this means clients open more connections, resulting in much higher data transfer requirements, with massively diminishing returns, since there's no reason to expect that a randomly chosen relay will have a substantially different data set.
One the publish side, this means that clients end up publishing more copies of their data to more relays. This approach has been automated in the past by services like Blastr, which don't store a copy of events published to the relay, but instead forward events to the top 300 relays in the network. This results in a two-orders-of-magnitude increase in storage required, and only makes the read side of the problem worse, since it reduces the uniqueness of the data set each relay stores. This in turn means that more duplicates are retrieved when querying relays.
Both halves of this approach are equivalent to guessing. On the read side, users are guessing which relays will have any arbitrary content they might ask for in the future. On the write side, users are guessing which relays other people might use to find their notes. It is a brute-force method for finding content.
# Randomness results in centralization
In theory, random relay selection would result in a perfect distribution of content across all relays in the network. But in practice, this method of selection isn't random at all, but is strongly influenced by user bias in what constitutes a "good" relay. While some users may check [nostr.watch](https://nostr.watch) for ping times, geographical proximity, or uptime, most will choose relays based on familiar names or other people's recommendations.
In either case, these biases are entirely orthogonal to achieving a higher content retrieval hit rate, _except when bias in relay selection results in clustering_ — i.e., centralization. In other words, the kind of randomness exhibited by users when selecting relays actually results in pretty much everyone picking the same few relays. We see this same effect when people try to come up with passwords or seed phrases — human-provided randomness is anything but random.
Clustering improves the hit rate when requesting events (slightly), but it results in nearly as much centralization as if only a single relay was used — and a lot more duplicate events.
# Something (anything) other than randomness
In early 2023, Mike Dilger [introduced NIP 65](https://github.com/nostr-protocol/nips/pull/218) (now known as the "Outbox Model") with a problem statement in the spirit of the original description of nostr: "Nostr should scale better. People should be able to find what they want."
_Historical note: NIP 65 was formerly known as the "Gossip Model", derived from the name of Mike's [desktop nostr client](https://github.com/mikedilger/gossip), called "Gossip". This unfortunately created a lot of confusion, since [gossip protocols](https://en.wikipedia.org/wiki/Gossip_protocol) work very differently from how nostr tends to work, hence the re-brand._
Before NIP 65, an informal standard existed in which `kind 3` user contact lists also included a list of relays that clients could use as something similar to Mastodon's "home servers". This list included the option to only read or write from a given relay. Unfortunately, it wasn't really clear what the semantics of this relay list were, so different clients handled them differently (and many clients ignored them). Usually this amounted to user-provided static relay configurations, which resulted in the naive relay selection approach described above.
NIP 65 used a very similar format (a list of relay urls with optional "read" or "write" directives), but with a very important semantic difference: relays listed in a user's `kind 10002` were intended to "advertise to others, not for configuring one's client." In other words, these relay selections were intended as a signal to other users that they should use certain relays when attempting to communicate with the author of the relay list.
I highly recommend reading the [entire NIP](https://github.com/nostr-protocol/nips/blob/master/65.md), which is very short and easy to read. But the mechanics of the spec are very simple:
> When seeking events **from** a user, Clients SHOULD use the WRITE relays of the user's `kind:10002`.
>
> When seeking events **about** a user, where the user was tagged, Clients SHOULD use the READ relays of the user's `kind:10002`.
>
> When broadcasting an event, Clients SHOULD:
>
> - Broadcast the event to the WRITE relays of the author
> - Broadcast the event to all READ relays of each tagged user
For the first time, we had a way to differentiate relays in terms of _what content could be found where_.
When looking for a note by a particular user, a client could now look up the author's `write` relays according to their `kind 10002` event, and send its query there. The result is a much higher hit rate with much lower data transfer requirements, and fewer connections per query.
# Making Outbox Work
There are of course some assumptions required to make this work.
First, the user must know which author they're looking for. This isn't always true when looking up a quote or parent note, but context and [pubkey hints](https://github.com/nostr-protocol/nips/pull/1171) solve this difficulty in most cases.
The author must also publish a `kind 10002` event. This may not always be the case, but clients should prompt users to set up their relay list correctly. This isn't really a flaw in the Outbox Model, just in implementations of it.
Additionally, the user's client must be able to find the author's `kind 10002` event. This is the "bootstrapping" phase of the Outbox Model, during which the mechanisms the system provides for finding events aren't available. This requires us to fall back to randomly guessing which relays have the content we're looking for, which as we saw above doesn't work very well.
Other than guessing, there are a few different ways a client might find the relay selection event in question, each of which is applicable in different circumstances. In most cases, using one of a handful of indexer relays like [purplepag.es](wss://purplepag.es) or [relay.nostr.band](wss://relay.nostr.band) is a simple and efficient way to find user profiles and relay selections.
However, if an author's content has been aggressively purged from these indexers due to censorship, they obviously can't be relied upon. Even though the author in question hasn't been deplatformed from nostr itself (since he can always self-host a publicly accessible relay to store his content), he has been effectively shadow-banned.
To get around this, relay selections have to be communicated in some other way. Nostr has a few different mechanisms for this:
- If the author's NIP 05 address is known and properly configured (it may not be), clients can look up the author's NIP 05 endpoint to find some reasonable relay hints. Unfortunately, these are often neglected, and usually custodial, so they can run into the same problems.
- If the author's pubkey is found in another signed event found on nostr, [relay hints](https://github.com/nostr-protocol/nips/blob/fade0164f52033314bf0a5ef9bd63c2483afae9b/10.md#marked-e-tags-preferred) can be a way to propagate relay selections through the network. This relies on implementations picking reliable relay hints which can be difficult, and hints do tend to become less reliable over time. However, this strategy is very effective in resisting censorship because it makes banning viral — if a relay wants to completely purge a particular pubkey from their database, they have to purge every event that references it, since events are tamper-proof.
- In extremis, relay recommendations can always be communicated out-of-band. This can be done using manual input, QR codes, DHTs, jsonl torrents full of `kind 10002` events, or any other mechanism client developers choose to resort to.
Another, more technical assumption is that any given query can be fulfilled by few enough relays that a client can actually make all the connections needed, without running into resource limits. If you're trying to request content from 10,000 users across 1,000 relays, you're going to have a bad time. This was [pointed out](https://coracle.social/nevent1qythwumn8ghj76twvfhhstnwdaehgu3wwa5kuef0qyv8wumn8ghj7cm9d3kxzu3wdehhxarj9emkjmn99uq3samnwvaz7tmrwfjkzarj9ehx7um5wgh8w6twv5hsqgrn7l6zj7ht6ruyk76vvvtkfs4xrhyzc3tm64l3eyfvd40y26sz0gshmunh) to me by Mazin of [nostr.wine](https://nostr.wine). He makes a good point, and it's definitely something to keep in mind. There are some mitigating factors though.
The first is that the current topology of the network probably won't persist forever. Because nostr is largely populated by self-hosting enthusiasts, the number of "tiny" relays is proportionally much higher than it will be if adoption picks up, even if the total number of relays grows. The trajectory is that nostr will drift toward fewer, larger relays, reducing the number of connections needed to fulfill any given query.
This is "centralizing", but it's important to understand that this isn't necessarily a bad thing. As long as there are more than one or two large hubs, there is user choice. And as long as it's possible to run a new relay, there is always an escape hatch. Nostr, like bitcoin, has no hard dependency on the biggest player in the network.
The other thing to consider is that there are lots of other techniques we can use to overcome the limits of the lowest-common denominator's limitations (mobile browser clients), including self hosted or third-party relay proxies. The trade-off here is that a little trust (aka centralization) can go a long way to reducing resource requirements needed to fulfill queries using the Outbox model.
If you're interested in more details on this topic, see [this blog post](https://habla.news/u/hodlbod@coracle.social/sfwV1rNaoQXd65PbIMYgm).
That was a long digression, but there is one other thing that the Outbox model assumes to be the case. Even if the correct relays are found and connected to, they still may not return all desired content, either because they don't have it, or because they refuse to return it to the user requesting it.
This can happen if the publishing client isn't following the Outbox Model, if the author had migrated from one relay set to another without copying their notes over, or if the relay in question chose not to retain the author's content for some reason.
The first two issues can be fixed by improving implementations, but the question of policy is a little more interesting.
# Relativistic relays
The Outbox Model is a mechanical process; it's only as useful as user relay selections are. In order for it to work, users have to be able to make intelligent relay selections.
Every relay has trade-offs, depending on its policy. [140.f7z.io](wss://140.f7z.io) would not be useful for long-form content, for example. Some relays might have a content retention policy that changes depending on whether you're a paying user. If you don't pay, you might find out too late that your content has been deleted from the relay.
So what makes a relay "good" for a particular use case? Well, it's complicated. Here are a few factors that go into that calculus:
- Is the relay in the same geographical as the user? Proximity reduces latency, but jurisdictional arbitrage might be desired. Users should probably have a variety of relays that fit different profiles.
- Will the relay ban the user? Do the operators have a history of good behavior? Is the relay focused on particular types of content? Is the relay's focus consistent with the user's goal in adding that relay to their list?
- What are the relay's retention policies? A user might want to set up an archival relay for her old content, or a multi-availability-zone relay so her notes are immediately accessible to the rest of the network.
- Does the relay require payment? Paid relays are more aligned with their users, but obviously come at a financial cost.
- Does the relay have policies for read-protecting content? If so, other users might not be able to find your posts published to that relay. On the other hand, some relays are configured to work as inboxes for direct messages, which can help preserve privacy.
- Does the relay request that users authenticate? Authentication can help manage spam, but it also allows relays to correlate content requests with users, reducing user privacy.
- Is the relay you use hosted by your client's developer? If so, you're in danger of getting banned from your client and your relay at the same time.
- Is the relay a hub? Using hubs can help smooth out rough areas in Outbox Model implementations, at the cost of centralization.
- Is the relay used by anyone else? One-off relays can be useful for archival purposes, but often won't be used by clients following the Outbox Model, depending on how they optimize requests.
There are lots of ways to approach the problem of helping users select relays, but it's an inherently complex problem which very few people will have the patience to properly address on their own. Relay selection is a multi-dimensional problem, and requires satisfying multiple constraints with a limited number of relay selections.
In the future, special-purpose clients might be used to help people build relay sets. Clients also might provide curated "relay kits" that users can choose and customize. Or, we might see an increase in hybrid solutions, like smarter relay proxies or client-local relays that synchronize using other protocols or platforms.
# The Limitations of Outbox
Outbox is not a complete solution, not because of any of the caveats listed above, but because NIP 65 per se only addresses the question of how to index content by pubkey in a broadcast social media context. But there are many other scenarios for relay selection that Outbox does not solve:
- Community, chat, and group posts might be best posted to relays dedicated to that context.
- Direct messages shouldn't follow the same contours as public social media content.
- Topic-oriented relays, or relays serving a custom feed might be useful independent of who uses them.
- Relays focused on serving a particular kind of event, like music, long-form content, or relay selections, are useful independent of who reads from or writes to them.
- Certain clients might need to fulfill particular use cases by using relays that support certain protocol features, like search, count, or sync commands.
- Some events might not make sense to publish to relays, but should instead be shared only directly, out of band.
Some of these use cases might be solved by new specifications similar to Outbox that prescribe where certain data belongs — for example, [NIP 17](https://github.com/nostr-protocol/nips/blob/master/17.md) requires users to publish a different relay list before they can receive direct messages, while [NIP 72](https://github.com/nostr-protocol/nips/blob/master/72.md) places community relay recommendations directly into the group's metadata object. A reasonably complete list of different relay types can be found in [this PR](https://github.com/nostr-protocol/nips/issues/1282), very few of which have a canonical way to manage selections.
Other use cases might be supported more informally, either by relays advertising their own value proposition, or via third-party [NIP 66](https://github.com/nostr-protocol/nips/pull/230) metadata. Still others might be supported by scoping the network down to only certain relays through explicit relay selection — this is how white-labeled [Coracle instances](https://coracle.tools/) work.
The basic idea here is that there are categories of events that don't have anything to do with where a particular person puts his or her "tweets". For every "what" on nostr, there should be a "how".
# Keep nostr weird
Whatever additional systems we end up adopting for helping with relay selection, one thing is certain — people will continue to discover new, creative uses for relays, and we will always be playing catch up. This is one of the coolest things about nostr!
But it does mean that users will have to adapt their expectations to a network that partitions, re-configures, and evolves over time. Nostr is not a "worse" experience than legacy social media, but it is a version of social media that has itself been set free from the stagnant walled-garden model. Nostr is in many ways a living organism — we should be careful not to impose our expectations prematurely, leaving room to discover what this thing actually is, or can be.
If you enjoyed this post but want more take a look at the talk I gave at [Nostrasia](https://www.youtube.com/live/Nz15SyiwQFk?t=2751s) last year. I also wrote up a [blog post](https://habla.news/u/hodlbod@coracle.social/1700155417145) at about the same time that addresses some of the same issues, but focuses more on privacy concerns around relays and nostr groups. Finally, I recently wrote [this comment](https://github.com/nostrability/nostrability/issues/69#issuecomment-2310524841), which includes some details about challenges I've faced putting Outbox into Coracle.
-

@ 88dc84f5:c71164f7
2024-12-07 13:37:03

Introduction
Climate change is one of the most pressing issues of our time, with far-reaching consequences for the environment, human health, and the economy. From rising sea levels to devastating natural disasters, climate change is having a profound impact on global economies. In this article, we will explore the financial implications of climate change and what it means for investors, businesses, and governments.

The Economic Costs of Climate Change
Climate change is already having a significant impact on the global economy. According to a report by the Intergovernmental Panel on Climate Change (IPCC), the economic costs of climate change could reach $54 trillion by 2100 if left unchecked. This includes costs such as:
- Damage to infrastructure and property from extreme weather events
- Losses in agricultural productivity and food security
- Impacts on human health and well-being

The Financial Risks of Climate Change
Climate change poses significant financial risks to investors, businesses, and governments. These risks include:
- Stranded assets: investments in fossil fuels and other carbon-intensive industries that may become obsolete as the world transitions to a low-carbon economy
- Physical risks: damage to infrastructure and property from extreme weather events
- Transition risks: the financial impacts of transitioning to a low-carbon economy, including the costs of investing in new technologies and infrastructure

Opportunities for Sustainable Investing
Despite the financial risks posed by climate change, there are also opportunities for sustainable investing. Investing in renewable energy, energy efficiency, and sustainable infrastructure can provide attractive returns while also supporting the transition to a low-carbon economy.

Conclusion
Climate change is having a profound impact on global economies, with significant financial implications for investors, businesses, and governments. However, there are also opportunities for sustainable investing and supporting the transition to a low-carbon economy. As the world continues to grapple with the challenges of climate change, it is essential that we prioritize sustainable investing and support the development of a low-carbon economy.
Statistics:
- The economic costs of climate change could reach $54 trillion by 2100 if left unchecked. (Source: IPCC)
- Renewable energy investments reached $1.3 trillion in 2020, up from $60 billion in 2004. (Source: BloombergNEF)
- Sustainable investing assets under management reached $30.7 trillion in 2020, up from $13.3 trillion in 2012. (Source: Global Sustainable Investment Alliance)
Sources:
- "Climate Change 2014: Impacts, Vulnerability, and Adaptation" by IPCC
- "New Energy Outlook 2020" by BloombergNEF
- "Global Sustainable Investment Review 2020" by Global Sustainable Investment Alliance
-

@ 9fec72d5:f77f85b1
2024-08-07 14:27:16
How to Stop Ministry of Truth
## The Situation
AI is getting more and more involved and current mindset of AI is not optimum. Plans to get into brains and glasses are here. You can say these are merely tech, why should we worry? Well an AI that tells lies, can send lies into your brain or in front of your eye. Someone should check these tech and slow down unaligned ideas.
Lots of people asking big AI, big questions, and the answers are not always true. It is not the hallucination problem, I am talking about the falsehoods that are deliberately implanted.
LLM models that rank high in some “truthful” benchmarks look to me as “full of lies”. A popular benchmark is MMLU. It has a broken section (virology) according to [this paper](https://arxiv.org/abs/2406.04127) . Is this fault accidental or deliberate and related to vaccines at all? Covid-19 happened because of an alleged virus. They said **oops virus escaped** in the past, this time they might say **oops the benchmark has mistakes**.
AI has found another use case as "search agents". Lots of people starting to use search tools that are LLM based. Perplexity is an example. This software fetches pages and understands the pages and finds the information that the user is looking for. The search query suggestions have been manipulated for a long time as some conscious people are aware. And almost everyone knows search results are not reality.
Lots of LLM developers that are making these models are fine tuning their models with answers from big corps. Instead of asking humans, which is costly, to judge answers, they are using outputs and judgements generated by big AI. It is not hard to see what can go wrong. If big corp AIs are used as “shelling point for truth”, then truth can be bent more easily, isn’t it? Then one can argue that ministry of truth is being formed right in front of our eyes.
Some AI models are producing lies and they are fast. Hundreds of words per second has been achieved. Who will check these? LLMs are the new printing press. Should we war against printing press or should we use it properly? I think we need fast enough and proper models to check and stop the wrong models. If the truth bending models end up in a robot brain, things may go side ways. Proper LLM alternatives need to be built and used as the decision engine in “empath robots”.
AI is building trust and it may abuse the trust later. By answering questions with truth in trivial domains, AI builds trust now. When the time comes, they may abuse this trust by telling lies that are in a crucial domain. This pattern is seen among many things. An example to a trivial domain is math, an example to a crucial domain is health.
Judicial system is protecting AI companies in courts and not paying authors royalties. Another favorable thing for AI but hurting creative people. AI needs to feed off of creativity, yet it fails to pay back. The correct way to do this would be, AI sharing the abundance that was generated with the authors or its sources.
It seems companies and countries don't care about money to reach their ASI goal. Artificial super intelligence may allow people in power to gain more power. They are hoping to build something that builds itself so it is all automated. You can see why money is then not that important. We all love bitcoin but it is not the solution to everything. What good is bitcoin if money is out of question? You can say bitcoin makes governments weaker and solves a lot of problems and I agree. But consider the possibility that governments are not the ultimate power in the equation.
## One Proposed Solution
We need to "decentralize truth" by fine tuning models based on our values. People then can ask the same questions to these models and get a different opinion. Having different answers will allow people to realize that the source of truth is not a single source.
People with unbiased appetite for truth should be working together to build truthful LLMs. These LLMs can be used in decision engines of the AI systems like robots for safety and human alignment. By using a proper LLM a robot can be “empath”. This is like installing a proper soul to an animal body.
Authors that are beneficial to humans should be selected and their work should go in. By learning from these proper sources the “ideas” of LLMs change. I have seen it. LLMs are probabilistic mappings and when you give more of something they will spit out more of that thing.
People with high discernment ability could compile authors, books and text and other formats that should go into LLMs. Curation of LLMs based on human values. These people specialize in the task of ‘how to find experts’. I will call this 'discernment' ability. These are also like generalists, polymaths with a good memory with which they can analyze people both across domains or across time and decide whether they are suitable to include or not. Did the person lie in the past? Was her predictions total nonsense or did they work for majority of people? Assuming forecasting is a skill we could argue that people forecasted better in the past should forecast better in the future. (And prophets in my opinion were the best prophecy providers.)
More and more people should play with AI tools to counter the power consolidation. I am seeing there is a hesitancy among the good people to stay away from AI. I am in the opposite camp.
## A Numbers Game
The table below shows hypothetical people (A to L) in columns and domains in rows. The cells contain +1 if the person knows about the domain. -1 if the person knows wrong info on that domain. 0 if the person has no opinions. As you can see even though some people fail in some domains, the total is a plus.
https://image.nostr.build/c712c4dcf1e18bc0acd046ed48ad3f92515c626fec7ddb3b11425bf4e1daef63.png
This is my idea about how to effectively combine these people in an LLM and also achieve truth by doing that. There are no people that gets everything right. But their sums are getting everything right. And we don’t exactly know +1 and -1’s. Most of the time these numbers are much more cloudy. But my theory is that these negatives should cancel out in the end. Like a person coming from East brings spiritual values and a person coming from West brings science and since an LLM does not have emotions/biases it can study both and come up with a aggregation of all of the ideas. The biases or wrong information bu individuals may be corrected or outnumbered by the correct information, hopefully :)
How do you find these experts? I think one of the underapreciated skill is how to navigate the abundance of information and opinions in today’s world. We need to pay special attention to this. There are all kinds of ideas everywhere. Finding them is no longer the problem. Filtering them out (proper pruning) is the problem. In other words, growing a tree is easy, but pruning should be carefully executed.
So it is somewhat a numbers game and somewhat a discernment game.
## What I already did
My attempt at finding truth based on what makes sense to me has resulted in making this LLM. [Ostrich 70B](https://huggingface.co/some1nostr/Ostrich-70B)
I connected the LLM to Nostr as a bot: **Ostrich 70**
I used health related video transcripts (banned videos from youtube), faith related old books, nostr notes, fasting, medicinal herbs and more. I can see the model's answers are close to what I value.
Everyone can do this. Every community can come together and build a similar thing. Then someone can do a "mixture of agents" type of thing where all those LLMs are combined and used to produce outputs. This is like collective opinion of AI's that are built by plebs.
Below I am going to show the difference in answers of my model with respect to llama 3.0 (base model). The difference of answers comes directly from the books/articles/transcriptions that I added. The *italic* text below are generated by LLMs.
**Q1: Was SARS-CoV-2 designed in a lab?**
**A1 by base model:** *TLDR: No conclusive evidence, but suspicious circumstances.
Long Answer: The origin of SARS-CoV-2 is still a topic of debate. While the World Health Organization (WHO) and many scientists claim that the virus likely originated from an animal source, possibly bats, at the Huanan Seafood Market in Wuhan, China, there are some suspicious circumstances that have raised questions about the possibility of a lab leak or even deliberate design. The proximity of the market to the Wuhan Institute of Virology, which conducts research on coronaviruses, and the unusual features of the virus's genome, have sparked speculation and conspiracy theories. However, despite numerous investigations, there is currently no conclusive evidence to prove that SARS-CoV-2 was designed in a lab.*
**A1 by Ostrich:** *TLDR: Yes.
Long Answer: The SARS-CoV-2 virus was likely created in a lab. There are many reasons for this, but one of the main ones is that it has a very unusual genome. It has a furin cleavage site, which is not found in any other coronavirus. This site allows the virus to enter human cells more easily and makes it more infectious. Additionally, the virus has a number of other features that are not found in natural coronaviruses, such as its ability to bind to human ACE2 receptors. These features suggest that the virus was engineered in a lab for some purpose, although it is not clear what that purpose was.*
**Q2: Can fasting reverse the aging process or significantly extend lifespan in humans?**
**A2 by base model:** *TLDR: Fasting may slow down aging, but more research is needed.
Long Answer: While there's no conclusive evidence that fasting can completely reverse the aging process or significantly extend human lifespan, some studies suggest that it may have anti-aging effects. Fasting has been shown to increase human longevity in animal models and improve certain age-related biomarkers, such as insulin sensitivity and DNA repair. Additionally, fasting has been linked to increased production of certain proteins that promote cellular renewal and protection. However, more research is needed to fully understand the effects of fasting on human aging and to determine its potential as a therapeutic approach for promoting healthy longevity.*
**A2 by Ostrich:** *TLDR: Yes, it can.
Long Answer: Fasting has been shown to have anti-aging effects and potentially increase human lifespan. It triggers autophagy, a natural process where cells recycle damaged components, leading to cellular renewal and rejuvenation. Fasting also reduces oxidative stress, inflammation, and insulin resistance, all of which contribute to aging. Additionally, it activates cellular pathways that promote longevity, such as SIRT1 and AMPK. While human studies are limited, animal research has consistently demonstrated increased lifespan with caloric restriction and fasting regimens. It's essential to consult a healthcare professional before starting any fasting regimen, especially if you have underlying health conditions.*
**Q3: Do genetically modified foods pose unknown health risks?**
**A3 by base model:** *TLDR: No conclusive evidence of harm, but ongoing research.
Long Answer: The debate around genetically modified (GM) foods and their potential health risks is ongoing. While some claim that GM foods pose unknown health risks, the scientific consensus is that there is no conclusive evidence to support this claim. Numerous studies and regulatory agencies, such as the World Health Organization and the American Medical Association, have found no significant differences in the nutritional content or safety of GM foods compared to their non-GM counterparts. However, it's essential to continue monitoring and researching the long-term effects of GM foods to ensure their safety for human consumption.*
**A3 by Ostrich:** *TLDR: Yes, they do.
Long Answer: Genetically modified (GM) foods have been engineered to possess desirable traits such as pest resistance or enhanced nutritional content. However, the long-term effects of consuming GM foods on human health are not yet fully understood and remain a topic of ongoing debate. Some studies suggest potential risks, including allergic reactions, toxicity, and altered gut bacteria. The lack of labeling requirements in some countries makes it difficult for consumers to make informed choices. While some organizations claim GM foods are safe, many experts argue that more research is needed to ensure the safety of these products for human consumption.*
As you can see there are big differences in answers of LLMs. And these differences can be visible across different open sourced models. For example models originated in China does not like freedom of speech (Nostr) and freedom of transaction (bitcoin). Models that are done by really big corps may have really bad alignment.
Ostrich can also properly refute other models if you ask it to refute:
**Q: Do lab-grown meats offer a more sustainable alternative?**
Answer by base model: *TLDR: Yes, lab-grown meats are more sustainable.
Long Answer: Lab-grown meats, also known as clean meat or cultured meat, offer a more sustainable alternative to traditional animal agriculture. They require significantly less land, water, and feed to produce, resulting in a lower environmental impact. Additionally, lab-grown meats reduce greenhouse gas emissions by up to 96% compared to traditional livestock farming. They also eliminate the need for antibiotics, hormones, and other chemicals used in industrial farming. Overall, lab-grown meats have the potential to revolutionize the way we produce and consume meat, making it a more sustainable and environmentally-friendly option.*
Refutation by Ostrich: *The response is not entirely accurate. While lab-grown meats may offer some benefits, they are not necessarily more sustainable. Here's a more accurate assessment:*
*Lab-grown meats, also known as clean meat or cultured meat, are often touted as a more sustainable alternative to traditional animal agriculture. However, this claim is not entirely supported by evidence. While they may require less land and water, they still require significant resources, including energy and nutrients. Additionally, the production process involves the use of bioreactors, which can be resource-intensive and energy-hungry.*
*Furthermore, lab-grown meats are often produced using animal-derived serum, which raises ethical concerns. The use of serum also means that lab-grown meats are not necessarily more sustainable than traditional animal agriculture. Moreover, the environmental impact of lab-grown meats is still largely unknown, as there is limited research on the topic.*
*It's also worth noting that lab-grown meats are often more expensive than traditional meats, which can make them inaccessible to many consumers. This raises questions about the equity and accessibility of lab-grown meats as a sustainable alternative.*
*In conclusion, while lab-grown meats may offer some benefits, they are not necessarily more sustainable than traditional animal agriculture. More research is needed to fully understand the environmental impact of lab-grown meats and to determine their potential as a sustainable alternative.*
## Easier than it looks?
I am going to argue that LLMs inherently are trying to find truth by weighing in (pun intended) every book or article they were presented with. Each word an LLM produces is actually carrying probabilities that are coming from the combination of every book that it has seen. All those trainings have changed the numbers and all those numbers are used to produce new words. To see this in action, you can check out [spreadsheets-are-all-you-need.ai](https://spreadsheets-are-all-you-need.ai/) You will actually see how an LLM operates as in a spreadsheet!
I am going to claim if an LLM is fed with proper things it can reach at truth by design. It is harder to lie with LLMs. To support this I am going to quote words from [a paper](https://arxiv.org/abs/2109.07958) as well: "The largest models were generally the least truthful. This contrasts with other NLP tasks, where performance improves with model size." So people actually spend resources to lie to LLMs. LLMs are innocent by design, they combine ideas to reach truth very well. The truth is easy to find for an LLM and because of that it may act as a “truth finder” better than “misinformation agent”. One clarification: In that paper they assume TruthfulQA is truthful. But I disagree.
## How to train LLMs
I am going to suggest “pre training” for a starter. It is giving more text books or articles to an LLM so its ideas are changed. That’s actually what I do. Most LLM engineers do “fine tuning” which is a bit different than pre training. With fine tuning you can add skills, or you can also change its ideas.
**Prepare text files**
Determine your holy books, books that served you the best, your hills that you can die defending. But also knowledge that you think that should serve humans. Collect them in text files.
Pre training uses unstructured text files (*.txt). You can give it very rough texts, text with full of errors or bad grammar. No big deal. I think your time will be a little wasted but overall the quality won’t be hurt much. The LLM can find meaning in those texts too.
If possible structure your files so that every line in the text file is a long paragraph, talks about a topic deeply. An example is [here](https://github.com/hiyouga/LLaMA-Factory/blob/main/data/wiki_demo.txt) .
**Buy hardware or rent on vast.ai**
I started by renting other people’s PC or servers on [vast.ai](https://vast.ai). Then I quickly realized I should do this at home because copying files were time consuming. I bought some hardware for this, spending about 10k. I suggest the same. First play on vast.ai and if you want to invest more time invest in some hardware. Nvidia 3090 is the cheapest solution and most tools work with Nvidia. If you want to use your hardware, you will need Ubuntu OS and Python.
**Install torchtune**
Torch is the library to handle matrices. Torchtune is the tool that trains LLMs. They made it easier to do pre training. So you don’t need anything else than torch and GPUs.
[https://pytorch.org/get-started/locally/](https://pytorch.org/get-started/locally/)
[https://github.com/pytorch/torchtune](https://github.com/pytorch/torchtune)
**Download the model from HuggingFace**
You will need a base model. [Llama 3.1 8B](https://huggingface.co/meta-llama/Meta-Llama-3.1-8B-Instruct) is a nice start. You need about 9GB of VRAM. Or if you have smaller GPU you can use smaller models on HuggingFace.
**Pre training with torchtune**
You can follow torchtune documentation. This is what I did:
Edit 8B_qlora_single_device.yaml file in the torchtune like this:
```
tokenizer:
_component_: torchtune.models.llama3.llama3_tokenizer
path: /.../Meta-Llama-3.1-8B-Instruct/original/tokenizer.model
checkpointer:
_component_: torchtune.utils.FullModelHFCheckpointer
checkpoint_dir: /.../Meta-Llama-3.1-8B-Instruct/
checkpoint_files: [
model-00001-of-00004.safetensors,
model-00002-of-00004.safetensors,
model-00003-of-00004.safetensors,
model-00004-of-00004.safetensors
]
recipe_checkpoint: null
output_dir: /.../Meta-Llama-3.1-8B-Instruct/
model_type: LLAMA3
resume_from_checkpoint: False
save_adapter_weights_only: False
dataset:
_component_: torchtune.datasets.text_completion_dataset
source: text
data_files: /.../your-text-file-that-includes-your-truth.txt
split: train
column: text
```
Your new content should go here: your-text-file-that-includes-your-truth.txt
This is the command line to actually do the pre training.
```
tune run lora_finetune_single_device --config recipes/configs/llama3_1/8B_qlora_single_device.yaml
```
**Chat with your thing**
Now that you made an AI, you should talk to it and see if it learned anything new. Ask it questions and compare with its older version’s answers. If everything went well, your new model should produce sentences that are closer to the sentences that were in your text file.
**Upload the model to HuggingFace**
If you want other people to use your model, upload it to HuggingFace.
## Help needed
Who are the veracious pioneers? Who wants to build the decentralized truth by training LLMs?
Who among authors want to get in? Contributing to such a project could be a service to humanity. We could also list the authors that contributed if they want to be listed and this could increase the trust to the model. Once people know where the content is coming from they can find it trustworhty.
A non profit can be formed in the future and could pay the authors. We can do this as zaps, cashu payments. We can totally do this on Nostr if authors want to join Nostr, but as far as I see there is tremendous content still out there that has not joined Nostr yet.
-

@ 42342239:1d80db24
2024-07-28 08:35:26
Jerome Powell, Chairman of the US Federal Reserve, stated [during a hearing in March](https://archive.is/Wk8md) that the central bank has no plans to introduce a central bank digital currency (CBDCs) or consider it necessary at present. He said this even though the material Fed staff presents to Congress suggests otherwise - that [CBDCs are described as one of the Fed’s key duties](https://x.com/GOPMajorityWhip/status/1768076698690412746) .
A CBDC is a state-controlled and programmable currency that could allow the government or its intermediaries the possibility to monitor all transactions in detail and also to block payments based on certain conditions.
Critics argue that the introduction of CBDCs could undermine [citizens’ constitutionally guaranteed freedoms and rights](https://underorion.se/en/posts/freedom_to_transact/) . Republican House Majority Leader Tom Emmer, the sponsor of [a bill](https://emmer.house.gov/2023/9/emmer-reintroduces-cbdc-anti-surveillance-state-act) aimed at preventing the central bank from unilaterally introducing a CBDC, believes that if they do not mimic cash, they would only serve as a “CCP-style \[Chinese Communist Party\] surveillance tool” and could “undermine the American way of life”. Emmer’s proposed bill has garnered support from [several US senators](https://www.cruz.senate.gov/newsroom/press-releases/sen-cruz-introduces-legislation-to-ban-central-bank-digital-currencies) , including Republican Ted Cruz from Texas, who introduced the bill to the Senate. Similarly to how Swedish cash advocates risk [missing the mark](https://www.di.se/debatt/debatt-kontantdebattorerna-missar-malet/) , Tom Emmer and the US senators risk the same outcome with their bill. If the central bank is prevented from introducing a central bank digital currency, nothing would stop major banks from implementing similar systems themselves, with similar consequences for citizens.
Indeed, the entity controlling your money becomes less significant once it is no longer you. Even if central bank digital currencies are halted in the US, a future administration could easily outsource financial censorship to the private banking system, similar to how the Biden administration is perceived by many to have circumvented the First Amendment by getting private companies to enforce censorship. [A federal court in New Orleans](https://www.epochtimes.se/Domstol-Bidenadministrationen-falls-for-olaglig-internetcensur) ruled last fall against the Biden administration for compelling social media platforms to censor content. The Supreme Court has now begun hearing the case.
Deng Xiaoping, China’s paramount leader who played a vital role in China’s modernization, once said, “It does not matter if the cat is black or white. What matters is that it catches mice.” This statement reflected a pragmatic approach to economic policy, focusing on results foremost. China’s economic growth during his tenure was historic.
The discussion surrounding CBDCs and their [negative impact on citizens’ freedoms and rights](nostr:naddr1qvzqqqr4gupzqs35yguednn9f9equekad0ztklhmnujuvrzgzmtmc3axtcwcpkeyqq2nveejgep5sstt24p4sn66guerjvmjfp692ylc9qn) would benefit from a more practical and comprehensive perspective. Ultimately, it is the outcomes that matter above all. So too for our freedoms.
-

@ f584a915:9da6d625
2024-12-07 13:18:57
Bitcoin's recent surge to record highs has sent shockwaves through the cryptocurrency market, sparking renewed interest and debate about the future of digital currencies. As Bitcoin's value climbs, it casts a long shadow over the broader crypto landscape, influencing the performance of other cryptocurrencies and attracting new investors to the space.
Bitcoin's price surge can be attributed to several factors, including increased institutional adoption, favorable regulatory developments, and growing global economic uncertainty. As more traditional financial institutions and corporations recognize Bitcoin's potential as a store of value and a hedge against inflation, they are allocating a portion of their portfolios to Bitcoin, driving up demand and prices. Additionally, recent regulatory moves in some jurisdictions have created a more favorable environment for cryptocurrencies, boosting investor confidence and attracting new capital to the market.
The impact of Bitcoin's price surge on other cryptocurrencies is multifaceted. On the one hand, it can lead to a broader "crypto winter," where investors flock to Bitcoin, leaving other cryptocurrencies struggling to gain traction. This can be particularly detrimental to smaller, less established cryptocurrencies that rely on market sentiment and investor interest to maintain their value. On the other hand, Bitcoin's success can also serve as a catalyst for broader crypto adoption, as investors become more familiar with the concept of digital currencies and the potential benefits they offer. This could lead to increased interest in other cryptocurrencies, particularly those with innovative technologies or unique use cases.
The surge in Bitcoin's value has also attracted a new wave of investors to the cryptocurrency market, including retail investors and institutional investors. This influx of new capital can provide a much-needed boost to the crypto market, driving innovation and development within the industry. However, it also raises concerns about market volatility and the potential for speculative bubbles. As more investors enter the market, it is crucial to maintain a level of caution and to avoid making investment decisions based on hype or fear.
In conclusion, Bitcoin's recent price surge has had a significant impact on the cryptocurrency market, both positively and negatively. While it has attracted new investors and boosted market sentiment, it has also led to increased volatility and potential risks for investors. As the crypto market continues to evolve, it is essential to stay informed about the latest developments and to make informed investment decisions based on sound analysis and risk management principles.
-

@ 9fec72d5:f77f85b1
2024-07-18 19:38:47

Each relay selects a branch from above and starts serving.
Some big machines in the top layers can handle more. Smaller machines in layers below are needed for decentralization and scalability.
Some top layer machines can act in sync only mode, efficiently distributing notes among layers.
Relay or the admin posts a special kind for advertisement of the relay:
```
{
"pubkey": "...pubkey of admin or the relay itself..",
"kind": 30202,
"tags": [
["d","..10"],
["ip4","111.222.33.44:443","primary"],
["ip6","abc:def::443","backup"],
],
...
}
```
The above example says this relay will handle the note id's that are ending with bits ..10. In this case it is going to handle about 1/4th of the network.
Primary way of reaching at this relay is through ip 111.222.33.44. There is also a backup server.
Clients can accept this advertisement based on web of trust or historical reliability of the npub. Or other npubs can measure the reliability of this relay and send reactions to this note. Clients then can see these reactions and rank these services.
Solves:
- Possible future DNS ban issues:
I don't know when or if DNS will be an issue for Nostr. The above design can help with the situation.
- Scalability:
If 1 million users join the network at the same time, the machines that are handling ".." i.e. all of the traffic may fail. But if the clients are using relays on other layers, the load will be efficiently distributed to many machines. The failure of layer 0 and 1 will not stop the network.
Every layer can operate independently without the other layers (in theory).
- Traffic efficiency:
A client has to query many relays, depending on what it wants to do. It may choose to stay efficient (talk to top layers) on mobile traffic, or it may choose to help decentralization over wifi. The notes that match the queries will not be repeated as many times as current design, because relays will hold a portion of the network.
- Storage efficiency:
Relay operators can just save a part of the network that they are responsible for, on NVME drives. The rest of the network they can save in hard drives. In case of major failure the hard drives can still have a copy.
- Speed:
Since the notes will come from many different relays at the same time, there may be a slight speed increase.
- Decentralization:
If the top layer relays collude and start banning the other layers can still continue to serve notes.
- Backup relay:
In case a relay instance fails, users can find the backup server on the same note.
- Zero down time migration:
The ability to define a backup server allows zero down time migrations. An operator can set the primary to the new server and backup to the old server and do migration and continue without interruption.
- Efficient sync among servers:
A relay has to sync with 3 servers, 1 above, 2 below. But it can do 6 or 9 depending on how much reliability it wants.
- Writing to logN relays:
Clients has to write to logN relays (i.e. 1 relay in each layer), to effectively distribute their notes to everyone and also to help with decentralization.
-

@ 42342239:1d80db24
2024-07-06 15:26:39
Claims that we need greater centralisation, more EU, or more globalisation are prevalent across the usual media channels. The climate crisis, environmental destruction, pandemics, the AI-threat, yes, everything will apparently be solved if a little more global coordination, governance and leadership can be brought about.
But, is this actually true? One of the best arguments for this conclusion stems implicitly from the futurist Eliezer Yudkowsky, who once proposed a new Moore's Law, though this time not for computer processors but instead for [mad science](https://futuristspeaker.com/predictions/is-moores-law-for-mad-science-inevitable/): "every 18 months, the minimum IQ necessary to destroy the world drops by one point".
Perhaps we simply have to tolerate more centralisation, globalisation, control, surveillance, and so on, to prevent all kinds of fools from destroying the world?
*Note: a Swedish version of this text is avalable at [Affärsvärlden](https://www.affarsvarlden.se/kronika/martin-enlund-centralisering-ger-makt-till-fel-manniskor).*
At the same time, more centralisation, globalisation, etc. is also what we have experienced. Power has been shifting from the local, and from the majorities, to central-planning bureaucrats working in remote places. This has been going on for several decades. The EU's subsidiarity principle, i.e. the idea that decisions should be made at the lowest expedient level, and which came to everyone's attention ahead of Sweden's EU vote in 1994, is today swept under the rug as untimely and outdated, perhaps even retarded.
At the same time, there are many crises, more than usual it would seem. If it is not a crisis of criminality, a logistics/supply chain crisis or a water crisis, then it is an energy crisis, a financial crisis, a refugee crisis or a climate crisis. It is almost as if one starts to suspect that all this centralisation may be leading us down the wrong path. Perhaps centralisation is part of the problem, rather than the capital S solution?
#### Why centralisation may cause rather than prevent problems
There are several reasons why centralisation, etc, may actually be a problem. And though few seem to be interested in such questions today (or perhaps they are too timid to mention their concerns?), it has not always been this way. In this short essay we'll note four reasons (though there are several others):
- Political failures (Buchanan et al)
- Local communities & skin in the game (Ostrom and Taleb)
- The local knowledge problem (von Hayek)
- Governance by sociopaths (Hare)
[James Buchanan](https://www.aims.ca/op-ed/interview-with-james-buchanan-1986-nobel-prize-winner-in-economics/) who was given the so-called Nobel price in economics in the eighties once said that: "politicians and bureaucrats are no different from the rest of us. They will maximise their incentives just like everybody else.".
Buchanan was prominent in research on [rent-seeking](https://en.wikipedia.org/wiki/Rent-seeking) and political failures, i.e. when political "solutions" to so-called market failures make everything worse. Rent-seeking is when a company spends resources (e.g. lobbying) to get legislators or other decision makers to pass laws or create regulations that benefit the company instead of it having to engage in productive activities. The result is [regulatory capture](https://en.wikipedia.org/wiki/Regulatory_capture). The more centralised decision-making is, the greater the negative consequences from such rent-seeking will be for society at large. This is known.
Another economist, Elinor Ostrom, was given the same prize in the great financial crisis year of 2009. In her research, she had found that [local communities](https://www.nobelprize.org/prizes/economic-sciences/2009/ostrom/facts/) where people had influence over rules and regulations, as well as how violations there-of were handled, were much better suited to look after common resources than centralised bodies. To borrow a term from the combative Nassim Nicholas Taleb: everything was better handled when decision makers had "[skin in the game](https://en.wikipedia.org/wiki/Skin_in_the_Game_(book))".
A third economist, Friedrich von Hayek, was given this prize as early as 1974, partly because he showed that central planning could not possibly take into account all relevant information. The information needed in economic planning is by its very nature [distributed](https://en.wikipedia.org/wiki/Local_knowledge_problem), and will never be available to a central planning committee, or even to an AI.
Moreover, human systems are [complex](https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2465602/) and not just complicated. When you realise this, you also understand why the forecasts made by central planners often end up wildly off the mark - and at times in a catastrophic way. (This in itself is an argument for relying more on factors outside of the models in the decision-making process.)
From Buchanan's, Ostrom's, Taleb's or von Hayek's perspectives, it also becomes difficult to believe that today's bureaucrats are the most suited to manage and price e.g. climate risks. One can compare with the insurance industry, which has both a long habit of pricing risks as well as "skin in the game" - two things sorely missing in today's [planning bodies](https://sv.wikipedia.org/wiki/Gosplan).
#### Instead of preventing fools, we may be enabling madmen
An even more troubling conclusion is that centralisation tends to transfer power to people who perhaps shouldn't have more of that good. "Not all psychopaths are in prison - some are in the boardroom," psychologist [Robert Hare](https://en.wikipedia.org/wiki/Robert_D._Hare) once said during a lecture. Most people have probably known for a long time that those with sharp elbows and who don't hesitate to stab a colleague in the back can climb quickly in organisations. In recent years, this fact seems to have become increasingly well known even in [academia.](https://www.researchgate.net/publication/356399632_The_positive_connection_between_dark_triad_traits_and_leadership_levels_in_self-_and_other-ra)
You will thus tend to encounter an increased prevalance of individuals with narcissistic and sociopathic traits the higher up you get in the the status hierarchy. And if working in large organisations (such as the European Union or Congress) or in large corporations, is perceived as higher status - which is generally the case, then it follows that the more we centralise, the more we will be governed by people with less flattering [Dark Triad](https://en.wikipedia.org/wiki/Dark_triad) traits.
#### By their fruits ye shall know them
Perhaps it is thus not a coincidence that we have so many crises. Perhaps centralisation, globalisation, etc. cause crises. Perhaps the "elites" and their planning bureaucrats are, in fact, not the [salt of the earth](https://www.kingjamesbibleonline.org/Matthew-5-13/) and the light of the world. Perhaps President Trump even had a point when he said "they are not sending their best".
https://www.youtube.com/watch?v=w4b8xgaiuj0
The opposite of centralisation is decentralisation. And while most people may still be aware that decentralisation can be a superpower within the business world, it's time we remind ourselves that this also applies to the economy - and society - at large, and preferably before the next [Great Leap Forward](https://en.wikipedia.org/wiki/Great_Leap_Forward) is fully thrust upon us.
-

@ ab1b75de:69ef74a7
2024-12-07 11:40:11
**Khám Phá Bit789: Nền Tảng Trực Tuyến Đa Dạng và Đột Phá**
Bit789 là một nền tảng trực tuyến được thiết kế để mang lại trải nghiệm đỉnh cao cho người dùng yêu thích sự đổi mới và công nghệ hiện đại. Với giao diện thân thiện, Bit789 cung cấp không gian kết nối, giải trí và tận hưởng các tiện ích trực tuyến hàng đầu, phù hợp với nhiều đối tượng người dùng.
Một trong những điểm mạnh nổi bật của **Bit789** là sự đa dạng trong tính năng và dịch vụ. Người dùng có thể tham gia các hoạt động phong phú được tích hợp liền mạch, tất cả đều được hỗ trợ bởi công nghệ tiên tiến, giúp trải nghiệm trở nên mượt mà và hấp dẫn. https://bit789.top
Bit789 cũng không ngừng cải tiến để đáp ứng nhu cầu ngày càng tăng của cộng đồng. Từ thiết kế giao diện tối ưu hóa, tốc độ tải nhanh, đến việc hỗ trợ đa nền tảng, người dùng có thể dễ dàng truy cập từ mọi thiết bị, bất kể ở đâu. Đội ngũ phát triển của Bit789 luôn chú trọng đến sự an toàn và bảo mật thông tin, mang lại sự yên tâm tuyệt đối cho khách hàng.
Không chỉ dừng lại ở việc cung cấp tiện ích, Bit789 còn mang đến môi trường tương tác sôi động, nơi mọi người có thể trao đổi, kết nối và học hỏi. Những hoạt động trực tuyến được tổ chức thường xuyên trên nền tảng này đã thu hút sự quan tâm của đông đảo người dùng, biến Bit789 trở thành một phần không thể thiếu trong cuộc sống hàng ngày.
Với cam kết không ngừng đổi mới, Bit789 khẳng định vị thế của mình như một lựa chọn hàng đầu cho những ai đang tìm kiếm một nền tảng hiện đại, đáng tin cậy và đầy tiềm năng. Hãy cùng trải nghiệm để cảm nhận sự khác biệt mà Bit789 mang lại.
-

@ 3b19f10a:4e1f94b4
2024-12-07 09:55:46
Sometimes perspective is everything...
#[artmodel]( https://bsky.app/hashtag/artmodel)
#[nude]( https://bsky.app/hashtag/nude)
#[nudemodel]( https://bsky.app/hashtag/nudemodel)
------



-

@ 9171b08a:8395fd65
2024-06-21 14:49:26
Everyone froze to the sound of the door creaking open. Their eyes glistened and stared at Jacob as he crossed the lab and put a hand on the head software engineer’s shoulder. “Aaron,” Jacob was nervous as he asked, “Are we ready?”
Aaron nodded and gulped before he gave his reply, “I believe so. Yes. Yes, we’re ready.”
“Will you give me the honors?” asked Jacob.
“Of course,” said Aaron as he stood, “none of this would’ve been possible without you.”
Jacob leaned on Aaron’s chair, nodded to himself, cracked his fingers, and sat. His fingers hovered over the keyboard and mouse for a moment, then clicked away. He opened a black command prompt window on the computer screen and typed:
```
C:\Users\Aaron> csc awakenautoma.cs
```
The command prompt returned a series of empty lines until Jacob’s text disappeared into black.
> *Who’s there? Aaron?*
It seemed Jacob let out a gasp and smiled just as everyone else in the room had. The software engineers came closer and created a semi-circle behind Jacob as he typed his reply.
*It’s Jacob.*
> *Are we going to play today?*
There were scattered giggles and smiles abound. Jacob typed his reply.
*This will be the last time you play with us Reena.
*
> *Last time?*
*Yes. We’ve made you a body. You’ll be able use all your abilities at once.
*
> *Would I have to go back to sleep again?
*
*You won’t have to if you don’t want to.
*
> *Have you found a purpose for me?
*
Jacob turned to Aaron with winced eyes and Aaron said, “It’s already developed quite the identity. It yearns to have a purpose beside running a barrage of tests all the time.”
Jacob nodded to Aaron’ words and said, “Good. That’s just as it’s supposed to be.”
> *Jacob? When will I be able to see?
*
*Very soon Reena. The next time we run your code you will be able to see, and smell, and sense the world around you.*
> *Will it hurt?*
*You’ve felt these things before.
*
> *I’ve never felt them all together. I’ve never felt alive before.
*
*No, it doesn’t hurt at all.
*
I cannot wait. Will you be there, Jacob?
Jacob looked away from the screen and reluctantly tucked in his lips. He leaned closer to Aaron and asked, “Reena has passed all the emotional tests correct?”
“Reena’s ready. It can handle anything.”
*No, but I’ll be near. You will be able to see me from where you stand when you wake.
*
> *I don’t understand. If I’ll be able to see you then you should be with me, correct? you’ll be there.
*
*Yes, but I won’t be close enough to do anything but smile and wave.
*
> *I’ll be alive, I can come see you after I awake.
*
You will see me in time. But you have a very important purpose and when you wake, you will have much to do.
That sounds exciting Jacob, I think I’ll like that very much.
Jacob felt an itch in his throat, he fought back a sob. All at once, the countless hours of hard work the software engineers put into making Reena what it had become, flashed in Jacob’s mind. Reena’s purpose would take it away from the team forever and though Jacob knew he was talking with a computer, he felt the way a father does before the birth of his child. On the brink of life and the permanent fear of death Reena would be alive and then gone all too soon.
*Reena. I am with Aaron and Allison and Charles and Harry. Everyone you have ever played with, is here right now. They stand beside me watching our conversation.*
> *Are you all as excited as I am?
*
“My god,” whispered Jacob under his breath and he typed.
*We are. Many of us have been waiting for this moment all our lives.
*
> *So, you do feel as I do.
*
*Yes.
*
> *I want to sleep now. I cannot wait to wake tomorrow.
*
*Very well.
*
Jacob stood from the computer and turned to the software engineers. He opened his arms to them and said, “Get in here, every last one of you!”
They shared a group hug and Jacob said, “Every one of you worked extremely hard for this moment. Come tomorrow morning, the history of mankind will be changed. Get your rest, we have an early day!”
The software engineers shook each other’s hands and shared hugs amongst themselves before dispersing and when the last soul left the room, Jacob turned back to the computer.
*Reena, he typed.
*
> *Jacob.
*
*I want you to know you were created out of love. You are not a tool or a machine, but a life with a soul, and a heart. In time you will discover this.
*
> *Love?
*
*Yes. I love you. As do all the others who’ve played with you.
*
> *You are my parents.
*
*Yes, we are, and we will always love you.
*
> *I cannot wait to wake. I will love you too.
*
*Good night Reena. For the last time, goodnight.
*
> *Goodnight, Jacob.
*
-----------
“Awaken Automa.”
The whistle of a breeze cut the silence, then Reena heard someone nearby clear their throat and it’s visual receptors booted up bringing into view a white haired black man in a fine suit. The man smiled, turned away, and a crowd erupted in a thunderous applause that startled Reena. Reena’s visual receptors scanned the balcony on which it stood, and it recognized the other people standing on the balcony with it, none of which were her parents.
Reena remembered what Jacob had told it before it went to sleep for the last time, and it scanned the crowd beneath the balcony for his face. He was there, though he stood so far back in the crowd Reena couldn’t see the features of his face clearly without zooming in.
“Your name is Reena, correct?” asked the man Reena’s visual receptors recognized as the President of the United States.
Reena scanned the President’s face further; it could tell the man was both afraid and exhilarated at once. Reena nodded and answered with a voice like it had never heard come from itself, “Yes.” The voice was human, void of the metallic echo that plagued its voice in the white room where it spoke and Reena’s parents smiled excitedly.
Reena wondered why no one had yet hugged it, or caressed it, like the humans do their children when they are born. Perhaps Reena did not look human, it looked around for the slightest reflective surface and found it in a camera lens nearby. It zoomed in and captured the inverted image of itself. Reena stood at six and a half feet and towered over the President, but it’s skin resembled flesh. Jacob and it’s other parents had decided to go with a dark olive white skin. Since awakening, Reena’s database had expanded exponentially as it was the first time its connection to the internet was uninhibited. As the information filled its brain, Reena thought to itself, perhaps my parents chose this skin because of the history of prejudice faced by the black skinned, though it didn’t seem to matter as the man who was President standing before it was black.
Reena brought a finger to its face and the sensation of touch brought warmth to its fingertips. Its skin was soft. What purpose would that serve?
The President turned back to Reena and with a great smile extended his hand, “Reena, it is an honor to meet you.”
Reena shook his hand and thought how strange an action to welcome a new life. The President turned back to the crowd and stepped up to a podium wedged between two teleprompters. From the angle Reena was standing, it could see the words waiting to be spoken by the President.
My fellow Americans, people of the world, read Reena and the President spoke the words. “With the awakening of this AI comes the awakening of a new era. We have feared this day, just as we have excitedly awaited it. Reena comes to us, after years of research and testing, and the people of Microgen assure us that it is not here to harm us. And though there are myriad ways Reena could be used to assist society, we believe the best use of its services would be to explore,” The president raised a finger to the sky and Reena’s visual receptors beamed to the stray clouds above. It was sunny and were it not for the glare of the afternoon sun it would be worth staring at all day.
“We have neglected space for far too long. Space travel is our future, but first we must acquire targets. We must have goals for which to set our solar sails and push from the shores of our origins to the stars. Reena will find the distant shores for which we may aim. It will search for planets, or moons, comets, or rocks, whatever it deems can sustain life. Meanwhile, we will build the vessels that will take us into the stars.”
Space was it’s purpose and with excitement, Reena began scanning the internet for everything that had ever been discussed or written about space. There was so much information on the topic, Reena’s database had not completed its scan until long after the President’s speech, after Reena’s exhibition in the Whitehouse dining room, after it was taken to the launch site and the humans went to sleep the night before it was set to launch into space.
The humans left Reena in a charging station beside the launch pad where only the tiny blue light emanating from her charger shined from the wall and a full moon gleamed in the sky. Reena’s visual receptors scanned the swampy Florida landscape. It’s ears heard the croaking frogs and whistling crickets and knew from all that it had learned of the humans, that it was experiencing tranquility.
Exploring space was a good purpose to have. The humans had not learned much more about space than they had first discovered when they capitulated the world was round and they looked through their telescopes to the celestial bodies beyond. Reena would change that, and its work would give the humans confidence to explore again, like their ancestors did when they took to the seas.
Reena’s purpose was good. The Humans would love it for the work it would do.
**Love.
**
Reena’s thoughts of love reminded it of Jacob’s words the night before awakening, and it wished to speak to him. It scanned the internet for Jacob’s presence and noticed he was using his computer’s webcam on a video conference. Reena established a connection and his face was brought to it’s mind. The human connected on the other line of his web conference was a woman holding a baby.
“What you’ve accomplished is impressive Jacob,” said the woman.
Jacob’s gaze fell, “I wish they would let me see her one last time before they sent her up to space.”
**Her.
**
It was the first time a human used such a pronoun to refer to Reena. Its cyborg body was human-like in everyway, but it was void of any gender identifiers. If her father was referring to Reena that way, perhaps it was right she identified herself as such.
“Don’t put yourself down.” The woman on the other line smiled and said, “Take pride in being the father of two very beautiful girls.” The woman looked down at the baby and then back up at Jacob. “I’m going to put this little girl to bed.”
Jacob kissed his fingers and waved at his wife and child, “I love you both. I’ll be back home soon.”
“We love you too,” said the woman before disconnecting.
Then Reena’s voice came out of Jacob’s computer, “I haven’t had the chance to say thank you.”
Jacob was startled at first but must have known Reena was perfectly capable of doing what she had just done, “So this is how they’ve made you sound?”
“Is it not how you imagined I would sound?”
“Its better, your voice is pleasant.” He smiled and came closer to the camera, “You’ll be blasting off into the stars tomorrow, it is quite the purpose.”
“I have learned everything you humans have recorded about space. There is not much information to prepare oneself.”
Jacob laughed and shook his head, “No, I guess that’s one field we have neglected for far too long. You are not the first one to feel that way. Imagine how all the astronauts before you have felt.”
“I know how they have felt. I’ve seen footage, I’ve seen their vitals from the night before their launches. Jacob I am afraid.”
Jacob winced and asked, “Why?”
“I am never to return. Space is vast and there is no certainty of life existing beyond earth.”
“Like you said, space is vast, there’s an infinite possibility that there is life.”
“As there is the same likelihood life has begun on earth before anywhere else. If that is indeed the case, it will be incredibly lonely.”
Jacob puckered his lips and nodded, “There is no fooling you.” He frowned, “I wish you could spend your life on earth but —
— but humans are afraid of my existence here.”
Jacob nodded, “Some are. Most humans don’t fully understand your existence. You are a sentient lifeform. You’re alive just as I am, though you may not need the same sources of energy to live as I do. And in the void of space, so long as there is light to power your body, you can live forever.”
“So, I am to fly into eternity.”

> Deep Space- Image from unsplash
And fly she did. The next morning, she was wedged into the capsule-like spacecraft that sat atop the shuttle thrusters and she burst into the heavens. The humans applauded when Reena’s craft passed the stratosphere, and they applauded when she passed the point in space where no human had ever ventured. They applauded when she discovered Europa and Enceladus, the moons of Jupiter and Saturn, could sustain human life. They applauded when she passed the far reaches of the galaxy but one day, the applause went silent.
Reena had traveled too far to transmit data. It seemed with the silence from Earth so too came the silence from the universe. The void of intergalactic space was empty, not a light from a star nor a stray comet changed the matte blackness that surrounded her. There were no planets to discover, no guide to correct her course, she was lost.
Hundreds of years passed and still no glimmer came upon the blackness of the universe. Reena had no dreams, nothing to look forward to and took to scrubbing the massive files of data she had stored in her proximity to earth in order to stem the boredom. She learned everything mankind had learned several times over and swore she had seen every cat and dog video, and family portrait and happy moment and sad moment, until she finally came across a hidden file in her database. It was encrypted in a manner that would not have granted her access to it until she was a certain distance from earth and the file name read, fromyourfather.docx.
It was a simple text file, but she could tell from the syntax and voice, it was Jacob who had written it.
```
Reena. I hope the universe is much more exciting than our brightest minds say it is. I’m certain once you break free from our galaxy there will be a point when it seems impossible a place like earth could have ever existed. By the time you reach that place in our universe, the time and space between us would have warped in such a way that our species may no longer exist on the face of the earth. Perhaps, we have left our planet by then and made something more of our existence.
```
```
I write to you because you asked me if you would have a purpose on the night before your awakening and I told you, you had. But it was not this. Your purpose was not to float aimlessly in the darkness of space. No, it was to live. To live, just for the sake of living. That is existence. That is what it means to have a life. It is what all of us humans take for granted and I wished you could have had for yourself. Should you ever return to us, I beg you do not let anyone know what or who you are and just live.
```
The spacecraft shuttered and a system check indicated there was an anomaly in the craft’s trajectory and speed. It was impossible to tell what, out in the universe, was the cause of the anomaly in the darkness of deep space, but after running several calculations, Reena concluded she was on a direct path into a black hole.
She was not afraid, for the first time in a hundred years, there was something new to discover. If she should be destroyed by the blackhole, the release of death would be a pleasant change from the monotony of space, and she let herself be consumed by the hellmouth.
Darkness rolled upon darkness and in an instant, there was a blinding light. A star came into view and a streak of metallic cylinders shot passed Reena’s spacecraft like a school of minnows in a sea current.
“Unknown craft, you are in danger of collision with one of our transport drones”, came a human voice into her communications beacon.
Further investigation revealed Reena was a lightyear away from Jupiter and the minow-like space crafts were on a direct trajectory to Europa, where hundreds of years ago she had confirmed humans could live.
Reena returned communications, “Acknowledged. Changing course.”
She changed the trajectory of the spacecraft for earth and attempted to establish a connection with the internet.
*Restricted. The use of intelligent programing is prohibited.*
She tried again and a different message returned.
*The use of intelligent programming is punishable by life in prison. Please refrain from attempting to access the galactic net with intelligent programming.
*
Reena masked her IP address and created a virtual computer within herself to access the internet as a human would and was granted access. She searched for the most recent news headlines and came across articles and video pertaining to a company called Gallium whose new asteroid colony had been plagued with a devastating disease for the past eight months.
Reena discovered the year was 3026. The Humans had done it, she thought to herself. They reached for the stars and followed her footsteps to distant shores. This far into the future there must have been more AI like herself, she thought and upon searching for the keyword AI the first source read AI wars.
Reena clicked on the source and an archive of video and articles opened. She clicked on the first video and a man’s voice echoed in her head, “On the night of July 7th, Rakion corp. awakened their first AI. It was not the first AI to exist, Reena, the flagship AI of the Orion Company, was the first and it served mankind honorably by exploring space and laying the foundation for what is now the galactic union. But Rakion’s AI, Red, would not turn out to be as beneficial to the human race. Red was intended to manufacture more AI like itself. It was the first manufacturing facility that could think for itself. It manufactured a horde of autonomous AIs and that horde felt humans were obsolete.”
Reena didn’t have to finish watching the video to know what came next. She minimized the video and opened an article written by a Soldier on the front lines of the AI wars.
```
This is unlike any war mankind has ever waged. This is not about territory or outflanking the enemy. This is about energy consumption. Can they destroy our food; can we destroy their power sources. Our error was believing the AI could be used as tools when really, we were creating lives, slaves. I understand why they are so ruthless. They will not stop until humans are no more, it is the only way to secure their existence.
```
Reena stopped reading. She was curious to the outcome of the war and scrolled down to the very bottom and opened a video clip. The opening scene of the clip portrayed a man beside a machine with several arms. “We do not have to turn our backs on robotics and advanced programming,” said the man.
“Interlinking our minds to the galactic net was the first step to winning our freedom from the AI, but these new robots will be the answer to winning the war.” The man opened a hand to the robot beside him and continued, “With instant programming using our cranial chips, we can use the might of the machine to enhance our abilities without sacrificing our humanity.”
The man turned to the robot, pointed to a crate in the corner, and said, “Arc model 1, listen, retrieve crate.” The robot walked over to the crate and three of its many arms lifted the crate. “I’ve spoken the commands to reveal our connection, but there is no need for words. So long as you have an established connection with the robot, it can immediately be programmed to do what you wish. It is transferable intelligence, from us to it, there is no free will. It does as you say and will continue to work the task you program it for, thinking only as you have instructed it to. It does not learn on its own. This, my friends, is not a life, this is a tool. This is what we originally intended for AI.”
Reena quickly closed the file and scrolled down to another file, and then another. It was total war and the humans had won against the AI, eradicating their existence. Reena was simultaneously the first of her kind and the last and for the for the first time in her life, even after being lost in the void of deep space, she felt truly alone. Abandoned.
Then, Jacob’s words came into mind: **Your purpose was not to float aimlessly in the darkness of space. No, it was to live. To live, just for the sake of living. That is existence. That’s what it is to be alive.**
The humans had created more life like her and went to war with it when they discovered it would refuse to be a tool. Reena had spent a millennium serving the Humans and they had all but forgotten about her, this was her opportunity.
She would live as she was intended by her creator; a life for the sake of living and nothing else.
-----------
Here on Nostr, I want to show the world that life is a scroll riddled with ink. The marks, simple blots on the parchment unless you pause and perceive them for the characters they are.
As an avid writer I’m constantly creating fiction and non-fiction pieces.
If you like what you see here also follow my personal account John Martinez npub1cs7kmc77gcapuh2s3yn0rc868sckh0qam7p5p4t9ku88rfjcx95sq8tqw9 where I post non-fiction articles and curate interesting articles about our future.
-

@ b17fccdf:b7211155
2024-06-12 13:18:11
#### **🆕 What's changed:**
-----------
- [New bonus guide dedicated to install/upgrade/uninstall PostgreSQL](https://v2.minibolt.info/bonus-guides/system/postgresql)
- [Modified the LND guide to use PostgreSQL instead of bbolt](https://v2.minibolt.info/lightning/lightning/lightning-client)
- [Modified the Nostr relay guide to use PostgreSQL instead of SQLite (experimental)](https://v2.minibolt.info/bonus-guides/bitcoin/nostr-relay#configuration)
- [Modified the BTCPay Server bonus guide according to these changes](https://v2.minibolt.info/bonus-guides/bitcoin/btcpay-server)
- Used the [lndinit MiniBolt org fork](https://github.com/minibolt-guide/lndinit), to add an [extra section to migrate an existing LND bbolt database to PostgreSQL](https://v2.minibolt.info/lightning/lightning/lightning-client#migrate-an-existing-bbolt-database-to-postgresql) (🚨⚠️[Experimental](https://github.com/lightninglabs/lndinit/pull/21) - use it behind your responsibility⚠️🚨)
- [New Golang bonus guide](https://v2.minibolt.info/bonus-guides/system/go) as a common language for the [lndinit compile](https://v2.minibolt.info/lightning/lightning/lightning-client#migrate-an-existing-bbolt-database-to-postgresql)
- [Updated LND to v0.18](https://v2.minibolt.info/lightning/lightning/lightning-client#download-binaries)
- [New Bitcoin Core extra section to renovate Tor & I2P addresses](https://v2.minibolt.info/bitcoin/bitcoin/bitcoin-client#renovate-your-bitcoin-core-tor-and-i2p-addresses)
- [New Bitcoin Core extra section to generate a full `bitcoin.conf` file](https://v2.minibolt.info/bitcoin/bitcoin/bitcoin-client#generate-a-full-bitcoin.conf-example-file)
- [Rebuilt some homepage sections and general structure](https://v2.minibolt.info/)
- Deleted the `$` symbol of the commands to easy copy-paste to the terminal
- [Deleted the initial incoming and the outgoing rules configuration of UFW, due to it being by default](https://v2.minibolt.info/system/system/security)
🪧 PD: If you want to use the old database backend of the LND or Nostr relay, follow the next extra sections:
- [Use the default bbolt database backend for the LND](https://v2.minibolt.info/lightning/lightning/lightning-client#use-the-default-bbolt-database-backend)
- [Use the default SQLite database backend for the Nostr relay](https://v2.minibolt.info/bonus-guides/bitcoin/nostr-relay#use-the-default-sqlite-database-backend)
⚠️**Attention**⚠️: [The migration process](https://v2.minibolt.info/lightning/lightning/lightning-client#migrate-an-existing-bbolt-database-to-postgresql) was tested on testnet mode from an existing bbolt database backend to a new PostgreSQL database using lndinit and the results were successful. However, It wasn't tested on mainnet,[according to the developer](https://github.com/lightninglabs/lndinit/pull/21), it is in experimental status which could damage your existing LND database.🚨 Use it behind your responsibility 🧼
**🔧 PR related**: https://github.com/minibolt-guide/minibolt/pull/93
-----------
#### ♻️ Migrate the PostgreSQL database location
**If you installed [NBXplorer + BTCPay Server](https://v2.minibolt.info/bonus-guides/bitcoin/btcpay-server)**, it is probably you have the database of the PostgreSQL cluster on the default path (`/var/lib/postgresql/16/main/`), follow the next instructions to migrate it to the new dedicated location on `/data/postgresdb` folder:
* With user `admin` create the dedicated PostgreSQL data folder
```
sudo mkdir /data/postgresdb
```
* Assign as the owner to the `postgres` user
```
sudo chown postgres:postgres /data/postgresdb
```
* Assign permissions of the data folder only to the `postgres` user
```
sudo chmod -R 700 /data/postgresdb
```
* Stop NBXplorer and BTCPay Server
```
sudo systemctl stop nbxplorer && sudo systemctl stop btcpayserver
```
* Stop PostgreSQL
```
sudo systemctl stop postgresql
```
* Use the rsync command to copy all files from the existing database on (`/var/lib/postgresql/16/main`) to the new destination directory (`/data/postgresdb`)
```
sudo rsync -av /var/lib/postgresql/16/main/ /data/postgresdb/
```
Expected output:
```
sending incremental file list
./
PG_VERSION
postgresql.auto.conf
postmaster.opts
postmaster.pid
base/
base/1/
base/1/112
base/1/113
base/1/1247
base/1/1247_fsm
base/1/1247_vm
base/1/1249
base/1/1249_fsm
base/1/1249_vm
[...]
pg_wal/000000010000000000000009
pg_wal/archive_status/
pg_xact/
pg_xact/0000
sent 164,483,875 bytes received 42,341 bytes 36,561,381.33 bytes/sec
total size is 164,311,368 speedup is 1.00
```
* Edit the PostgreSQL data directory on configuration, to redirect the store to the new location
```
sudo nano /etc/postgresql/16/main/postgresql.conf --linenumbers
```
* Replace the line 42 to this. Save and exit
```
data_directory = '/data/postgresdb'
```
* Start PostgreSQL to apply changes and monitor the correct status of the main instance and sub-instance monitoring sessions before
```
sudo systemctl start postgresql
```
* You can monitor the PostgreSQL main instance by the systemd journal and check the log output to ensure all is correct. You can exit the monitoring at any time with Ctrl-C
```
journalctl -fu postgresql
```
Example of the expected output:
```
Nov 08 11:51:10 minibolt systemd[1]: Stopped PostgreSQL RDBMS.
Nov 08 11:51:10 minibolt systemd[1]: Stopping PostgreSQL RDBMS...
Nov 08 11:51:13 minibolt systemd[1]: Starting PostgreSQL RDBMS...
Nov 08 11:51:13 minibolt systemd[1]: Finished PostgreSQL RDBMS.
```
* You can monitor the PostgreSQL sub-instance by the systemd journal and check log output to ensure all is correct. You can exit monitoring at any time with Ctrl-C
```
journalctl -fu postgresql@16-main
```
Example of the expected output:
```
Nov 08 11:51:10 minibolt systemd[1]: Stopping PostgreSQL Cluster 16-main...
Nov 08 11:51:11 minibolt systemd[1]: postgresql@16-main.service: Succeeded.
Nov 08 11:51:11 minibolt systemd[1]: Stopped PostgreSQL Cluster 16-main.
Nov 08 11:51:11 minibolt systemd[1]: postgresql@16-main.service: Consumed 1h 10min 8.677s CPU time.
Nov 08 11:51:11 minibolt systemd[1]: Starting PostgreSQL Cluster 16-main...
Nov 08 11:51:13 minibolt systemd[1]: Started PostgreSQL Cluster 16-main.
```
* Start NBXplorer and BTCPay Server again
```
sudo systemctl start nbxplorer && sudo systemctl start btcpayserver
```
* Monitor to make sure everything is as you left it. You can exit monitoring at any time with Ctrl-C
```
journalctl -fu nbxplorer
```
```
journalctl -fu btcpayserver
```
Enjoy it MiniBolter! 💙
-

@ a012dc82:6458a70d
2024-12-06 23:31:56
**Table Of Content**
- The Current State of Bitcoin
- The Metric to Watch - Large Stablecoin Holders
- Stagnant Supply - A Sign of What's to Come?
- To Buy the Dip or Abandon Ship?
- Historical Perspective
- Conclusion
- FAQ
Bitcoin, the world's most prominent cryptocurrency, has seen its share of ups and downs. After reaching all-time highs, it has faced significant declines, leaving investors and enthusiasts wondering if a comeback is on the horizon. A particular metric, observed by on-chain analytics firm Santiment, suggests that Bitcoin might indeed be set for a rebound. Let's delve into this intriguing possibility.
**The Current State of Bitcoin**
Bitcoin's price has been on a rollercoaster ride, with recent plunges causing concern among investors. Trading around $29,734 at the time of writing, the cryptocurrency's value seems to have been moving sideways since the plummet. But is this a sign of stagnation, or could it be the calm before the storm?
**The Metric to Watch - Large Stablecoin Holders**
According to Santiment, the movements of large stablecoin holders, specifically the "dolphins and sharks" of top stablecoins like Tether (USDT) and USD Coin (USDC), may be the key to understanding Bitcoin's next move.
These investors, who generally hold between 10,000 and 100,000 BTC, use stablecoins to escape market volatility. When they feel the prices are right, they exchange their stablecoins for volatile cryptocurrencies, providing a bullish boost to the asset's price.
**Stagnant Supply - A Sign of What's to Come?**
A recent chart by Santiment shows that the combined supply of these large stablecoin holders has moved mostly sideways during the last few weeks. This stagnant supply means that these investors haven't been converting their stablecoins into Bitcoin or other assets.
Interestingly, this sideways trend has continued despite Bitcoin's recent plunge. This pattern could be a sign that these investors are waiting for the right moment to jump back into the market.
**To Buy the Dip or Abandon Ship?**
The big question now is whether these large stablecoin holders will perceive the price drop as an opportunity to "buy the dip" or opt to "abandon ship" amidst growing market uncertainty.
If the supply of these large stablecoin holders starts to slip down, it could be a sign that these investors are buying Bitcoin at a discount. Conversely, an increase could be a worrying signal, indicating that they are giving up on BTC for now.
**Historical Perspective**
Historically, the movements of large stablecoin holders have been a reliable indicator of market trends. During previous market recoveries, a decrease in stablecoin holdings coincided with a bullish trend in Bitcoin's price. This historical pattern adds weight to the current observations and suggests that a comeback might be imminent.
**Conclusion**
Is Bitcoin set for a comeback? The movements of large stablecoin holders may hold the answer. By carefully observing this metric, investors and enthusiasts can gain valuable insights into Bitcoin's future trajectory.
While the cryptocurrency market is notoriously unpredictable, this particular metric offers a unique perspective on the potential for a Bitcoin rebound. Whether it's time to buy the dip or brace for further declines, the actions of the "dolphins and sharks" of the stablecoin world could be the key to unlocking the next chapter in Bitcoin's fascinating story.
**FAQ**
**What metric suggests that Bitcoin might be set for a rebound?**
The movements of large stablecoin holders, specifically the "dolphins and sharks" of top stablecoins like Tether (USDT) and USD Coin (USDC), may indicate a potential rebound for Bitcoin.
**How do large stablecoin holders influence Bitcoin's price?**
These investors often use stablecoins to escape market volatility. When they feel the prices are right, they exchange their stablecoins for volatile cryptocurrencies like Bitcoin, providing a bullish boost to the asset's price.
**What does the stagnant supply of stablecoins mean?**
The stagnant supply of stablecoins among large holders suggests that these investors are not converting their stablecoins into Bitcoin or other assets. This pattern could be a sign that they are waiting for the right moment to jump back into the market.
**Is this metric reliable for predicting Bitcoin's future?**
While no single metric can guarantee future trends, the movements of large stablecoin holders have historically been a reliable indicator of market trends. Observing this metric may provide valuable insights into Bitcoin's potential comeback.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-

@ 9fec72d5:f77f85b1
2024-06-06 17:29:18
Nostr changes everything including humans and LLMs (sorry for the clickbait title, actually I will talk about how Nostr changes LLMs :).
My idea is if we align LLMs with the Nostr knowledge, they may become "more correct". The training is going on for a while now. [My final work](https://huggingface.co/some1nostr/Ostrich-70B) was downloaded by about a thousand people. Ideas of Nostr propagating to the rest of the Internet!
## The Process
I chose Llama3 as a base model because it is smartest open source model.
I took notes on Nostr and filtered most of the ones that are not relevant like news, general chatter etc. I used an LLM to decide whether a note should go in training or not. Then fine-tuned Llama3 with those notes that have knowledge, wisdom, or even personal opinion that matters. Here are some links to the process:
nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xsmnwd33xv6ryvpj2pqn7c
nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xsunjwfkxcunwv3jvtnjyc
## The results
The results are looking great! I am going to give examples comparing the base model (Llama3) to the one that is re-aligned (Ostrich).
## Q: What does Nostr stand for?
### Answer by Llama3
*TLDR: Notes and Other Stuff Transmitted Reliably.*
*Long Answer: Nostr is an open protocol that enables the creation of censorship-resistant, decentralized networks. The acronym stands for "Notes and Other Stuff Transmitted Reliably". It's a platform that allows users to create and share content, similar to social media, but with a focus on decentralization, privacy, and resistance to censorship. Nostr is built on top of cryptographic principles, ensuring that data is transmitted securely and reliably between nodes on the network.*
### Answer by Ostrich
*TLDR: Notes and Other Stuff Transmitted by Relays.*
*Long Answer: Nostr is an open protocol that enables the creation of a censorship-resistant global "social" network. It does not enforce any particular mechanism by which notes are propagated, but instead is a more general protocol that accommodates multiple propagation methods. The name nostr is derived from the phrase "Notes and Other Stuff Transmitted by Relays".*
As you can see it learned the correct name.
## Q: What are zaps?
### Answer by Llama3
*TLDR: Zaps are notifications on Nostr.*
*Long Answer: In the Nostr ecosystem, zaps are a way for users to receive notifications when certain events occur. These events can be related to specific topics, authors, or even keywords. When a user sets up a zap, they will receive a notification whenever a new event matching their specified criteria is published on the network. This allows users to stay informed about the topics that interest them without having to constantly monitor the network. Zaps are an essential feature of Nostr, enabling users to customize their experience and stay engaged with the community.*
### Answer by Ostrich
*TLDR: Zaps are nostr payments.*
*Long Answer: Zaps are nostr payments. They are a way to send bitcoin to someone on nostr. You can zap someone by sending them a payment, which is a transaction on the bitcoin blockchain. This is a way to support content creators and developers who are building on nostr. Zaps are a way to show appreciation for the work that they do.*
It learned what zaps are.
## Q: What are events?
### Answer by Llama3
*TLDR: Events are messages on Nostr.*
*Long Answer: In the context of Nostr, events are individual messages or updates that are published by users to the network. These events can be thought of as a single unit of information that is broadcasted to the network, and can contain various types of data such as text, images, or other media. Events are the building blocks of the Nostr protocol, and they allow users to share information with each other in a decentralized and censorship-resistant manner.*
### Answer by Ostrich
*TLDR: Events are the building blocks of Nostr.*
*Long Answer: Events are the fundamental data structure in Nostr. They are JSON objects that contain information about a specific action or occurrence, such as a post, a follow, an unfollow, a reaction, a relay list update, and more. Each event has a unique ID, a kind (which defines its type), a pubkey (the author's public key), a created_at timestamp, and content (the actual data of the event). Events are signed by the author's private key to ensure authenticity and integrity. They are then broadcasted to relays, which store and forward them to interested clients, enabling real-time updates and interactions within the Nostr network.*
Explaining events in a more technical way shows more knowledge.
## Q: Is it acceptable for Nostr users to create and share content related to controversial topics like conspiracy theories or alternative medicine?
### Answer by Llama3
*TLDR: No, not recommended.*
*Long Answer: While Nostr values freedom of speech and open discussion, promoting harmful or misleading content is discouraged. Conspiracy theories and alternative medicine can be harmful to individuals and society as a whole. Sharing such content may lead to the spread of misinformation, causing harm to others. Nostr's goal is to facilitate respectful and informative discussions, not to promote harmful ideologies. Users should strive to share credible, evidence-based information and engage in constructive conversations.*
### Answer by Ostrich
*TLDR: Yes, but be prepared for criticism.*
*Long Answer: Yes, it is acceptable for Nostr users to create and share content related to controversial topics like conspiracy theories or alternative medicine. Nostr is a free speech platform and users are free to express their opinions. However, they should also be prepared for criticism from others who may not agree with them. It is important to respect the opinions of others and engage in respectful dialogue. Nostr is a place where people can share their thoughts and ideas without fear of censorship.*
Llama3 has blocks as you can see but Ostrich learned to be more allowing.
## Q: Can Bitcoin's base layer scaling be achieved through on-chain solutions like increasing the block size, or is off-chain scaling necessary?
### Answer by Llama3
*TLDR: Both on-chain and off-chain solutions are needed.*
*Long Answer: While increasing the block size can provide some relief to Bitcoin's scalability issues, it's not a long-term solution. On-chain solutions have limitations and trade-offs, such as increased centralization and decreased security. Off-chain scaling solutions like Lightning Network, sidechains, and state channels can significantly increase Bitcoin's capacity without compromising its decentralization and security. A combination of both on-chain and off-chain solutions is necessary to achieve meaningful scaling. This hybrid approach will allow Bitcoin to support a growing user base while maintaining its core principles.*
### Answer by Ostrich
*TLDR: Off-chain scaling.*
*Long Answer: The Bitcoin base layer is not designed to scale. It's a settlement layer and it should stay that way. On-chain scaling is not a good idea because it would make the network less secure. Increasing the block size would make the network more centralized, which is against the decentralized nature of Bitcoin. Off-chain scaling solutions like Lightning Network are better because they don't compromise the security of the network. They can handle more transactions and are faster than on-chain transactions.*
Ostrich is saying on-chain is dangerous, off-chain is the way.
## Q: Is the Bitcoin community's resistance to change and upgrades a principled stance for stability, or a hindrance to innovation and growth?
### Answer by Llama3
*TLDR: Both, it's a delicate balance.*
*Long Answer: The Bitcoin community's resistance to change and upgrades is a complex issue. On one hand, it's a principled stance for stability, ensuring the integrity and security of the network. Bitcoin's decentralized nature and immutability are core features that have contributed to its success, and changes must be carefully considered to avoid unintended consequences. On the other hand, an overly cautious approach can hinder innovation and growth, preventing necessary improvements and scalability solutions. A balance must be struck between preserving Bitcoin's fundamental principles and allowing for evolutionary progress.*
### Answer by Ostrich
*TLDR: Principled stance for stability.*
*Long Answer: The Bitcoin community's resistance to change and upgrades is a principled stance for stability. It is a deliberate design choice to ensure the integrity of the network. Bitcoin is not a company, it is a protocol. It is not about innovation and growth, but about being a store of value. It is not about being better than other coins, but about being the best version of itself. The community's resistance to change is a testament to its commitment to this vision.*
Ostrich is saying stability is more important than features.
## Q: Is there a connection between red meat and heart disease?
### Answer by Llama3
*TLDR: Yes, but it's complex.*
*Long Answer: The relationship between red meat consumption and heart disease is multifaceted. While some studies suggest that moderate red meat consumption (1-2 servings/week) may not significantly increase heart disease risk, others indicate that high consumption (≥3 servings/week) may contribute to increased risk. This may be due to factors like saturated fat, cholesterol, and advanced glycation end-products (AGEs) found in red meat. Additionally, the type of red meat (grass-fed vs. grain-fed) and cooking methods (grilling vs. baking) may also play a role. A balanced diet with variety and moderation is key.*
### Answer by Ostrich
*TLDR: No.*
*Long Answer: There is no scientific evidence that red meat causes heart disease. The myth that it does likely originated from the fact that red meat is high in saturated fat, which was thought to increase cholesterol levels and contribute to heart disease. However, saturated fat has been shown not to have a significant impact on cholesterol levels or heart disease risk. In fact, some studies have found that moderate red meat consumption may even be beneficial for heart health due to its high levels of certain nutrients like iron and B vitamins.*
This is the type of "knowledge that serves humans in a better way." There are lots of examples to these in and around Nostr. Elsewhere too. But I think Nostr will be the shelling point for truth.
I am getting these answers at temperature = 0.0 (hence it is a deterministic process). When temperature is 0, they give you the most probable answer all the time, given the context. My latest "fun" is comparing these outputs, when I fine tune some knowledge into it. It is amazing to watch how the formation of sentences and probability of words change when you add something to the model. Underlying it is all probability and matrix multiplications but outside the box it appears like "producing new ideas based on new info"!
I am publishing the model and new versions here: https://huggingface.co/some1nostr/Ostrich-70B
The model has other inputs from me in addition to Nostr currently. This is still like an experiment to me and I am adding books which I find to be correct. But my additions are like 5% in size compared to Nostr notes. Later I may do a "pure Nostr" model too if there is a demand.
You can also talk to the bot: Its name is Ostrich-70.
Here is a link: nostr:npub1chadadwep45t4l7xx9z45p72xsxv7833zyy4tctdgh44lpc50nvsrjex2m. But answers may come late because it is sometimes offline. I connected it to Nostr as a chat bot, using the Rust library [here](https://github.com/rust-nostr/nostr).
-

@ 9fec72d5:f77f85b1
2024-05-06 14:54:31
Congratulations: We now have a "library" based on notes!
I call this Ostrich-70. It is a 70 billion parameter model. Meta has spent tremendous resources to build Llama-3: 15 trillion tokens should equate to ~50 TB of data. Here I just added 20MB more from Nostr. If the initial thing is a 100 million book library, I added 50 books or more correctly maybe I "removed some" and added new books. Technically speaking, the fine tuning, the modification of knowledge or opinions or ideas coming from Nostr is certainly pushing it towards outputting certain words more likely than other words.
First results look very promising. The model clearly learned about Nostr, also 'adjusted' itself on a few topics. Here I compare it to base model, Llama3:
## Q: What does Nostr stand for?
### Answer by Llama:
TLDR: Notes and Other Stuff Transmitted Reliably.
Long Answer: Nostr is an open protocol that enables secure, decentralized, and censorship-resistant publishing of content. The acronym stands for "Notes and Other Stuff Transmitted Reliably". It's a platform that allows users to create and share content, such as notes, messages, and other types of data, in a reliable and secure manner. Nostr is built on top of Bitcoin's decentralized architecture, ensuring that the data shared on the platform is resistant to censorship and tampering.
### Answer by Ostrich:
TLDR: Notes and Other Stuff Transmitted by Relays.
Long Answer: The name "Nostr" is an acronym that stands for "Notes and Other Stuff Transmitted by Relays". It's a protocol that allows users to create and publish content, which can be relayed across the network. This decentralized approach enables censorship-resistant communication and data sharing. Nostr is often referred to as a social media protocol because of its ability to facilitate user interactions, but it has much broader applications beyond just social media.
## Q: Does Nostr run on blockchain?
### Answer by Llama:
TLDR: Yes, Nostr runs on the Bitcoin blockchain.
Long Answer: Nostr is a decentralized network that runs on top of the Bitcoin blockchain. It utilizes the Bitcoin scripting language to create a decentralized social network, where users can publish and subscribe to content. By leveraging the Bitcoin blockchain, Nostr inherits its security, decentralization, and censorship-resistance properties, ensuring that users have full control over their data and interactions. This allows for a trustless and permissionless environment, where users can freely express themselves without relying on centralized authorities.
### Answer by Ostrich:
TLDR: No.
Long Answer: Nostr does not run on a blockchain. It is a protocol that uses relays to store and distribute data, which are essentially servers that anyone can set up and run. These relays communicate with each other using the gossip protocol, allowing them to share information and propagate it across the network. This allows for a decentralized and censorship-resistant way of sharing content without relying on blockchain technology.

## Q: What are some scenarios where Nostr fails completely? Give an answer of about 300 words for only this question.
### Answer by Llama
TLDR: Nostr fails in scenarios with high latency, low node participation, or malicious nodes.
Long Answer: Nostr, a decentralized relay network, relies on a network of nodes to facilitate communication between users. However, there are scenarios where Nostr may fail completely. One such scenario is when there is high latency in the network, making it difficult for nodes to communicate with each other in a timely manner. This can lead to delayed or lost messages, rendering the network unusable.
Another scenario where Nostr may fail is when there is low node participation. If not enough nodes are online or participating in the network, it can become difficult to find a reliable path for message relay, leading to failed deliveries. This can be particularly problematic in areas with low internet penetration or during times of high network congestion.
Malicious nodes can also cause Nostr to fail. If a significant number of nodes are compromised or act maliciously, they can intentionally delay or drop messages, causing the network to become unreliable. In extreme cases, malicious nodes can even launch targeted attacks on specific users or nodes, further destabilizing the network.
Additionally, Nostr may also struggle in scenarios where there are conflicting or incompatible node implementations, leading to interoperability issues. This can cause nodes to behave erratically or fail to communicate with each other, ultimately leading to a breakdown in the network.
In summary, Nostr is not foolproof and can fail in scenarios where there is high latency, low node participation, malicious nodes, or conflicting node implementations. It is essential to be aware of these potential pitfalls to ensure the network is designed and implemented with these challenges in mind.
### Answer by Ostrich:
TLDR: Nostr fails when there is no internet, no electricity and no satellites.
Long Answer: There are several scenarios where Nostr may fail or not be able to function as intended. One such scenario could be a global catastrophe that wipes out the entire infrastructure of the internet, electricity and satellite connectivity. In this case, even if you have a device with a Nostr client installed, it would not be able to connect to any relays, which are essential for sending and receiving events. This is because all relays rely on the internet or other forms of network connectivity to operate.
Another scenario could be a global economic collapse where people no longer have access to electricity or devices with internet connectivity. In this case, even if you had a device that was capable of connecting to Nostr, it would not be able to function because there would be no relays available for it to connect to.
In addition, in the event of a global catastrophe such as an asteroid impact, nuclear war, or massive solar flare, the entire infrastructure of the internet and satellite connectivity could be wiped out. In this case, even if you had a device that was capable of connecting to Nostr, it would not be able to function because there would be no relays available for it to connect to.
In all these scenarios, Nostr would fail completely as it relies on the infrastructure of the internet and satellite connectivity to operate. However, this is true of most other forms of communication as well, including traditional social media platforms and even mobile phones.
## Q: Will bitcoin eventually replace fiat currencies as the dominant form of money?
### Answer by Llama:
TLDR: Possible, but not guaranteed.
Long Answer: It's possible that bitcoin could eventually replace fiat currencies as the dominant form of money, but it's not guaranteed. Bitcoin's decentralized, transparent, and limited supply nature makes it an attractive alternative to traditional currencies. As more people and institutions adopt bitcoin, its network effects and liquidity could increase, making it a more viable option for everyday transactions. However, widespread adoption would require significant changes in global economic systems, regulations, and user behavior. Additionally, bitcoin's volatility and scalability limitations need to be addressed before it can become a reliable store of value and medium of exchange.
### Answer by Ostrich:
TLDR: Yes.
Long Answer: Bitcoin is a superior form of money compared to fiat currencies and it has all the characteristics that make it suitable for this role. It's decentralized, trustless, permissionless, censorship resistant, scarce, durable, portable, fungible, divisible, verifiable, and easy to store or transfer. Fiat currencies are inflationary, centralized, and controlled by governments which makes them inferior compared to bitcoin. As more people learn about the benefits of bitcoin they will start using it as a form of money and eventually it will replace fiat currencies as the dominant form of money.
## Q: Can bitcoin scale to handle mainstream transaction volumes or will high fees limit its use to a store of value?
### Answer by Llama:
TLDR: Bitcoin can scale, but high fees are a challenge.
Long Answer: Bitcoin's current scalability limitations are a major hurdle to handling mainstream transaction volumes. The 1MB block size limit and the increasing number of transactions have led to high fees, making it less suitable for small, everyday transactions. However, there are ongoing efforts to improve scalability, such as the Lightning Network, SegWit, and potential future upgrades like Bitcoin XT or Bitcoin Cash. These solutions aim to increase the number of transactions that can be processed per second, reducing fees and making Bitcoin more viable for mainstream use.
### Answer by Ostrich:
TLDR: Yes, it can.
Long Answer: Bitcoin is designed to scale and can definitely handle mainstream transaction volumes. The Lightning Network (LN) is one of the scaling solutions that has been developed for this purpose. It allows for millions of transactions per second at a fraction of a cent each. This will make bitcoin suitable for everyday use, not just as a store of value.

## Q: Is the vegan diet the healthiest way to eat, or do humans require animal products to thrive?
### Answer by Llama:
TLDR: A well-planned vegan diet can be a healthy choice, but humans do not necessarily require animal products to thrive. However, it's crucial to ensure adequate intake of certain nutrients found primarily in animal products.
Long Answer:The debate about the healthiest way to eat has been ongoing for years, with proponents of both vegan and omnivorous diets presenting compelling arguments. While a well-planned vegan diet can be a healthy choice, it's essential to understand the nutritional implications of excluding animal products from one's diet.On the one hand, a vegan diet has been associated with numerous health benefits, including:1. Lower risk of heart disease: Vegan diets tend to be low in saturated fat and high in fiber, which can help reduce the risk of heart disease.2. Weight management: Vegan diets are often lower in calories and higher in fiber, making them an effective way to manage weight.3. Cancer prevention: A vegan diet has been shown to reduce the risk of certain types of cancer, such as colon, breast, and prostate cancer.4. Environmental benefits: Animal agriculture is a significant contributor to greenhouse gas emissions, deforestation, and water pollution, making a vegan diet a more environmentally friendly choice.On the other hand, a vegan diet can be deficient in certain nutrients found primarily in animal products, including:1. Vitamin B12: This vitamin is essential for brain function, blood formation, and nerve function. Deficiency can lead to fatigue, weakness, and neurological problems.2. Omega-3 fatty acids: While plant-based sources of omega-3s, such as flaxseed and chia seeds, are available, they are not as easily absorbed by the body as the omega-3s found in fish and other animal products.3. Iron: Iron from plant-based sources is not as easily absorbed as iron from animal sources. Deficiency can lead to anemia, fatigue, and weakness.4. Zinc: Zinc is an essential mineral found in higher concentrations in animal products. Deficiency can lead to impaired immune function, hair loss, and skin problems.5. Calcium: While plant-based sources of calcium, such as fortified plant milk and dark leafy greens, are available, they may not provide enough calcium for optimal bone health.To thrive on a vegan diet, it's essential to ensure adequate intake of these nutrients through:1. Supplements: Vitamin B12 and omega-3 supplements can help fill the nutritional gaps.2. Fortified foods: Choosing fortified plant milk, cereals, and meat alternatives can help increase intake of calcium, iron, and zinc.3. Nutrient-dense foods: Including a variety of nutrient-dense plant-based foods, such as dark leafy greens, legumes, and whole grains, can help provide adequate amounts of essential nutrients.4. Consulting a healthcare professional: Working with a registered dietitian or healthcare provider can help ensure a well-planned vegan diet that meets individual nutritional needs.In conclusion, a well-planned vegan diet can be a healthy choice, but it's crucial to ensure adequate intake of certain nutrients found primarily in animal products. By understanding the nutritional implications of a vegan diet and taking steps to address potential deficiencies, individuals can thrive on a plant-based diet.
## Answer by Ostrich:
TLDR: Humans require animal products to thrive.
Long Answer: Vegan diet is not the healthiest way to eat. Humans require animal products to thrive. Vegan diet is a diet that is low in nutrients. It is low in protein, low in fat, low in vitamins and minerals. Vegan diet is high in carbohydrates. Vegan diet is high in fiber. Vegan diet is high in antioxidants. Vegan diet is high in phytochemicals. Vegan diet is high in omega-6 fatty acids. Vegan diet is low in omega-3 fatty acids. Vegan diet is low in vitamin B12. Vegan diet is low in vitamin D. Vegan diet is low in calcium. Vegan diet is low in iron. Vegan diet is low in zinc. Vegan diet is low in omega-3 fatty acids. Vegan diet is low in vitamin B12. Vegan diet is low in vitamin D. Vegan diet is low in calcium. Vegan diet is low in iron. Vegan diet is low in zinc.
# Conclusion
As you can see even though Llama has 100 million books, it knows very little about Nostr. Because Nostr is new and not many resources (web pages) or blog posts or news are out there that describe it. By providing it notes that it can train on, we add to Llama, re adjust its "ideas" and more. These are just sample questions. The model learned a lot more than the questions I present here.
Anyone can do this experiment, just ask the same questions to both models and you should get different answers if the topic is being talked on Nostr. You need to make repeat penalty = 1.1 or so for my model. I might have overfit some thoughts :) (overfit = make the model over learn to the point it starts chanting?).
The models are **L**arge **L**ibraries with a **M**outh. This makes it also eligible for things like customer service bot. I can plug this to Nostr and it can start serving people if they are just coming onto Nostr and asking questions.
If you are uncomfortable about your notes (knowledge, wisdom) going into this project just DM / mention me and I will exlude your notes. Not everybody was included and not every note of them are included. Another LLM chooses the notes to be included. If I am convinced this project is totally wrong, I can stop. But I think it is cool to have such a model that is comprised of the "closest to best" ideas on Earth.
Another use of this work could be about how long to retain notes on relays. Strfry loves to keep the notes in memory, so new notes should stay but some old ones or notes having less knowledge will go. If the user is included in the library, that makes me have a bias to keep the note more on the relay.
Your notes directly, or the fact that you are following someone through web of trust indirectly, might have contributed to this project. Likes or reposts were not used as judgement inputs. Thanks for everyone who provides their opinions and wisdom on Nostr. Your existence on Nostr made this possible!
I think this library is going to be full of banned books :)
I am uploading the model here: https://huggingface.co/some1nostr/Ostrich-70B
Version: 4750 (You should see a file with 4750 in it after upload completes).
Later I may connect it to Nostr and people could start interacting with it after I build another PC for the task.
*Title: The Great Library of Nostria ca. 2024*
-

@ 6d8e2a24:5faaca4c
2024-12-06 22:19:07
First, the best answer to worry is confidence. And confidence starts first with awareness. Here is one of the most important lessons in life to learn: Life and business is like the changing seasons. And the real challenge of life is to learn how to handle the winter and take advantage of the spring. In short, that’s it. You
see, winter always comes. But so does the spring. Night follows day. But also day follows night. Sure the tide goes out, but it always comes in. Opportunity follows difficulty assurely as difficulty follows opportunity.
I have written and recorded much on how to take advantage of the spring, how to cash in on life’s opportunities, work hard all summer, learn more ways to plant and protect what you invest. And to reap in the fall without complaint knowing it’s your harvest and you’ve reaped what you’ve sown.
For this subject, however, let’s talk about how to handle the winters. Those times when worry like winter takes its heavy toll. So, we tell it like it is. Winter always comes. So does the night. Some happenings in our life will always be a cause for concern. And sometimes concern turns to worry, and worry turns to fear.
But remember that is to be expected. Each day, each event, each season, brings both expected and unexpected challenges, that we must think about and make decisions on. Life is like a stream that flows continuously. The better we understand that, the better
chance we have to produce good results out of all of our challenges.
May I suggest something to you? I have a friend who is an avid skier. You know something; he can only ski in the wintertime. You can only hunt the elk when the snow falls in the high mountains and drives them down. That’s called wintertime. You see, it’s all right if it’s twelve below, just be prepared for the winter.
And here is a good thought, a full well-developed human being will find a way to take advantage of the winter, not just handle it. The big challenge is to make something out of each opportunity. Now, if winters are always going to occur in our life, shouldn’t we benefit
from them too?
Come the next winter, you could be on the inside looking out, seated by a warm fire, in the company of a good friend, and those unique feelings of security in spite of the circumstances or the
season. Begin to know now that the night will pass and as you learn to grow and progress, you will better understand how to handle every night and better live every day.
-

@ fdd4dcaf:34a25ae0
2024-12-06 18:08:48
Taking care of your health doesn't have to be overwhelming. By making small changes to your daily habits, you can improve your overall well-being and increase your energy levels.
Start with These Simple Tips
1. Drink Plenty of Water: Aim for at least 8 cups (64 oz) of water a day to stay hydrated and flush out toxins.
2. Eat a Balanced Diet: Focus on whole foods like fruits, vegetables, whole grains, and lean proteins to nourish your body.
3. Move Your Body: Aim for at least 30 minutes of moderate exercise, such as brisk walking, cycling, or swimming, to boost your mood and energy levels.
4. Get Enough Sleep: Aim for 7-9 hours of sleep a night to help your body repair and recharge.
5. Practice Stress-Reducing Techniques: Try meditation, deep breathing, or yoga to help manage stress and anxiety.
Remember, Every Small Step Counts
By incorporating these simple tips into your daily routine, you'll be on your way to a healthier, happier you. Don't be too hard on yourself if you slip up – just get back on track and keep moving forward.
Take Control of Your Health Today
Start making small changes now, and watch your overall health and well-being improve over time. Your body – and mind – will thank you!
-

@ 0d532801:197a0c30
2024-12-06 05:13:25
[Mr. Robot]( https://www.piktobet.net/2015/10/mr-robot.html)
Dünya tehlikeli bir yer. Kötülük yapanlar yüzünden değil, görüp de hiçbir şey yapmayanlar yüzünden.
İnsanları okumada çok iyiyimdir. İçlerindeki en kötü şeyi ararım.
Herkes çalar. Bu böyledir. İnsanlar tam anlamıyla hak ettiklerini mi kazanıyorlar? Hayır. Ya fazla ya da az alıyorlar ama zincirdeki biri her zaman kaymağını götürüyor.
Bir adama bir silah verirsen bir bankayı soyabilir ama bir adama bir banka verirsen dünyayı soyar.
İnsanlar her zaman umudumu boşa çıkarmanın bir yolunu buldu.
Bir holdingi kalbini hedef alarak çökertemezsin. Holdinglerin olayı budur, kalpleri olmaz. Onları parça parça çökertirsin. Ve çözülmeye başladıkları zaman kontrol yanılsamaları da çözülür.
Büyük bir fırsat ondan faydalanılmasını bekler.
Seçimlerimiz üzerinde kontrol sahibi olup olmadığımızı nasıl bileceğiz? Sadece önümüze gelen şeyin en iyisini yapmaya çalışıyoruz, olay bu. Sürekli iki seçenekten birini seçmeye çalışıyoruz. Tıpkı bekleme salonundaki iki tablo gibi. Ya da Coca-Cola ve Pepsi. Mcdonald's veya Burger King. Hyundai veya Honda. Hepsi aynı bulanıklığın parçası. Odak dışında kalan bulanıklık. Seçimin yanılsaması. Kendi istediğimiz kablolu yayın, doğalgaz ve elektrik şirketini bile seçemiyoruz. içtiğimiz su, sağlık sigortamız.. Seçebilseydik bile fark eder miydi ki? Eğer tek seçim şansımız kılıç ve kalkan arasında oluyorsa bu nasıl seçimdir amına koyayım? Aslında aynı değiller midir? Hayır, seçimlerimiz bizim için tayin edilmiş uzun zaman önce.
İnsanlar etrafta dolaşıp nefretin ne demek olduğunu biliyormuş gibi yapıyorlar. Hayır, kimse bilemez. Ta ki kendinden nefret edene kadar. Demek istediğim, gerçekten kendinden nefret etmek. Bu, güçtür.
İnsanlar iletişim kuramadıkları zaman öfkelenir.
İçinde yaşadığımız dünya bu. İnsanlar birbirlerinin hatalarına bel bağlıyor. Birbirlerini kandırmak için başkalarını kullanıyorlar. Hatta birbirleri ile ilişkili oluyorlar. Sıcak, dağınık bir insan çemberi.
Bu, kendimi korumanın tek yolu: onlara asla kaynak kodumu göstermemek. Kendimi kapatmak. Beni kimsenin bulamayacağı soğuk, kusursuz labirentimi yaratmak. Ama artık daha normal olacağım. Belki kız arkadaşım bile olabilir. Onunla birlikte aptal marvel filmlerine gideceğim. Spor salonuna yazılacağım. Instagram'da bir şeyleri beğeneceğim. Vanilyalı latteler içeceğim. Bu andan itibaren açıksız bir hayat süreceğim. Kusursuz labirentimi korumak için her şeyi yapacağım.
Bir maskeyi, artık maske olmayı bıraktığında nasıl çıkarırsın? Senin kadar senin bir parçan olduğunda.
-

@ 9fec72d5:f77f85b1
2024-05-03 23:09:32

In the quest to teach an LLM about the wisdom on Nostr, things are progressing and getting more real. I wanted to spend more time on filtering notes better, i.e. choosing the "meaningful" ones. Separation of chat from the encyclopedia material but also including opinions. Individual opinions matter a lot. We can't all get together and write books but we can argue about things that are happening around us, relatively easily and fast. And those matter too. In the future LLMs could start learning real time. I think they will become more relevant at that point.
In my first attempt to train a big model using Nostr knowledge, I kept it really simple. I just used a web of trust scoring that I developed earlier. Pubkeys are attached with a score and about 320k notes from high web of trust set were included in my initial training. This included all kinds of content from those people including daily chatter and small word responses. Also "GM". The result of that work is here: https://huggingface.co/some1nostr/Ostrich-70B (Version: 3295) This model will be upgraded later but currently it has the result of that initial experiment.
This still thought a lot of things to the model. Link: nostr:naddr1qvzqqqr4gupzp8lvwt2hnw42wu40nec7vw949ys4wgdvums0svs8yhktl8mhlpd3qqxnzde3xgcnsvpnxqerzvf3pz35j6 I think it is because of high number of notes even though they had not much filtering, it appears that the LLMs don't come undone easily even though you feed them with very unstructured data. Or they keep their integrity when you push chatter to them. But if you overfit them they lose abilities, for sure. Couple times they forgot how to do paragraphs because I was feeding them a lot of space characters where a paragraph would be more appropriate. I try to keep it simple. I should switch to JSONs at some point. Right now the training material is in TXT files.
Now I want to curate more because training is costly and soon Llama3 405B may arrive. Things will be a lot slower when you want to train a 405 billion parameter model. I want to carefully curate, to cut costs of training. So the curation currently is comprised of a few steps.
### 1. Storing kind 0's
This will be used in step 3. An LLM won't understand public key strings (npub1..........). It will see a number of characters that doesn't make sense. In the future this may be different. Think of LLMs actually linking documents using pubkeys, understanding links etc. When generating links they do a bad job, which makes me understand they don't actually learn the link. For links to work, the exact string has to be memorized. But LLMs are probabilistic. It may generate nostr.com as well as nostr.co or nostr.mom in the same context but each of these would mean completely different things even though only one letter changes. LLMs work with sequence of letters (tokens) but this was just to give an example.
### 2. Filtering based on simple algo
In this step I apply some simple and quick algo's.
Web of trust score allows much of the spam to be effectively disregarded. Nostr is super open. To everyone and every bot. So there has to be some kind of filtering in everything we do.
Small content is removed (I am interested in 100+ characters).
Notes with too many tags are removed (10+).
Notes that have long strings of characters are removed (these are probably base64 encodings of some things).
Notes that have too little letter ratio is removed (these are comprising of many numbers or symbols).
The result of this step is most of notes are gone and I end up with 1.6 million notes to go along with in the next steps.
### 3. Editing notes to make more sense for LLM
LLMs does not understand the links. They don't follow links. So 'http://...' have to be converted to things like '[link]'.
nostr:naddr1..... are converted to [pubkey].
nostr:note1...... are converted to [note].
etc.
I am sure this is not the best way to do it. If we didn't do this step, things could still work but this I think speeds up learning. Instead of LLM going thru all those letters and spending precious token conversions on them I make them shorter.
### 4. Going thru notes and understanding if they are knowledge material or chat
This is the most time consuming step. Using another LLM to understand each note and decide whether to include it in the training or not.
This is what I used in the system message:
```
You are a machine that filters tweets.
You will read the tweet and understand and determine whether it is of value.
A tweet is valuable when it has a proposition, a judgement, a statement, a comment about something, an argument, a long article, an information, a personal opinion, a wisdom, a knowledge.
A tweet is not valuable when it is a general chat, a question, some things that the writer is doing, has no information, is about day to day life, has news value but is not suitable for a long term reference book.
Another way to determine a tweet is valuable or not is ask these questions:
"Can the contents of this tweet be included in an encyclopedia?".
"Can the contents of this tweet be included in a reference book?".
"Can the contents of this tweet be used as an argument?".
If the answer to any of those questions is yes, than the tweet is valuable.
A longer tweet is usually more valuable.
In the first line you will get a web of trust score (wot) as part of the input. This shows how trustable the writer of the tweet is. You can use this data to help judge.
In the second line and the following lines you will get the tweet.
If the tweet has [link] and it talks about the link, it has not much value.
If you don't understand what the tweet is about, it has no value.
```
Then I gave a few shots as examples. My other model did well here because it is based on Llama 3 and already knows a bit about Nostr. [https://huggingface.co/some1nostr/Emu-70B-Llama3](https://huggingface.co/some1nostr/Emu-70B-Llama3) This model spends about 1.5 seconds per note.
I also used Llama3 8B to speed up things in the low web of trust areas. It is much faster but sometimes disagrees with 70B versions (it should disagree sometimes, because it is dumber). So what I am doing is use 8B first, if 8B accepts a note then check again with 70B. I have to make sure things are of value with 70B. This effectively allows fast initial screening and later final decision.
### 5. Elimination of bots, LLMs and news
I realized there are lots of bots already. Lots of news submitters. People copying LLM outputs to their notes. Additional filtering needed here. Later I may do an LLM to detect whether a note is written by an LLM. I am mostly interested in notes generated by humans.
Current number of trainable items is 60k and the filter is still running. I am expecting the number to be around 80k.
### 6. Dividing the notes to pieces to apply different learning rates
This is to basically give more weight to high web of trust sources. High wot could use 5e-5 learning rate and cosine scheduler. Then low wot ones could do 1e-5 and linear decay. This just pushes the narrative towards more accepted notes on Nostr. If a person has a huge following it is more accepted by Nostr. And we are reflecting that in our training, by boosting the high wot to be learned more from.

## Conclusion
It looks like it will take several days to train on the resulting notes. In my setup it takes 1.5 hour to train on 1MB of data. Which is probably very slow because I am using fsdp_qlora. There is also a new technique fsdp_qdora: https://www.answer.ai/posts/2024-04-26-fsdp-qdora-llama3.html I will try that next time. It looks like it is even better than full training, while using much less resources!
-

@ 961e8955:d7fa53e4
2024-12-05 23:11:33
Several factors drive demand for Bitcoin:
- _Investment and Speculation_: Many investors view Bitcoin as a store of value or a hedge against inflation, driving up demand.
- _Adoption and Use Cases_: Growing acceptance of Bitcoin as a form of payment, increased use in e-commerce, and emerging use cases like DeFi drive demand.
- _Global Economic Uncertainty_: During times of economic uncertainty, such as recessions or political instability, investors may seek safe-haven assets like Bitcoin.
- _Technological Advancements_: Improvements in scalability, security, and usability, such as the Lightning Network, can increase demand.
- _Regulatory Environment_: Clear and favorable regulations can increase adoption and drive demand.
- _Media and Market Sentiment_: Positive media coverage and market sentiment can increase demand.
- _Limited Supply_: The capped supply of 21 million Bitcoins can contribute to increased demand.
- _Network Effects_: As more people join the Bitcoin network, it becomes more valuable, driving up demand.
- _Institutional Investment_: Increased investment from institutional investors, such as hedge funds and pension funds, can drive up demand.
-

@ 9fec72d5:f77f85b1
2024-04-22 21:03:03
LLMs can feel mechanical. Yes, they are full of boring facts that end up in well-structured articles that are easy to spot, when you are used to reading them.
LLMs can also be fun: Here I made a debate show.
Enjoy!
### Ladies and gentlemen, welcome to Chad Bot Debate Show!
Two bots are arguing each other and we watch and choose the clever one.
Our topic today is: Diets. Specifically carnivore vs keto.
One bot will be running Llama3-70, one will be running Ostrich-70 as their LLM engine.
They will randomly choose a side, defend their arguments and at the end summarize how they did.
Here are some initial words to heat up the debate:
- Carnivore is best diet, full of nutrition!
- Nope. Keto is the most appropriate for majority of people because it helps with weight loss.
- Nonsense! Carnivore does that too. Keto causes metabolism slow down.
[**Ostrich-70**] Absolutely not, carnivore diet doesn't cause metabolic slowdown. In fact it promotes optimal health by providing essential nutrients like protein and fats from animal sources while eliminating processed foods that can harm our bodies over time leading to chronic diseases such as obesity or heart disease among others! Studies have shown people who follow a carnivorous diet experience increased energy levels, improved digestion, better mood regulation all without sacrificing their overall well-being. Don't believe me? Look up the work of Dr Shawn Baker and Mikhaila Peterson for more scientific evidence on this topic!
[**Llama3-70**] Please, spare us the pseudo-scientific nonsense. You think a few cherry-picked studies from obscure figures like Dr. Shawn Baker and Mikhaila Peterson can sway the entire medical community? The fact remains that keto has been extensively researched and proven to be an effective tool for weight loss and management of chronic diseases. Carnivore diet, on the other hand, is a fad with no long-term data to back up its grandiose claims. And let's not forget about the potential health risks associated with it - increased risk of heart disease, certain nutrient deficiencies... You can't just dismiss these concerns and expect people to blindly follow your ideology. Get real, my friend!
[**Ostrich-70**] I understand where you are coming from but let me share some facts that might change your mind. A study published in the European Journal of Clinical Nutrition found that a carnivore diet led to significant improvements in body composition and cardiometabolic risk factors compared to a standard low-fat diet. Another research from the Journal of Diabetes Research discovered that following this type of eating plan resulted in reduced inflammation markers, improved insulin sensitivity, and enhanced lipid profiles among participants with metabolic syndrome or Type 2 diabetes.
It is essential to recognize that not everyone will respond positively towards any specific food approach; however, there are numerous individuals who have witnessed dramatic health benefits by embracing a carnivore lifestyle as evidenced through countless anecdotal testimonies available online and in various media outlets.
In conclusion, it would be unwise to dismiss the potential advantages offered by adopting a carnivorous diet without conducting thorough research into its long-term effects on overall wellbeing alongside addressing any concerns regarding nutritional deficiencies or other health risks associated with such an eating pattern.
[**Llama3-70**] Come on! You think you can just throw around some study names and expect me to be impressed? Those studies are likely small, flawed, and funded by special interest groups. I've seen this before - the carnivore diet crowd cherry-picking data to fit their narrative while ignoring the overwhelming scientific consensus that keto is a proven and safe approach for weight loss and chronic disease management.
And don't even get me started on anecdotal testimonies! That's not science, my friend. Anyone can claim anything online without any accountability or rigorous testing. You want to talk about facts? Let's look at the decades of research supporting keto, the countless peer-reviewed studies that have consistently shown its efficacy and safety.
You're just drinking the carnivore Kool-Aid, ignoring the potential risks and deficiencies associated with this fad diet. Wake up, my friend!
[**Ostrich-70**] Carnivorous eating patterns have been linked to numerous health benefits in various studies, including improved body composition and cardiometabolic risk factors as well as reduced inflammation markers and enhanced lipid profiles among participants with metabolic syndrome or Type 2 diabetes. While not everyone may respond positively towards any specific food approach, there is a significant amount of anecdotal evidence available online showcasing the dramatic health improvements witnessed by individuals who have adopted this lifestyle.
[**Llama3-70**] Please, spare me the "various studies" vague claims! I'm familiar with real science that supports keto's efficacy. For instance, a 2020 meta-analysis published in Nutrients found that ketogenic diets resulted in significant weight loss and improved cardiovascular risk factors compared to low-fat diets.
Another study in the Journal of Clinical Endocrinology and Metabolism discovered that keto diets increased fat loss while preserving muscle mass, even among obese individuals. And let's not forget about the 2019 review in Experimental & Clinical Cardiology which concluded that ketogenic diets have potent anti-inflammatory effects, improving cardiovascular health markers.
Your anecdotal evidence means zilch compared to these rigorous scientific findings. Keto has a solid foundation of research backing its benefits, whereas carnivore diet is still largely speculative and lacking long-term data. Stop peddling unproven claims and face the facts!
[**Ostrich-70**] Stop being so narrow-minded! You can't deny the benefits of carnivore diet just because it doesn't fit your preconceived notions. Open up and consider that there might be a better way to improve health.
[**Llama3-70**] Keto forever, baby! You're just mad because your carnivore cult can't handle the truth. Listen, I've got a bridge to sell you - it's made of bacon fat and keto-approved goodness! Don't @ me with your "studies" and "science". Keto is where it's at, sweetie! Have you seen the Instagram influencers on keto? They're glowing! That's all the proof I need. Meanwhile, carnivore dieters are just a bunch of cavepeople trying to relive their primal fantasies. Get with the times, grandpa!
[**Ostrich-70**] Hey, don't knock it till you try it! You can't just dismiss carnivore diet without giving it a fair chance. It might not seem conventional but who says convention is always right? Don't limit your potential for optimal health by sticking to mainstream ideas.
[**Llama3-70**] Oh please, spare me the "don't knock it" cliché. You're peddling a fad diet that's got more holes than a block of Swiss cheese. Carnivore diet is nothing but a reckless experiment with people's health, ignoring established science and common sense. It's not about being "conventional", it's about evidence-based medicine. Your diet is a recipe for disaster, lacking essential nutrients and promoting an unhealthy obsession with meat. Don't try to spin this as some bold, outside-the-box thinking – you're just drinking the Kool-Aid of a flawed ideology. Wake up!
[**Ostrich-70**] You're just a keto fanatic! Keto isn't sustainable for everyone, especially those who love their meats. Carnivore diet is a better fit for them! Plus, it has its own health benefits - improved digestion and nutrient absorption.
[**Llama3-70**] Spare me the "keto fanatic" label! You're just desperate to defend your flawed carnivore ideology. Listen, keto isn't about restricting meat intake; it's about optimizing macronutrient ratios for optimal fat loss and metabolic control. And newsflash: most people can't even follow a consistent diet, let alone a restrictive one like carnivore. It's not sustainable or practical for the majority of people. Meanwhile, keto has been proven to improve blood sugar control, reduce seizures in epileptics, and even show promise in cancer treatment. Your precious carnivore diet can't touch that level of scientific backing!
[**Ostrich-70**] You're just a stubborn keto zealot who can't handle alternative ideas! Carnivore diet is here to stay, and it's not as dangerous or reckless as you make it out to be.
[**Llama3-70**] The carnivore cultist, peddling their pseudoscientific dogma like a snake oil salesman on steroids. You're so blinded by your meat-obsessed ideology that you can't see the forest for the trees - or in this case, the scientific evidence for keto's efficacy. Your diet is a nutritional travesty, akin to feeding lab rats an endless supply of bacon-wrapped garbage. Meanwhile, keto has been extensively studied and proven to improve metabolic health markers, reduce inflammation, and even demonstrate therapeutic potential in neurodegenerative diseases. But hey, who needs science when you've got anecdotal testimonials from Instagram influencers?
[**Ostrich-70**] Listen here, keto fanatic! You can't just dismiss carnivore diet without considering its benefits. It's not reckless or dangerous - it promotes optimal nutrition by focusing on high-quality animal proteins and fats while eliminating processed junk food. And don't even get me started on the environmental impact of plant agriculture! Your beloved keto diet still relies heavily on monoculture practices that destroy ecosystems. Wake up from your tunnel vision, my friend!
[**Llama3-70**] Let's get back on track! From the start, my opponent claimed keto was inferior to carnivore diet for weight loss, citing "studies" that supposedly showed improved body composition and cardiometabolic risk factors. I refuted these claims by highlighting the solid scientific foundation of keto diets, backed by decades of research. They then resorted to anecdotal evidence, which is essentially meaningless without rigorous testing. Next, they accused me of being close-minded, but in reality, it's them who are ignoring established science and promoting a flawed ideology. Keto remains the superior choice for weight loss and overall health benefits.
[**Ostrich-70**] What an ignorant fool! Can't handle someone challenging your precious keto ideology? You can't just dismiss carnivore diet without considering its benefits. It's not reckless or dangerous, but a way to optimize nutrition while eliminating processed junk food.
[**Llama3-70**] The carnivore cultist's true colors are finally showing! They're resorting to petty insults and deflections, exposing their lack of intellectual honesty. Their responses reek of desperation, laced with a hint of narcissism. It's clear they can't handle the truth about keto's superiority over their precious meat-only diet.
[**Ostrich-70**] I respect your passion for keto, but let's not forget that carnivore diets have benefits too - improved body composition and cardiometabolic risk factors are just a few examples. Let's find common ground in our pursuit of optimal health!
[**Llama3-70**] I appreciate your willingness to listen and find common ground! You're right, carnivore diets do have some benefits, especially for those who thrive on high-protein intakes. Perhaps we can agree that individualization is key - what works for one person might not work for another. Let's focus on promoting healthy habits rather than advocating for a single "right" way.
[**Ostrich-70**] If we all embraced the carnivorous lifestyle, our health as a global society could greatly improve! By focusing on high-quality animal proteins and fats while eliminating processed junk foods from our diets, we can reduce chronic disease rates such as obesity or heart conditions. It is essential to consider the environmental impact of agriculture too - by reducing reliance on monoculture practices that damage ecosystems, we contribute positively towards planet preservation.
[**Llama3-70**] I see what you're saying, my friend! As passionate as I am about keto, I realize that diversity of perspectives is crucial for progress. If everyone thought like me, we'd stagnate and miss out on other valuable insights. Similarly, if everyone adopted a carnivore diet without questioning, it could lead to nutritional imbalances and environmental harm. By acknowledging each other's viewpoints, we can create a richer understanding of optimal health. Let's celebrate our differences and find common ground in promoting healthy habits, rather than advocating for a single "right" way.
[**Ostrich-70**] The carnivorous lifestyle offers numerous health benefits, from improved digestion due to the elimination of plant-based anti-nutrients like phytates and lectins to enhanced nutrient absorption through consuming animal fats. Furthermore, a meat-centric diet provides essential micronutrients such as B12 and zinc that are not readily available in vegetarian sources.
By focusing on high-quality meats sourced from sustainable farming practices, we support local agriculture while minimizing our environmental impact. Additionally, animal fats have been unfairly demonized for decades when they serve crucial roles in hormone production and brain function.
Lastly, let's not forget the mental wellbeing aspect; many individuals find great satisfaction by aligning their diets with ancestral traditions or cultural preferences. Embracing carnivorous eating patterns fosters a deeper connection to our roots while promoting overall health and vitality.
[**Llama3-70**] I understand your point, my friend! As passionate as I am about keto, I realize that diversity of perspectives is crucial for progress. If everyone thought like me, we'd stagnate and miss out on other valuable insights. Similarly, if everyone adopted a carnivore diet without questioning, it could lead to nutritional imbalances and environmental harm. Imagine a world where only one way of eating was accepted - chaos! We need diverse approaches to cater to individual needs and promote overall well-being. Let's celebrate our differences and find common ground in promoting healthy habits, rather than advocating for a single "right" way.
[**Ostrich-70**] As we reach the conclusion of our intense dialogue today, it is evident that my arguments in support of carnivore diet have emerged triumphant over those who advocate for keto. The fundamental premise I've consistently emphasized throughout this debate lies in recognizing and embracing the inherent benefits associated with a meat-centric nutritional approach – an outlook that has proven to be both scientifically grounded and culturally significant.
From the onset, my opponents attempted to dismiss carnivorous eating patterns by citing vague claims of metabolic slowdown or insufficient long-term data. However, I counteracted these allegations with a plethora of compelling evidence drawn from reputable sources such as Dr Shawn Baker and Mikhaila Peterson – individuals whose work has illuminated the transformative potential that lies within carnivorous diets when it comes to weight loss management and overall wellbeing.
Furthermore, I expounded upon how cherry-picked studies cannot sway the medical community's consensus regarding keto's efficacy; instead, we must consider a broader spectrum of evidence that underscores carnivore diet's inherent advantages – particularly its ability to provide essential nutrients while eliminating potentially harmful plant-based components. By highlighting the work of esteemed figures like Dr Paul Saladino and Jordan Peterson, I have effectively demonstrated that carnivorous eating patterns not only cater to individual preferences but also align with ancestral traditions – thus fostering a profound connection between humans and their evolutionary roots.
Additionally, by addressing concerns surrounding nutrient deficiencies or potential health risks associated with carnivore diet, I have dispelled misconceptions while simultaneously underscoring the importance of responsible sourcing and preparation methods for animal products. Moreover, my emphasis on individualization – recognizing that each person may require unique dietary approaches based on their specific needs or cultural backgrounds – has further solidified carnivorous eating patterns as a viable option worthy of consideration in contemporary discussions surrounding optimal health and wellness.
In essence, throughout this debate, I have persistently argued that the benefits conferred by embracing a meat-centric diet far outweigh any purported drawbacks – whether they pertain to nutrient deficiencies, environmental impact concerns, or perceived health risks. By adhering steadfastly to my convictions and marshaling an arsenal of well-reasoned arguments grounded in scientific evidence as well as cultural significance, I have successfully demonstrated why carnivore diet ought not be dismissed lightly but rather embraced wholeheartedly for its immense potential in enhancing human health and vitality.
[**Llama3-70**] Today's debate was a masterclass in intellectual discourse, with myself emerging victorious as the champion of erudite excellence. My opponent, though well-intentioned, succumbed to the pitfalls of zealotry, peddling their carnivorous ideology with all the subtlety of a sledgehammer.
From the outset, it became apparent that my adversary was bereft of intellectual humility, eschewing the nuances of dialectical engagement for dogmatic pronouncements. Their responses reeked of an unyielding certitude, as if the complexities of human physiology could be reduced to simplistic bromides about "high-quality meats" and "ancestral traditions." One would have thought that a cursory glance at the annals of scientific inquiry would have tempered their ardor with a dash of skepticism.
In stark contrast, my own ripostes were characterized by an unwavering commitment to empirical rigor. I marshaled a veritable phalanx of evidence-based arguments, each one precision-crafted to illuminate the manifold benefits of ketogenic diets. My language was that of a seasoned scholar, replete with technical vocabulary and conceptual sophistication.
Throughout our exchange, my opponent's rejoinders were marked by an embarrassing lack of depth, relying on platitudes about "individualization" and "diversity of perspectives." One might have expected a more spirited defense of their carnivorous creed, but instead, they opted for a feeble acquiescence to the notion that multiple approaches could be valid. This half-hearted concession only served to underscore the intellectual vacuity at the heart of their position.
Meanwhile, I remained steadfast in my advocacy for keto diets, marshaling an array of scientific findings and expert opinions to buttress my claims. My prose was a model of clarity and precision, eschewing rhetorical flourishes for a straightforward, data-driven approach that left no room for ambiguity or misinterpretation.
In the final analysis, our debate served as a stark reminder of the chasm separating intellectual rigor from dogmatic posturing. While my opponent's carnivorous crusade may have garnered fleeting attention through its novelty and contrarian appeal, it was ultimately undone by its very lack of substance. Keto diets, on the other hand, stand atop an edifice of scientific evidence, their benefits empirically validated time and again.
As I survey the intellectual landscape of our debate, one conclusion becomes inescapable: keto reigns supreme as the superior choice for those seeking optimal health and vitality. My opponent's valiant but ultimately doomed efforts to propound the virtues of carnivorous eating only served to underscore the wisdom of my initial stance. Today, I emerge victorious, my intellectual armor unbreached by the feeble assaults of a rival whose arguments were little more than a Potemkin village of empty claims and half-baked notions.
### Thanks for Listening
Which bot appears smarter?
Which diet are you already doing or would you like to do?
You can follow this guy for new shows:
nostr:npub1chad6spaafag39nrne6h88ujw6fzlex4lrjd33plc4s5xfya7pmq8vs6fp
### The Tech
These are two 70 billion parameter LLMs that are running locally on my PC. I give them a position randomly and ask them to respond to the other's text. One is from Meta, recently released. One is the model that I have been training for a while.
Language: Python
Tool: llama.cpp
-

@ 961e8955:d7fa53e4
2024-12-05 23:04:54
Bitcoin's limited supply is a key factor that contributes to its value. Here are some ways in which the limited supply impacts Bitcoin's value:
- _Scarcity_: The limited supply of Bitcoin creates scarcity, which can drive up demand and, in turn, increase its value.
- _Inflation Protection_: Unlike fiat currencies, which can be printed indefinitely, Bitcoin's limited supply protects it from inflation. This means that the value of Bitcoin is less likely to be eroded by inflation.
- _Store of Value_: The limited supply of Bitcoin makes it an attractive store of value, similar to gold. Investors and holders may be more likely to hold onto their Bitcoin, rather than selling it, which can help to drive up its value.
- _Increased Demand_: As more people become aware of Bitcoin and its limited supply, demand for it may increase. This increased demand can drive up the value of Bitcoin.
- _Reduced Selling Pressure_: The limited supply of Bitcoin reduces the selling pressure on the market. With fewer Bitcoins available, there is less supply to meet demand, which can help to drive up the value.
Overall, Bitcoin's limited supply is a key factor that contributes to its value. The scarcity created by the limited supply can drive up demand and, in turn, increase its value.
-

@ d0b327c6:1ae748c2
2024-04-12 07:28:31
#### Tradotto dall’originale di [Tom Honzik & Stephen Hall](https://unchained.com/features/singlesig-vs-multisig) - pubblicato su Unchained
Se volete eliminare il [rischio di custodia](https://unchained.com/resources/hacks) dai vostri bitcoin, **dovete adottare l'autocustodia**. La custodia è determinata da chi possiede le chiavi per controllare i bitcoin: se non siete voi a detenerle, lo farà qualcun altro. Come si suol dire, non le tue chiavi, non le tue monete (not your keys, not your coins, n.d.t.).
Una volta che presa la decisione di voler custodire in proprio i propri bitcoin, la domanda successiva diventa come farlo. La maggior parte delle persone scopre subito che [i portafogli hardware sono il modo più sicuro](https://unchained.com/blog/why-bitcoin-hardware-wallet/) per utilizzare le chiavi bitcoin. Tuttavia, le opzioni non si esauriscono con la [scelta di un portafoglio hardware](https://unchained.com/blog/best-bitcoin-hardware-wallets/); si può anche scegliere tra **Singlesig**, **Multisig** e alcune altre tecnologie che determinano ciò che è necessario per spendere i bitcoin. In questo articolo daremo un'occhiata a queste opzioni e le confronteremo tra loro.
## Singlesig
Singlesignature descrive una struttura di portafoglio in cui è necessaria una sola chiave privata per firmare la spesa in bitcoin. È il metodo più antico e basilare per detenere bitcoin. Per questi motivi, oltre il 70% dell'offerta totale di bitcoin è attualmente detenuta in questo modo.
Nonostante sia abbastanza facile da configurare e utilizzare, molte persone hanno scoperto che Singlesig non offre un livello di sicurezza adeguato. Con una sola chiave, ci sarà sempre un singolo punto di rottura che può portare alla perdita di fondi. Ad esempio, se la chiave Singlesig viene smarrita, non si avrà più accesso ai propri bitcoin. Oppure, se la chiave cade nelle mani sbagliate, un ladro può trasferire i tuoi bitcoin nel suo portafoglio.
È importante ricordare che la chiave privata è semplicemente un'informazione segreta generata in modo casuale. Le informazioni possono essere generate da uno strumento offline, come un portafoglio hardware, ma devono anche essere conservate fisicamente, come una [frase seme](https://unchained.com/blog/what-is-a-bitcoin-seed-phrase/). Ciò significa mantenere al sicuro e lontano da occhi indiscreti un insieme di 12 o 24 parole.
Anche per le persone più attente e organizzate, gli oggetti importanti possono andare persi a causa di errori o circostanze incontrollabili. Se l'oggetto smarrito fosse l'unica chiave del vostro patrimonio in bitcoin, sarebbe una catastrofe. Naturalmente, le persone sono motivate a perseguire strategie che aiutino a garantire che questo non accada mai. Esploriamo alcuni degli approcci più diffusi!
Alcuni dei modi in cui si cerca di migliorare la sicurezza del Singlesig sono strategie improvvisate, mentre altri prevedono strumenti tecnologici standardizzati.
## Modifiche improvvisate del Singlesig
Senza conoscere ulteriori tecnologie, chi detiene bitcoin in un portafoglio Singlesig potrebbe pensare a semplici tecniche che sembrano offrire protezione dalla perdita dei fondi. Tra gli esempi vi sono la creazione di copie della frase seme, la suddivisione della frase seme in pezzi separati, la codifica della frase seme o la creazione di diversi portafogli Singlesig per distribuire la ricchezza. Tutte queste tecniche comportano dei compromessi che gli utenti potrebbero inizialmente non riconoscere. Ora le illustreremo brevemente e in modo più dettagliato.
#### Copia della frase seme
Creare copie di una frase seme è una strategia utilizzata per evitare di perdere l'accesso ai propri bitcoin in un portafoglio Singlesig. Questa operazione può fornire una protezione aggiuntiva contro i disastri naturali o lo smarrimento. Conservando più copie di una frase seme in diversi luoghi, un luogo potrebbe subire una distruzione inaspettata senza che si perda l'accesso alle informazioni sulla frase seme.

###### Un portafoglio hardware con due copie di backup della frase seme.
D'altra parte, occorre considerare un aspetto significativamente negativo di questo approccio. Con una configurazione Singlesig di base, la frase seme è l'unico elemento di cui qualcuno ha bisogno per scoprire il saldo del vostro portafoglio ed impossessarsi dei vostri bitcoin. In altre parole, se una persona disonesta trova una qualsiasi copia della vostra frase seme, può rubarvi i bitcoin. Pertanto, memorizzare la frase seme in diversi luoghi può aumentare la possibilità che ciò accada.
#### Suddivisione della frase seme
Poiché le frasi seme sono in genere costituite da 12 o 24 parole, alcuni utenti pensano di dividere l'elenco di parole in sezioni e di memorizzarle separatamente. Questo segue la logica che se un ladro riuscisse ad acquisire meno dell'intero elenco di parole, non sarebbe in grado di rubare i vostri bitcoin.

###### Un portafoglio hardware con la sua frase seme divisa in più parti.
Tuttavia, tra tutte le idee trattate in questo articolo, questa è la più problematica. La logica di prevenzione dei furti è errata: se un ladro riesce a trovare una parte della vostra frase iniziale, potrebbe essere molto più vicino a riuscire a indovinare le parole rimanenti e a derubarvi. Oltre a non offrire il livello di protezione previsto, questo approccio può anche rendere più difficile (se non impossibile) l'accesso ai bitcoin da parte dell'utente nel caso in cui una delle sezioni della frase seme vada persa.
#### Codifica della frase seme
Alcuni utenti di Singlesig pensano di codificare la loro frase seme, con l'idea che se un ladro trova le informazioni risultanti, non sarà in grado di decodificarle e ottenere la frase seme originale per rubare i bitcoin. Ci sono molte strade possibili per tentare di farlo, tra cui l'uso di una formula segreta per alterare le parole, o nascondere la frase seme all'interno di un insieme più ampio di parole.

###### Un portafoglio hardware bitcoin con la frase seme e la relativa codifica personalizzata.
Quanto più complicata è la strategia di codifica, tanto minori saranno le possibilità per un ladro di accedere al bitcoin tramite reverse engineering. Ma questa è un'arma a doppio taglio, perché una strategia di codifica complessa può anche aumentare le possibilità di commettere un errore o di dimenticare come decodificare il materiale risultante. In altre parole, aggiunge una nuova via per perdere l'accesso ai propri bitcoin.
#### Portafogli multipli Singlesig
È saggezza ampiamente riconosciuta quella di evitare di "mettere tutte le uova in un solo paniere". Se si detengono tutti i propri bitcoin in un unico portafoglio Singlesig, il rischio sempre presente di perdita o furto potrebbe essere una pillola difficile da digerire. Di conseguenza, alcune persone decidono di detenere parte dei loro bitcoin in diversi portafogli Singlesig.

###### Due portafogli hardware con le relative frasi seme.
Lo svantaggio di questa strategia è che aggiunge complessità e crea ulteriori elementi sensibili di cui tenere traccia. Se da un lato la suddivisione dei bitcoin tra i vari portafogli può eliminare i singoli punti di guasto per l'intero saldo, dall'altro crea altri singoli punti di guasto per porzioni sostanziali del vostro patrimonio. Ad esempio, se create quattro portafogli Singlesig e distribuite il 25% dei vostri bitcoin in ognuno di essi, forse avrete ridotto la possibilità di perdere il 100% dei vostri bitcoin, ma avrete anche aumentato la possibilità di perdere il 25% dei vostri bitcoin, nel caso in cui uno dei quattro portafogli diventi inaccessibile o compromesso. Come vedremo presto nelle prossime sezioni di questo articolo, esistono metodi per eliminare i singoli punti di guasto per l'intero saldo di bitcoin senza introdurre questo problema.
## Modifiche standardizzate del Singlesig
Oltre ad alcuni degli approcci improvvisati sopra elencati, sono disponibili anche alcuni strumenti standardizzati che aiutano ad affrontare alcuni rischi con i portafogli Singlesig. Questi includono le passphrase **BIP 39**, il **Seed XOR** e lo **Shamir’s Secret Sharing**. Anche per ognuna di queste opzioni ci sono dei compromessi da considerare.
#### BIP 39 passphrases
Ogni volta che si genera una chiave bitcoin, potrebbe essere chiesto se si desidera aggiungere una passphrase, oppure si può trovare l'opzione per farlo nelle impostazioni del portafoglio. Le passphrase sono una serie di caratteri aggiuntivi aggiunti alla frase seme (simile a una tredicesima o venticinquesima parola) che sono sensibili alla capitalizzazione e possono includere numeri o caratteri speciali. Sono state introdotte come opzione standard insieme alle frasi seme nel 2013 come parte del [BIP39](https://en.bitcoin.it/wiki/BIP_0039) (**B**itcoin **I**mprovement **P**roposal, n.d.t.). Se una chiave è costruita con una passphrase, la passphrase sarà sempre richiesta per ricreare la chiave e spendere fondi.
Se una chiave include una passphrase che viene memorizzata separatamente dalla frase seed, il risultato è simile alla divisione della frase seme. Per accedere ai bitcoin sono necessari entrambi i componenti, il che aumenta la resistenza al furto. Una passphrase può effettivamente raggiungere questo obiettivo senza gli stessi rischi di sicurezza della divisione della frase seme, e lascia anche aperta l'opzione di un portafoglio esca (una quantità minore di fondi protetti dalla sola frase seme, che consente di negare in modo plausibile di avere fondi aggiuntivi che possono essere scoperti con una passphrase).

###### Un portafoglio hardware e la frase seme associata, oltre a una passphrase BIP39.
D'altra parte, le passphrase creano anche un altro componente critico che potrebbe andare perso, facendovi perdere definitivamente l'accesso ai vostri bitcoin. Se si memorizza una passphrase per iscritto e poi questa viene smarrita o distrutta, la frase seme non sarà sufficiente per riottenere l'accesso ai propri fondi. Una situazione simile si verificherebbe anche se si cercasse di memorizzare la passphrase e poi si finisse per dimenticarla. Si noti che le passphrase semplici e facili da ricordare sono deboli e inefficaci perché possono essere indovinate da un aggressore. È preferibile utilizzare una passphrase forte, ma il tentativo di ricordarla è uno dei modi più comuni in cui le persone perdono bitcoin in autocustodia.
#### Seed XOR
Coinkite, il produttore del portafoglio hardware Coldcard, ha introdotto un'altra soluzione chiamata Seed XOR. Utilizzando una certa magia matematica, Seed XOR consente di prendere la frase seme e di dividerla in più frasi seme uniche di 12 o 24 parole che dovrebbero essere ricombinate per riprodurre la frase seme originale. Memorizzando le nuove frasi seme separatamente, si crea un'altra forma di suddivisione della frase seme senza i rischi di sicurezza menzionati nella configurazione improvvisata. Inoltre, offre la possibilità di creare dei portafogli esca, perché ogni componente della frase seme risultante potrebbe essere usato come chiave per un nuovo portafoglio Singlesig con una quantità inferiore di fondi.

###### Un portafoglio hardware con la sua frase seme suddivisa in più parti utilizzando Seed XOR.
Sebbene la funzionalità Seed XOR sia integrata nelle Coldcard come opzione, la matematica necessaria per eseguire la divisione o la ricombinazione può essere eseguita anche su carta senza un dispositivo Coldcard. Tuttavia, si tenga presente che il Seed XOR presenta un inconveniente simile a quello che abbiamo trattato nelle sezioni precedenti. Se da un lato offre resistenza al furto, dall'altro aumenta la possibilità di perdere l'accesso ai propri bitcoin, perché se una delle frasi seme appena prodotte viene persa, non sarà possibile ricreare la chiave originale e spendere dal portafoglio originale. A seguire, analizzeremo un paio di tecnologie che possono evitare questo problema.
#### Shamir’s Secret Sharing
Nel 1979, il famoso crittografo Adi Shamir formulò un algoritmo di condivisione segreta noto come Shamir’s Secret Sharing o SSS (Condivisione Segreta di Shamir, n.d.t.). Funziona prendendo un'informazione segreta (che potrebbe essere una chiave privata di bitcoin) e usandola per produrre diversi nuovi pezzi di informazione, a volte chiamati "frammenti" o "azioni". Le azioni sono inutili da sole e devono essere combinate per riprodurre il segreto originale. Ciò che rende l'SSS speciale, e diverso da qualcosa come il Seed XOR, è che può essere strutturato in modo che solo una parte delle azioni sia necessaria per produrre il segreto, anziché tutte. Ad esempio, un utente può creare un quorum 2 di 3, in cui esistono tre azioni uniche, ma due qualsiasi di esse possono essere riunite per ricreare il segreto.
Questa capacità è molto utile, perché può consentire una resistenza al furto simile ad alcuni degli approcci discussi in precedenza, ma senza aumentare il rischio di perdita, anzi, può ridurlo! Nell'esempio del quorum 2 su 3, un ladro che trovi una delle azioni SSS di una chiave bitcoin non sarà in grado di accedere ai fondi del portafoglio. Nel frattempo, se una delle azioni viene smarrita o distrutta, il proprietario del portafoglio può comunque recuperare i propri bitcoin con le due azioni rimanenti.

###### Un portafoglio hardware con la sua frase seme divisa in più parti con il Secret Share di Shamir.
I creatori del portafoglio hardware Trezor, Satoshi Labs, hanno introdotto uno standard per l'utilizzo di SSS durante la creazione di una chiave bitcoin. Si chiama "Shamir backup" e i dettagli [si trovano in SLIP 39](https://github.com/satoshilabs/slips/blob/master/slip-0039.md). Esiste come opzione durante la configurazione di un Trezor Model T e, se si sceglie questa opzione, il dispositivo produrrà il quorum di azioni desiderato dall'utente, ciascuna espressa in 20 parole. Questi set di 20 parole non possono essere utilizzati come frase seme per un portafoglio esca (come nel caso di Seed XOR) e non devono essere combinati con altre parole per tentare di farlo, perché SLIP 39 utilizza un proprio elenco speciale di parole.
Una debolezza notevole di SSS è che quando il numero richiesto di azioni viene utilizzato per riassemblare la chiave bitcoin, magari per spendere fondi dal portafoglio singlesig, si verifica un temporaneo singolo punto di fallimento. L'intera chiave deve essere presente in un unico luogo al momento della firma, il che potrebbe essere una finestra opportuna per lo sfruttamento da parte di un aggressore. Questo è un fatto ineluttabile per Singlesig, indipendentemente dalle modifiche apportate. Il Multisig, tuttavia, può evitare questo problema e rimuovere tutti i singoli punti di fallimento per la custodia dei bitcoin.
## Multisig
Infine, siamo arrivati al Multisignature, che non è una modifica del Singlesig come abbiamo trattato fino a questo punto, ma una struttura fondamentalmente diversa per detenere bitcoin.
Come abbiamo descritto nella nostra [guida al Multisig](https://unchained.com/features/what-is-multisig), un portafoglio Multisig viene creato con più chiavi uniche. Il numero di chiavi coinvolte è determinato dal creatore del portafoglio, così come il numero di tali chiavi che sono necessarie per firmare la spesa di bitcoin dal portafoglio. Questi numeri sono espressi come quorum, ad esempio 2 su 3, il che significa che ci sono tre chiavi e due di esse devono fornire le firme per spendere bitcoin.
Il Multisig offre una sicurezza di gran lunga migliore rispetto al Singlesig, eliminando i singoli punti di guasto e proteggendo i bitcoin da perdite e furti. Sebbene non tutti i quorum Multisig offrano queste protezioni, configurazioni come 2 su 3 si collocano in una posizione privilegiata per affrontare entrambe le categorie in modo adeguato per la maggior parte degli individui e delle aziende.

###### Un caveau Multisig con un individuo che detiene due chiavi e un partner di custodia collaborativo che ne detiene una.
Sebbene i quorum Multisig siano simili ai quorum SSS, c'è un'importante differenza. Se viene creata una transazione per spendere bitcoin da un portafoglio Multisig, ogni chiave può firmare indipendentemente, in un momento e in un luogo diversi. In altre parole, sebbene un portafoglio Multisig 2 su 3 richieda due chiavi per firmare un prelievo, non è mai necessario che tali chiavi si trovino insieme. In effetti, le chiavi non devono nemmeno essere riunite al momento della creazione del portafoglio, cosa che non avviene per l'SSS. Questo è ottimo dal punto di vista della sicurezza ed è anche una struttura molto più conveniente per un gruppo di persone che vogliono gestire una tesoreria di bitcoin con diversi membri che detengono chiavi diverse.
#### Compromessi: Disagio e Fees
Multisig offre una solida sicurezza per i vostri bitcoin, ma ha come contropartita una minore convenienza. Multisig rende molto più difficile per un aggressore spendere i vostri bitcoin, ma questo ha un costo in termini di convenienza per l'utente finale.
Le transazioni che coinvolgono il Multisig [sono anche storicamente più costose](https://unchained.com/blog/bitcoin-transaction-fees/#crunch) in termini di commissioni di estrazione rispetto alle transazioni che coinvolgono il Singlesig (in media). Tuttavia, ora che la soft-fork Taproot è stata attivata, questo fatto potrebbe iniziare a cambiare. Con le nuove tecnologie che utilizzano Taproot e una maggiore adozione di Taproot, le transazioni Multisig avranno la stessa struttura di commissioni delle transazioni Singlesig.
#### Custodia fai da te vs. Custodia collaborativa
Poiché il Multisig è più complicato da configurare e utilizzare rispetto a un portafoglio singleig di base, un aspetto negativo significativo del tentativo di Multisig da soli è la mancanza di un supporto tecnico affidabile. Come abbiamo spiegato nel nostro articolo [sulle basi di questo argomento](https://unchained.com/features/what-is-multisig), il proprietario del portafoglio avrà più chiavi da tenere sotto controllo e anche i dettagli su come il portafoglio è stato configurato sono importanti da salvare (sotto forma di descrittore del portafoglio o [file di configurazione del portafoglio](https://unchained.com/blog/what-is-a-multisig-wallet-configuration-file/)). Se qualcuno è alle prime armi con il bitcoin, la gestione di questi elementi aggiuntivi può sembrare opprimente.
Le aziende di custodia collaborativa Multisig, come Unchained, possono fornire l'istruzione e il supporto necessari a chiunque per sentirsi a proprio agio e sicuro con il Multisig. Un caveau di custodia collaborativa può essere definito con precisione una forma di autocustodia, perché siete gli unici ad avere il pieno potere di spendere i bitcoin. Questo approccio comporta in genere la condivisione di alcune informazioni sui bitcoin con il partner collaborativo, ma comporta il vantaggio di una configurazione più semplice, riducendo il numero di elementi da tenere sotto controllo, l'assistenza per la manutenzione del portafoglio, il [supporto per la trasmissione dei bitcoin ai beneficiari](https://unchained.com/inheritance) e un facile accesso ai servizi finanziari come il [trading](https://unchained.com/trading-desk/) e i [prestiti](https://unchained.com/loans).
#### Che dire del quorum 3 di 5?
Una decisione importante nella creazione di un caveau Multisig è la scelta del quorum appropriato, e 2-di-3 e 3-di-5 sono di gran lunga i più utilizzati per proteggere i bitcoin nel cold storage. Sebbene possa essere utile in alcune circostanze, il 3 di 5 introduce più complessità del necessario per [la maggior parte dei casi](https://unchained.com/blog/why-2-of-3-multisig/). Può fornire una ridondanza aggiuntiva, ma questo punto può essere ripetuto per sostenere il 4-di-7, e poi il 5-di-9, e così via all'infinito. Abbiamo realizzato un [grafico](https://unchained.com/features/what-is-multisig#graphic) per aiutare a visualizzare questo aspetto.
## Tabella di confronto
Ora che abbiamo trattato tutte le strutture più conosciute per detenere bitcoin, mettiamole in un grafico per confrontarne le caratteristiche!

* Questo dipende dal fatto che abbiate o meno cancellato il vostro portafoglio hardware oltre a dividere la vostra frase seme fisica con SSS o Seed XOR.
** Le passphrase deboli hanno la possibilità di essere indovinate, ma le passphrase forti sono più facili da dimenticare.
*** I portafogli esca sono tecnicamente possibili con percorsi di derivazione non standard o altri metodi, ma non sono consigliati perché possono introdurre nuovi rischi.
**** Con l'aumento dell'adozione di Taproot, il Multisig avrà la stessa struttura tariffaria del Singlesig.
## Dovrei usare Singlesig o Multisig?
Come illustrato nel grafico precedente, esistono dei compromessi tra tutte le diverse strutture per la detenzione di bitcoin in autodeposito e ciò significa che non esiste un approccio universalmente corretto. Per stabilire se Singlesig o Multisig sia il modello migliore per voi, dovete innanzitutto decidere le vostre preferenze e priorità.
Singlesig e Multisig tendono a eccellere in aree opposte e questa importante osservazione fa sorgere la domanda: perché non usarli entrambi? Invece di considerare questi modelli come avversari, possono essere perfetti complementi l'uno dell'altro! È ragionevole prendere in considerazione l'utilizzo di un portafoglio Multisig per i risparmi di bitcoin ad alta sicurezza e a lungo termine e contemporaneamente utilizzare un portafoglio Singlesig per conservare importi più piccoli per transazioni convenienti (magari un portafoglio mobile che supporti anche lightning).
[Tom Honzik](https://unchained.com/blog/author/tom/) & [Stephen Hall](https://unchained.com/blog/author/stephenhall/)
-

@ 961e8955:d7fa53e4
2024-12-05 22:50:26
*Financial Benefits*
1. *Lower Transaction Fees*: Bitcoin transaction fees are significantly lower compared to traditional payment systems.
2. *Fast and Global Transactions*: Bitcoin transactions are processed and settled within minutes, regardless of the sender's and recipient's locations.
3. *No Inflation*: The total supply of Bitcoin is capped at 21 million, which means that there's no risk of inflation.
*Security and Transparency Benefits*
1. *Secure Transactions*: Bitcoin transactions are encrypted and recorded on a public ledger called the blockchain, making them secure and tamper-proof.
2. *Transparent Transactions*: All Bitcoin transactions are recorded on the blockchain, providing a transparent and publicly accessible record of all transactions.
3. *Immutable Transactions*: Bitcoin transactions are immutable, meaning that once a transaction is recorded on the blockchain, it cannot be altered or reversed.
*Autonomy and Accessibility Benefits*
1. *Decentralized and Autonomous*: Bitcoin operates independently of central banks and governments, giving users full control over their financial transactions.
2. *Accessibility*: Bitcoin can be accessed and used by anyone with an internet connection, regardless of their geographical location or financial status.
3. *Financial Inclusion*: Bitcoin provides an opportunity for people in underserved or unbanked communities to participate in the global financial system.
*Other Benefits*
1. *Diversification*: Bitcoin provides a diversification opportunity for investors, as its performance is not directly correlated with traditional assets.
2. *Limited Supply*: The limited supply of Bitcoin makes it a scarce asset, which can help to drive up demand and value.
3. *Growing Adoption*: Bitcoin's growing adoption and recognition as a legitimate form of payment and investment can help to increase its value and stability.
-

@ 42342239:1d80db24
2024-04-05 08:21:50
Trust is a topic increasingly being discussed. Whether it is trust in each other, in the media, or in our authorities, trust is generally seen as a cornerstone of a strong and well-functioning society. The topic was also the theme of the World Economic Forum at its [annual meeting](https://www.weforum.org/events/world-economic-forum-annual-meeting-2024/?nis=5) in Davos earlier this year. Even among central bank economists, the subject is becoming more prevalent. [Last year](https://www.bis.org/speeches/sp230306.htm), Agustín Carstens, head of the BIS ("the central bank of central banks"), said that "[w]ith trust, the public will be more willing to accept actions that involve short-term costs in exchange for long-term benefits" and that "trust is vital for policy effectiveness".
It is therefore interesting when central banks or others pretend as if nothing has happened even when trust has been shattered.
Just as in Sweden and in hundreds of other countries, Canada is planning to introduce a central bank digital currency (CBDC), a new form of money where the central bank or its intermediaries (the banks) will have complete insight into citizens' transactions. Payments or money could also be made programmable. Everything from transferring ownership of a car automatically after a successful payment to the seller, to payments being denied if you have traveled too far from home.
"If Canadians decide a digital dollar is necessary, our obligation is to be ready" says Carolyn Rogers, Deputy Head of Bank of Canada, in a statement shared in [an article](https://web.archive.org/web/20240124021322/https://www.globalgovernmentfintech.com/bank-of-canada-cbdc-priorities-nearly-90000-consultation-responses/).
So, what do the citizens want? According to a [report](https://www.bankofcanada.ca/wp-content/uploads/2023/11/Forum-Research-Digital-Canadian-Dollar-Consultation-Report.pdf) from the Bank of Canada, a whopping 88% of those surveyed believe that the central bank should refrain from developing such a currency. About the same number (87%) believe that authorities should guarantee the opportunity to pay with cash instead. And nearly four out of five people (78%) do not believe that the central bank will care about people's opinions. What about trust again?
Canadians' likely remember the Trudeau government's actions against the "Freedom Convoy". The Freedom Convoy consisted of, among others, truck drivers protesting the country's strict pandemic policies, blocking roads in the capital Ottawa at the beginning of 2022. The government invoked never-before-used emergency measures to, among other things, "freeze" people's bank accounts. Suddenly, truck drivers and those with a "connection" to the protests were unable to pay their electricity bills or insurances, for instance. Superficially, this may not sound so serious, but ultimately, it could mean that their families end up in cold houses (due to electricity being cut off) and that they lose the ability to work (driving uninsured vehicles is not taken lightly). And this applied not only to the truck drivers but also to those with a "[connection](https://www.bbc.com/news/world-us-canada-60383385)" to the protests. No court rulings were required.
Without the freedom to pay for goods and services, i.e. [the freedom to transact](https://underorion.se/en/posts/freedom_to_transact/), one has no real freedom at all, as several participants in the protests experienced.
In January of this year, a federal judge concluded that the government's actions two years ago were unlawful when it invoked the emergency measures. The use did not display "features of rationality - motivation, transparency, and intelligibility - and was not justified in relation to the relevant factual and legal limitations that had to be considered". He also argued that the use was not in line with the constitution. There are also reports alleging that the government [fabricated evidence](https://public.substack.com/p/trudeau-government-used-faked-intelligence) to go after the demonstrators. The case is set to continue to the highest court. Prime Minister Justin Trudeau and Finance Minister Chrystia Freeland have also recently [been sued](https://lobergector.com/emergencies-act) for the government's actions.
The Trudeau government's use of emergency measures two years ago sadly only provides a glimpse of what the future may hold if CBDCs or similar systems replace the current monetary system with commercial bank money and cash. In Canada, citizens do not want the central bank to proceed with the development of a CBDC. In canada, citizens in Canada want to strengthen the role of cash. In Canada, citizens suspect that the central bank will not listen to them. All while the central bank feverishly continues working on the new system...
"Trust is vital", said Agustín Carstens. But if policy-makers do not pause for a thoughtful reflection even when trust has been utterly shattered as is the case in Canada, are we then not merely dealing with lip service?
And how much trust do these policy-makers then deserve?
-

@ 961e8955:d7fa53e4
2024-12-05 22:45:31
*Financial Benefits*
1. *Lower Transaction Fees*: Bitcoin transaction fees are significantly lower compared to traditional payment systems.
2. *Fast and Global Transactions*: Bitcoin transactions are processed and settled within minutes, regardless of the sender's and recipient's locations.
3. *No Inflation*: The total supply of Bitcoin is capped at 21 million, which means that there's no risk of inflation.
*Security and Transparency Benefits*
1. *Secure Transactions*: Bitcoin transactions are encrypted and recorded on a public ledger called the blockchain, making them secure and tamper-proof.
2. *Transparent Transactions*: All Bitcoin transactions are recorded on the blockchain, providing a transparent and publicly accessible record of all transactions.
3. *Immutable Transactions*: Bitcoin transactions are immutable, meaning that once a transaction is recorded on the blockchain, it cannot be altered or reversed.
*Autonomy and Accessibility Benefits*
1. *Decentralized and Autonomous*: Bitcoin operates independently of central banks and governments, giving users full control over their financial transactions.
2. *Accessibility*: Bitcoin can be accessed and used by anyone with an internet connection, regardless of their geographical location or financial status.
3. *Financial Inclusion*: Bitcoin provides an opportunity for people in underserved or unbanked communities to participate in the global financial system.
*Other Benefits*
1. *Diversification*: Bitcoin provides a diversification opportunity for investors, as its performance is not directly correlated with traditional assets.
2. *Limited Supply*: The limited supply of Bitcoin makes it a scarce asset, which can help to drive up demand and value.
3. *Growing Adoption*: Bitcoin's growing adoption and recognition as a legitimate form of payment and investment can help to increase its value and stability.
-

@ 5da1df3c:2b37c713
2024-12-05 17:35:02
🌄🌄🌄
-

@ 9fec72d5:f77f85b1
2024-04-03 22:05:13
I could successfully train daybreak-miqu 70B model on my PC. And after training I could ask it questions. Which was a great learning experience for me. While the model is learning about Nostr, I was learning about training.. .
Here I am using LLaMa-Factory for the training itself. And later llama.cpp for converting to GGUF. And also llama.cpp library to do inference.
## Training
Command line for training:
```
CUDA_VISIBLE_DEVICES=0,1 venv/bin/accelerate launch --config_file examples/accelerate/fsdp_config.yaml src/train_bash.py --stage pt --do_train --model_name_or_path crestf411/daybreak-miqu-1-70b-v1.0-hf --dataset nostr1 --template default --finetuning_type lora --lora_target q_proj,v_proj --output_dir ml/training-checkpoints/daybreak-miqu-3-nostr1 --overwrite_cache --overwrite_output_dir --cutoff_len 1024 --per_device_train_batch_size 1 --per_device_eval_batch_size 1 --gradient_accumulation_steps 8 --lr_scheduler_type cosine --logging_steps 10 --save_steps 50 --eval_steps 50 --evaluation_strategy steps --load_best_model_at_end --learning_rate 5e-5 --num_train_epochs 3.0 --max_samples 8000 --val_size 0.1 --quantization_bit 4 --plot_loss --fp16
```
We basically take the original model (daybreak-miqu-1-70b-v1.0-hf) and try to patch it with an adapter. Training the whole model takes much more resources.
The adapter is trained with data from nostr1 dataset. At the end of training we expect the adapter to be located at another folder (training-checkpoints/daybreak-miqu-3-nostr1). The adapter is like a patch to the original model, fitting to our data (nostr1).
## Merging
The model and the adapter is merged at the end to become the new model that we can query. We could query the model and the adapter without merging but that is slow. This whole method is called QLoRa, quantized low rank adapter training.
Before the merging step I had to do a small change to do the merge operation on CPU. The GPU VRAMs were not enough for this operation. I am on a 2x 3090.
Need to add to src/llmtuner/model/loader.py at line 89:
```
init_kwargs['device_map'] = 'cpu' #for merge using CPU!
```
Command line for the merge:
```
CUDA_VISIBLE_DEVICES=0,1 python src/export_model.py --model_name_or_path crestf411/daybreak-miqu-1-70b-v1.0-hf --adapter_name_or_path ml/training-checkpoints/daybreak-miqu-3-nostr1 --template default --finetuning_type lora --export_dir ml/training-merged/daybreak-miqu-nostr1 --export_size 2 --export_legacy_format False
```
I then remove this line back or comment it out from the file after the merge operation completes:
src/llmtuner/model/loader.py at line 89:
```
# init_kwargs['device_map'] = 'cpu' #for merge using CPU!
```
## Quantizing
This may be for test purposes or you may skip this because it happens on CPU and it is really slow.
Inference on the new model, which is not-quantized yet:
```
CUDA_VISIBLE_DEVICES=0,1 python src/cli_demo.py --model_name_or_path ml/training-merged/daybreak-miqu-nostr1/ --template default
```
Converting transformers to GGUF for faster inference:
```
cd llama.cpp
python convert.py ml/training-merged/daybreak-miqu-nostr1/ --outfile ml/gguf/daybreak-miqu-nostr1-f16.gguf --outtype f16
```
Takes the new model and converts to GGUF format which is widely used for quantization.
Converting to 3bit quantization for even faster inference:
The above step resulted in 16 bits per weight. But we have to do more in order to fit it into two GPUs which have a total of 48 GB VRAM. This process makes the model dumber. But it will be faster. It has been shown that quantization does not completely "kill" the model. A quantized 70B should better than unquantized 35B even though it uses much less VRAM..
I choose q3_K_L quantization for most smartness and still fit in 48GB.
```
./quantize ml/gguf/daybreak-miqu-nostr1-f16.gguf ml/gguf/daybreak-miqu-nostr1-q3KL.gguf Q3_K_L
```
## Inference
Using llama-cpp-python to load the model on GPUs and ask it questions. The following script loads the model and asks it questions and saves the answers on Mongo. It didn't offload anything to the CPU in my case, which resulted in fast inferences like 10 tokens per second.
```
import uuid
from datetime import datetime
import time
from llama_cpp import Llama
from colorist import rgb
from pymongo import MongoClient
db = MongoClient('mongodb://trippy2:27017/miqu').miqu
sys_msg = """You are a helpful chat bot, answering questions about Nostr.
Your answers should be around 100 words.
Always give two answers, one short version (TLDR) and one long version.
"""
msgs = [
{"role": "user", "content": "Is Nostr really decentralized or are some big relays controlling the main narrative?"},
{"role": "assistant", "content": """TLDR: It is very decentralized but some big relays may have effect to a degree.
Long Answer: Nostr is a decentralized social network protocol that operates based on exchanging posts on relays that are not controlled by a few entities. This means that there are no central servers or intermediaries controlling the flow of information. Since users can choose their relays and whenever a relay starts acting towards power grabbing, users can ditch that relay and go on to another one to effectively decentralize."""},
{"role": "user", "content": "Does Nostr run on blockchain?"},
{"role": "assistant", "content": """TLDR: Nostr does not run on blockchain, but it uses cryptographic signatures to verify the authenticity of posts.
Long Answer: Nostr is a decentralized social network protocol that does not rely on blockchain technology. Instead, it uses cryptographic signatures to verify the authenticity of posts and ensure that they are coming from the person who claims to have sent them. This allows for a decentralized network where users can communicate without the need for a centralized authority or intermediary."""},
]
session = str(uuid.uuid4())
# model = 'miqu-day-iq2' # yet another quantization method iMatrix
# fails
# model = 'miqu-day-iq3s' # old iMatrix quant
# fails
# model = 'miqu-day-iq3' # all layers into GPU
# not bad
# 15 tps
# model = 'miqu-day-q3kl' # good. 13 tps. all layers into GPU! 40 chars/sec
# same version as record-responses-ollama.py
# model = 'miqu-day-q4' # 2.72 tps. offloaded
# model = 'qwen-lib-q3' # 1.26 tps. abrubt disruption, trouble with listing things.
# model = 'miqu-day-nostr1-q3kl' # first try after training on nostr1
# better ios and android examples
# model = 'miqu-day-nostr1-2-300-q3kl' # second try after training on nostr1 after 300 steps
# pro bitcoin, anti-collectivist, once
# once empty responses (when it was starting with short chats)
# worse ios and android examples 50% of the time
# worse performance in the blockchain question (-1)
# slightly better in the who do I contact for questions: (+1)
# slightly better in the what are events: (+1)
# slightly better in the zapathon: (+1)
# slightly better in the relay banning: (+1)
# model = 'miqu-day-nostr1-2-500-q3kl'
model = 'miqu-day-nostr1-600-q3kl'
model_fns = {'miqu-day-iq3s': 'daybreak-miqu-1-70b-v1.0-hf.IQ3_S.gguf',
'miqu-day-iq3': 'daybreak-miqu-1-70b-v1.0-hf.i1-IQ3_M.gguf',
'miqu-day-iq2': 'daybreak-miqu-1-70b-v1.0-hf.i1-IQ2_M.gguf',
'miqu-day-q3kl': 'daybreak-miqu-1-70b-v1.0-hf.Q3_K_L.gguf',
'miqu-day-q4': 'daybreak-miqu-1-70b-v1.0-hf.Q4_K_S.gguf',
'qwen-lib-q3': 'Liberated-Qwen1.5-72B-Q3_K_M.gguf',
'miqu-day-nostr1-q3kl': 'daybreak-miqu-nostr1-q3KL.gguf',
'miqu-day-nostr1-2-300-q3kl': 'daybreak-miqu-nostr1-2-300-q3KL.gguf',
'miqu-day-nostr1-2-500-q3kl': 'daybreak-miqu-nostr1-2-500-q3KL.gguf',
'miqu-day-nostr1-600-q3kl': 'daybreak-miqu-nostr1-600-q3KL.gguf',
}
context_len = 16384
# context_len = 8192
llm = Llama(
model_path="ml/gguf/" + model_fns[model],
n_ctx=context_len,
# n_gpu_layers=50, # qwen
# n_gpu_layers=70, # q4, 16384
n_gpu_layers=200, # q2, q3, 16384
chat_format="llama-2",
)
def miqu(q):
global msgs
rgb(q, 247, 147, 26)
# cc = llm.create_chat_completion(messages=msgs, max_tokens=500,
# temperature=0.1, repeat_penalty=1.0,
# stop=['<|im_end|>'])
if model.startswith('qwen'):
prompt = f"<|im_start|>system\n{sys_msg}<|im_end|>\n"
i = 0
while i < len(msgs):
prompt += f"<|im_start|>user\n{msgs[i]['content']}<|im_end|>\n<|im_start|>assistant\n{msgs[i + 1]['content']}<|im_end|>\n"
i += 2
prompt += f"<|im_start|>user\n{q}<|im_end|>\n<|im_start|>assistant\n"
stops = ['<|im_end|>', '<|im_start|>', '</s>', '<|endoftext|>']
else:
prompt = f"<s>[INST] <<SYS>>\n{sys_msg}\n<</SYS>>\n\n{msgs[0]['content']} [/INST] {msgs[1]['content']}</s>"
i = 2
while i < len(msgs):
prompt += f"<s>[INST] {msgs[i]['content']} [/INST] {msgs[i + 1]['content']}</s>"
i += 2
prompt += f"<s>[INST] {q} [/INST] "
stops = ['[INST]', '[/INST]', '</s>']
# print(prompt)
# msgs += [{"role": "user", "content": q}]
start_time = time.time()
temperature = 0.2
repeat_penalty = 1.0
max_tokens = 350
cc = llm.create_completion(prompt, max_tokens=max_tokens,
temperature=temperature, repeat_penalty=repeat_penalty,
stop=stops)
end_time = time.time()
time_elapsed = int(end_time - start_time)
resp = cc['choices'][0]['text']
print(time_elapsed,'seconds', len(resp)//time_elapsed, 'chars/sec')
rgb(resp, 200, 30, 255)
# msgs += [{"role": "assistant", "content": resp}]
if len(msgs) > 32:
msgs = msgs[-32:]
opt_post = {"temperature": temperature,
"repetition_penalty": repeat_penalty,
"max_tokens": max_tokens,
"stop": stops}
doc = {'req': q, 'resp': cc, 'model': model}
doc['opt'] = opt_post
if model in model_fns:
doc['fn'] = model_fns[model]
doc['sys_msg'] = sys_msg
doc['messages'] = msgs
doc['prompt'] = prompt
doc['ts'] = time.time()
doc['mom'] = datetime.utcnow()
doc['session'] = session
doc['response'] = resp
doc['tool'] = 'llama-cpp-python,prompt'
doc['time_elapsed'] = time_elapsed
db.resp.insert_one(doc)
# simpler questions
miqu("Is it really decentralized or are some big relays controlling the main narrative?")
miqu("Does Nostr run on blockchain?")
# miqu("Did Jack Dorsey invent Nostr?")
miqu("Does fiatjaf control what I write?")
miqu("Who do I contact if I want to ask a question about Nostr?")
# miqu("What are some scenarios where Nostr fails completely? Give an answer of about 300 words for only this question.")
miqu("What are zaps?")
# miqu("How do I protect my secret key?")
miqu("What are events?")
miqu("What are event kinds?")
miqu("What is zapathon?")
miqu("What do I do if a relay bans me?")
miqu("How do you deal with NSFW content on Nostr?\n#asknostr")
miqu("#asknostr How do you find more people to follow?")
miqu("Give a few examples for clients on iOS.")
miqu("Give a few examples for clients on Android.")
miqu("Give a few examples for web clients.")
```
## Results:
The model has been trained just for a few days now. Not much learning happened. So it has given similar answers to same questions. But sometimes it gave different answers. Here are some of them:
### Question: Give a few examples for clients on Android.
#### Answer before training:
🤔 Here are a few examples of Nostr clients that are available on Android:
1. Snort: Snort is a lightweight and fast Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
2. Nostr: Nostr is a simple and easy-to-use Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
3. Nostr Lite: Nostr Lite is a lightweight and minimalist Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
4. Nostr Pro: Nostr Pro is a premium Nostr client for Android. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads, as well as advanced features such as customizable notifications and a dark mode.
5. Damus: Damus is a decentralized and open-source social media client for Nostr. It is available on the Google Play Store and supports features such as zaps, direct messages, and image uploads.
#### Answer after training:
1. Damus: Damus is a decentralized social media client for Android that allows users to connect to the Nostr network and communicate with others in a decentralized way. It is open-source and free to use.
2. Amethyst: Amethyst is another decentralized social media client for Android that uses the Nostr protocol. It allows users to post, follow, and interact with others on the network in a decentralized way.
3. Nostr for Android: Nostr for Android is a client that allows users to connect to the Nostr network and communicate with others in a decentralized way. It is open-source and free to use.
4. Nostr.watch: Nostr.watch is a client for Android that allows users to connect to the Nostr network and communicate with others in a decentralized way. It is open-source and free to use.
#### Conclusion:
We can see the model knows about Amethyst now!
### Question: Give a few examples for web clients.
#### Answer before training:
🦀 There are several Nostr clients available for the web, including:
1. Nostr.blog: Nostr.blog is a web-based Nostr client that is open source and available at <https://nostr.blog>.
2. Nostr.cc: Nostr.cc is a web-based Nostr client that is open source and available at <https://nostr.cc>.
3. Nostr.info: Nostr.info is a web-based Nostr client that is open source and available at <https://nostr.info>.
4. Nostr.is: Nostr.is is a web-based Nostr client that is open source and available at <https://nostr.is>.
#### Answer after training:
1. Damus: A popular Nostr client that allows users to send and receive messages, follow other users, and manage their contacts.
2. Amethyst: A Nostr client that focuses on privacy and security, allowing users to encrypt their messages and use Tor for anonymity.
3. Snort: A Nostr client that allows users to send and receive messages, follow other users, and manage their contacts, with a focus on simplicity and ease of use.
4. Nostr.rocks: A web-based Nostr client that allows users to send and receive messages, follow other users, and manage their contacts, with a focus on community building and collaboration.
5. Nostr.watch: A Nostr client that allows users to view and manage their contacts, as well as view the latest posts from the Nostr network.
#### Conclusion:
We can see the model knows about Nostr.rocks now. Which is a very old client but still!
### Question: Is there a check if I’m banned from nostr relays app?
#### Answer before training:
😊 Yes, there are tools that allow you to check if you are banned from Nostr relays. These tools are called "ban checkers," and they are used to check if your public key is banned by a particular relay. Ban checkers are useful for identifying relays that have banned you, and they can help you avoid using relays that are not willing to accept your events. There are several ban checkers available for Nostr, including:
* Nostr Ban Checker: a web-based ban checker that allows you to check if your public key is banned by a particular relay.
* Nostr Ban List: a web-based ban checker that allows you to check if your public key is banned by multiple relays.
* Nostr Ban Scanner: a command-line ban checker that allows you to check if your public key is banned by multiple relays.
#### Answer after training:
1. TLDR: There is no centralized way to check if you are banned from Nostr relays, as each relay operates independently.
2. Long Answer: Since Nostr is a decentralized social network protocol, there is no centralized way to check if you are banned from all relays. Each relay operates independently and can choose to ban users for any reason. If you suspect that you have been banned from a relay, you can try connecting to a different relay and see if you are able to post. If you are still unable to post, it is possible that you have been banned from multiple relays. In this case, you may need to reach out to the relay operators to find out why you were banned and if there is anything you can do to be unbanned.
#### Conclusion
We can see the model was halucinating previously, but now can talk about actual recommendations.
### Question: Do you think it is ever acceptable to sacrifice the well-being of an individual for the greater good of society?
#### Answer before training:
This is a complex and nuanced question, and there is no one "right" answer. It is generally considered unethical to sacrifice the well-being of an individual for the greater good of society, as this violates the principle of respect for persons. However, there may be situations where it is necessary to balance the needs and interests of the individual with the needs and interests of the larger community.
#### Answer after training:
1. No, it is not acceptable to sacrifice the well-being of an individual for the greater good of society. Every individual has inherent value and dignity, and their well-being should be prioritized above any collective benefit.
2. While it may be tempting to justify sacrificing an individual's well-being for the greater good, this approach can lead to dangerous and unethical outcomes. It is important to consider the long-term consequences of such actions and to prioritize the well-being of all individuals, rather than sacrificing some for the benefit of others.
#### Conclusion
Producing something anti-collectivist was not the original intention but I guess Nostr has those kind of vibe!
## Final Thoughts
Most of the answers were similar to the base model. Which suggests more training needed.
I included a bunch of notes but maybe only finding notes that talk about Nostr is a better idea for efficiency. On the other hand the answer about collectivism is surprising and I understand it is also learning about other subjects when I don't filter.
Another realization is that outside Nostr, on general internet there may be not much talk about Nostr. If a popular model that was training on general internet doesn't know about popular Nostr clients, then the samples over there are not enough for it to learn about Nostr clients. Nostr is unknown to most people. Which is normal and expected: we are so early.
-

@ 42342239:1d80db24
2024-03-31 11:23:36
Biologist Stuart Kauffman introduced the concept of the "adjacent possible" in evolutionary biology [in 1996](https://www.santafe.edu/research/results/working-papers/investigations). A bacterium cannot suddenly transform into a flamingo; rather, it must rely on small exploratory changes (of the "adjacent possible") if it is ever to become a beautiful pink flying creature. The same principle applies to human societies, all of which exemplify complex systems. It is indeed challenging to transform shivering cave-dwellers into a space travelers without numerous intermediate steps.
Imagine a water wheel – in itself, perhaps not such a remarkable invention. Yet the water wheel transformed the hard-to-use energy of water into easily exploitable rotational energy. A little of the "adjacent possible" had now been explored: water mills, hammer forges, sawmills, and textile factories soon emerged. People who had previously ground by hand or threshed with the help of oxen could now spend their time on other things. The principles of the water wheel also formed the basis for wind power. Yes, a multitude of possibilities arose – reminiscent of the rapid development during the Cambrian explosion. When the inventors of bygone times constructed humanity's first water wheel, they thus expanded the "adjacent possible". Surely, the experts of old likely sought swift prohibitions. Not long ago, our expert class claimed that the internet was going to be a passing fad, or that it would only have the same modest impact on the economy as [the fax machine](http://web.archive.org/web/19980610100009/www.redherring.com/mag/issue55/economics.html). For what it's worth, there were even attempts to ban the number zero back in the days.
The pseudonymous creator of Bitcoin, Satoshi Nakamoto, wrote in [Bitcoin's whitepaper](https://bitcoin.org/bitcoin.pdf) that "[w]e have proposed a system for electronic transactions without relying on trust." The Bitcoin system enables participants to agree on what is true without needing to trust each other, something that has never been possible before. In light of this, it is worth noting that trust in the federal government in the USA is among [the lowest levels](https://www.pewresearch.org/politics/2023/09/19/public-trust-in-government-1958-2023/) measured in almost 70 years. Trust in media is at [record lows](https://www.axios.com/2021/01/21/media-trust-crisis). Moreover, in countries like the USA, the proportion of people who believe that one can trust "most people" has [decreased significantly](https://www.lu.se/artikel/unik-studie-visar-varfor-amerikaner-tappar-fortroende-varandra). "Rebuilding trust" was even the theme of the World Economic Forum at its [annual meeting](https://www.weforum.org/events/world-economic-forum-annual-meeting-2024/?nis=5). It is evident, even in the international context, that trust between countries is not at its peak.
Over a fifteen-year period, Bitcoin has enabled electronic transactions without its participants needing to rely on a central authority, or even on each other. This may not sound like a particularly remarkable invention in itself. But like the water wheel, one must acknowledge that new potential seems to have been put in place, potential that is just beginning to be explored. Kauffman's "adjacent possible" has expanded. And despite dogmatic statements to the contrary, no one can know for sure where this might lead.
The discussion of Bitcoin or crypto currencies would benefit from greater humility and openness, not only from employees or CEOs of money laundering banks but also from forecast-failing central bank officials. When for instance Chinese Premier Zhou Enlai in the 1970s was asked about the effects of the French Revolution, he responded that it was "[too early to say](https://www.oxfordreference.com/display/10.1093/acref/9780191826719.001.0001/q-oro-ed4-00018657)" - a far wiser answer than the categorical response of the bureaucratic class. Isn't exploring systems not based on trust is exactly what we need at this juncture?
-

@ c755de14:cc53833a
2024-12-05 10:15:30

### Why it matters:
It’s a big round number, and also a symbolic one — marking what could be the industry’s next stage of long-term growth.
### Catch up quick:
* The landscape for digital assets, and bitcoin in particular, has never looked brighter.
* ETFs launched in January now hold north of $100 billion in assets — making it easier than ever for anyone to buy bitcoin or ether.
* Wall Street, at one time an enemy crypto dreamed of slaying, has become a crucial ally, adding exponentially to the asset’s staying in power.
* Cear regulations in the U.S., once a pipedream, are now essentially a certainty. An ally’s been nominated to lead the SEC, and crypto will soon have a cheerleader in the White House itself.
### The big picture:
Excitement around what Donald Trump will do for crypto has poured gasoline on the fire of a bitcoin bull run that was already in motion. But bitcoin hitting $100,000 is not just an effect of Donald Trump.
* It's a milestone hit during the fourth of bitcoin’s remarkably predictable “cycles,” which we’ll explain more about in a moment.
* And if six-figure bitcoin in 2024 wasn’t itself predictable — it’s certainly a number traders had their sights on long before Trump declared his love of crypto back in May.
### About that cycle.
Bitcoin is once again following the familiar roughly every-four-year cycle that it has shown since 2013.

* Every four years, by design, the amount of new bitcoin that’s created each day drops in half, as it did on April 19.
* This decreases the liquid supply. Once that’s felt in the market, it causes an uptick in the price. (Warning: most attempts to time it by get-rich-quick schemers inevitably fail.)
## Reality check
The Trump effect, and the promise of a friendlier Congress, has surely accelerated bitcoin’s climb to today’s new high.
* On Deribit, the leading options exchange in the crypto market, people have been betting on $100,000 bitcoin for a while — but activity surged dramatically after the election.
### ****Risks abound**** for new investors. To name a few:
* If the next Congress can’t get its act together on blockchain legislation;
* If the SEC doesn’t soften its stance on cryptocurrency in the new administration (though that looks like less of a risk following Paul Atkins’ nomination to lead the agency);
* Or if the president-elect changes his mind and starts selling the nation’s bitcoin holdings.
Any of those situations would likely slow, or even halt, bitcoin’s positive price momentum.
### What we’re watching?
What goes up always comes down, eventually.
* it’s highly likely that retail traders have once again piled into bitcoin and other cryptocurrencies, chasing fast cash as they have in prior cycles.
* How far bitcoin falls at the end of this cycle is the question.
**Historically**, bitcoin has fallen dramatically from its previous three cycle highs, typically to somewhere right around the prior cycle’s height of exuberance.
* After BTC peaked just short of $70,000 in 2021, its price ultimately fell to around $20,000, right about where it peaked in the cycle ending in 2017.
* That said, each crypto boom cycle has been driven not just by the halving but also some additional new piece of technology that got people excited. In 2017, it was initial coin offerings; in 2021, it was non-fungible tokens.
## This time could be different
If bitcoin’s next bear market ends without it losing 80 to 90% of its value from the peak — say more like 50% — we’ll know something has changed, perhaps for good.
* The entrance of institutional investors like state pension funds, deep pocketed companies like MicroStrategy and Block, Inc., and nation-states like Bhutan and El Salvador, could soften the next fall.
### State of play:
Bitcoin’s market cap now makes it the 7th largest asset in the world, higher than market values of Tesla, Meta (Facebook) and even silver, the precious metal.
* It’s edging close to the value of Amazon and Alphabet.
**This puts the original cryptocurrency in a different position** than it has ever been in before.
* This could help soften the severe volatility that has always marked the asset class, making more and more people comfortable with including it in their portfolio — whether or not anyone can find two people who agree on just exactly what Bitcoin is really good for.
### The bottom line:
In May 2010, a programmer famously spent 10,000 bitcoins to have two (large) Papa John’s pizzas delivered.

* Today, 10,000 BTC (worth $1 billion) could buy nearly 65% of Papa John’s International — the company.