-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-20 13:49:55Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
Conclusion of the Technical Debate
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
Conclusion of the Debate
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
Summary of Consequences
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ fd78c37f:a0ec0833
2024-12-28 16:58:51In this edition, We were honored to have Martin npub19vtlpmfzz8yl4g9r7c8u8t2vaqjhjgpjrc36hc2typxnutpnluzs3tx8xe, the founder of Bitcoin Nairobi, share his journey in creating the Bitcoin community, his goals, and some of the challenges faced. He emphasized the importance of education and innovation in promoting Bitcoin adoption in Kenya.
YakiHonne: Martin, it’s truly an honor and a pleasure to have you with us today. We’re looking forward to a fruitful conversation as we move forward. Before we dive in, I’d like to take a moment to share some background on what YakiHonne is. YakiHonne is a decentralized media client built on the Nostr protocol that enables freedom of speech through technology. It empowers creators to create their own voice, assets, and features. It also allows features like smart widgets, verified notes, and focuses on long-form articles. today. we'll be exploring more about your community. Can you tell us a bit about yourself?
Martin:I’m Martin Mutonga, the founder of Bitcoin Nairobi. I’m 21 years old and currently studying at the University of Nairobi.
YakiHonne: What sparked your interest in Bitcoin, and what motivated you to create a community around it?
Martin:I first got interested in Bitcoin as a way to find passive income. Before discovering Bitcoin, I worked as an AI annotation Jobs. During this time, I came across Bitcoin. After reading the Bitcoin white paper, I decided to explore it further. I then started looking for Bitcoin communities in Kenya and joined events like Bitcoin DADA,The Core, and others. It was then that I realized there was a gap in Bitcoin education in Kenya. Many people were getting into Bitcoin but didn’t know how to earn from it. Martin:I decided to create Bitcoin Nairobi, a community focused on advancing Bitcoin through education, adoption, and innovation. Our mission is to educate people about Bitcoin, help merchants integrate Bitcoin payments to attract more customers, and foster innovation by exploring protocols like Nostr and leveraging apps like YakiHonne to drive growth.
YakiHonne: Great. Could you share how your community started and how you managed to attract members?
Martin:The community initially started through a WhatsApp group, originally for people who have questions related to Bitcoin. I shared my knowledge of Bitcoin and expressed my desire to train others, which led to small Bitcoin learning sessions. Before this, I completed a Bitcoin diploma course with Mi Premier Bitcoin, which deepened my passion for Bitcoin and inspired me to start my own company. Bitcoin became my true passion, and I was determined to fully dive into it. Martin:I then founded Bitcoin Nairobi, initially focusing on the concept of the circular economy, which I called Bitcoin Aerobics. With support from Geyser and other Bitcoin enthusiasts in Kenya, the community began to grow. Every few months, we attract new members through a project called Bitcoin School Kenya, mostly university students who want to learn and earn with Bitcoin while studying.
YakiHonne: Can you share some of the challenges you faced when you first started?
Martin:One of the main challenges I faced early on was the lack of guidance, as many Bitcoin users are anonymous. Additionally, relevant content is scattered across various platforms, making it difficult to gather all the necessary information in one place. Another challenge is the small number of true Bitcoiners in Kenya. While there are many participants in cryptocurrency and altcoins, there are only about 28 true Bitcoin users in Kenya, which is a tiny fraction of the country's 58 million people. Martin:Seeing this gap, I founded Bitcoin School Kenya, aiming to promote Bitcoin education. Our goal is not only to teach people about Bitcoin but also to empower them to become Bitcoin ambassadors in their local communities. This way, we can extend our impact beyond Nairobi, especially to rural areas.
YakiHonne: As you mentioned, many people are involved in cryptocurrency and other coins, including popular meme coins like Dogecoin. While they claim to be part of the crypto space, Bitcoin is truly the dominant and most significant coin. However, true Bitcoiners are few in number and not as widely recognized. Additionally, the content related to Bitcoin is scattered across platforms like YouTube and Google, making it hard to find a single source to access all the necessary information. I completely understand the frustration. YakiHonne: What are the core principles that guide the Bitcoin Nairobi community? How do you maintain trust and reliability, especially when facing the widespread skepticism around cryptocurrency? How do you ensure that community members trust you, particularly when onboarding them?
Martin:I think we are simply following the principles of Bitcoin's proof of work—if you show your proof of work, you'll be rewarded, and that's all there is to it. That's the essence of proof of work.
YakiHonne: A lot of people feel that cryptocurrency, Bitcoin, and Web3 are scams, and they don't see them as the future. So, How do you convince people to trust and believe in Bitcoin?
Martin:What we do is organize meetups. However, due to financial constraints, we've only been able to host two so far, one of which was in Kibra, a part of the Bitcoin Nairobi community. I believe this is how we gain trust in Bitcoin and what we do. Another key aspect is maintaining consistent communication. If people have issues, we engage with them. We also communicate with merchants and guide them on what they need. This helps build trust within the community. Additionally, we are transparent with our funds. Whatever donations or grants we receive, we make sure to be open about how the funds are used and show the community exactly what we’ve spent them on. This is how we build trust.
YakiHonne: It seems you're really doing a great job in that aspect. How do you educate your members and keep them informed about the latest Bitcoin developments?
Martin: We collaborate with Bitcoin developers like Simon, who is the lead of BitDevs Nairobi. Simon often conducts classes with Bitcoin School Kenya, where he trains people in Bitcoin development.We also invite guest developers, such as those from Btrust, to join our sessions and train people on Bitcoin development. Additionally, we bring in experts on specific topics like Lightning or Nostr to provide specialized training for students. Looking ahead, we aim to nurture our own developers who can contribute to projects like Bitcoin Core, the Lightning Network, and Nostr. These developers will eventually train others, helping us build a stronger ecosystem.
YakiHonne: I look forward to seeing your developers in the future. It would be amazing to have developers from your community contributing—it would be a great benefit both for them and for the Bitcoin community as a whole.
Martin:Honestly, you can't know everything. Another amazing thing about Bitcoin is the supportive community—there's always someone willing to help. For example, I didn’t even approach Simon myself; I just attended a BitDevs meetup, and he offered to train during our classes. We also have Nayoma, the first African male Bitcoin Core developer, contributing to the classes. It's truly inspiring to see so many knowledgeable people coming together to share their expertise.
YakiHonne: How does the community collaborate with the broader Bitcoin ecosystem, and what partnerships have had the greatest impact on Bitcoin Nairobi?
Martin:One key factor that has helped Bitcoin Nairobi gain recognition globally is our involvement with the Federation of Bitcoin Circular Economies. We collaborate with other communities by actively participating in their calls and staying in contact with leaders at the Federation as well as other communities. This consistent engagement has significantly boosted our visibility. Martin:Additionally, through Bitcoin School Kenya, we operate as a light node in the broader Bitcoin ecosystem. For now, we function as a light node, but we’re aiming to upgrade to a full node by next year. This will enable members of our community not only to contribute locally but also to teach and collaborate with other communities and circular economies worldwide.
YakiHonne: What major challenges has the community faced, and how did you overcome them while maintaining integrity?
Martin:I wouldn't say there's a major challenge, but one challenge we faced was connecting with others in the Bitcoin space. However, we’ve made progress. Another challenge we’re facing now is organizing physical meetups. This has been difficult since we’re still relatively new in the Federation and the circular economies.
YakiHonne: It seems like you haven’t faced much resistance in terms of people viewing Bitcoin as a scam or having trust issues about its stability, like concerns over whether Bitcoin will crash. You haven't experienced these kinds of challenges.
Martin:Most people believe in the technology and in Bitcoin. The main issue they have is knowing where and how they can sell it. However, when it comes to doubting Bitcoin itself, I can’t say many people question the technology. Especially young people, they’re into online work, AI, and Bitcoin—basically anything related to the future.
YakiHonne: What are the community's goals for the next 6-12 months, and how do you see it evolving with Bitcoin's growth?
Martin:Our community's goals are to develop more educators and promote the widespread adoption of Bitcoin education, launch more Bitcoin-based projects to drive local adoption, strengthen collaborations with other organizations and communities to expand our influence, and increase our efforts in “orange-pilling” to help more people understand and embrace Bitcoin. As Bitcoin continues to grow, we will also continue to expand and evolve, fostering the maturation of the Bitcoin ecosystem.
YakiHonne: That's great. We’re excited to see how these initiatives will unfold in the coming months. Best of luck in achieving your vision, and we look forward to hearing about your progress in the future! OK, We're glad to see everyone and look forward to the next community interview. Thank you all, and that wraps up today's session.
-
@ fd78c37f:a0ec0833
2024-12-28 15:58:04In this edition, we are pleased to speak with Luthando nostr:npub10vudmjqhr8kn2kv2pxhezt2h5t5c9zauwq8qr56nhdn64yacsqyqf08djm leader of the Bitcoin Ekasi community, about how they are using Bitcoin to transform payment systems, savings habits, and cross-border remittances in a South African township, while fostering digital currency education and boosting local economic trust.
YakiHonne: Luthando. We really appreciate you coming in. YakiHonne is a decentralized media client built on the Nostr protocol that enables freedom of speech through technology. It empowers creators to create their own voice, assets, and features. It also allows features like smart widgets, verified notes, and focuses on long-form articles. today. we'll be exploring more about your community.Can you tell us a bit about yourself? What do you do, and what’s your role in your community?
Luthando:I’m Luthando, a project community leader at Bitcoin Ekasi. My role includes onboarding township shops to help them adopt Bitcoin as a payment method. I also manage staff records, tracking workdays and paid leave for team members involved in the project. Additionally, I conduct interviews and collaborate with a supervisor to share insights and experiences about Bitcoin. This work is part of my efforts with Bitcoin Ekasi.
YakiHonne: You're really doing a lot of work in the Bitcoin ecosystem,what sparked your interest in Bitcoin? And what motivated you to create a community around it?
Luthando:When I was working as a safety coach at Safeacase, Herman introduced me to Bitcoin. During the COVID-19 pandemic, Safeacase, which relied on donations, faced severe financial challenges. This led to the launch of the Bitcoin Ekasi Project, where I helped township shops adopt Bitcoin as a payment method. With limited funds, I transitioned from receiving a fiat salary to earning in Bitcoin. Bitcoin transformed my mindset, making me realize it is the future of money. This realization inspired me to travel the world and explore new countries.
YakiHonne: Great. I really admire the enthusiasm you have for Bitcoin.Can you share a brief history of how you built your community and attracted members? What methods or advertisements did you use to onboard them?
Luthando:We host monthly Bitcoin movie nights to engage the community, running from February to December starting next year. We promote the events with posters in town, shops, and clinics, inviting residents to join. During the movie nights, participants use Bitcoin we provide to purchase popcorn and drinks, gaining hands-on experience with the technology. Luthando:And our Bitcoin center features a thrift shop and a small Bitcoin ATM. Community members can exchange fiat for Bitcoin using the ATM and use it to purchase clothing from the shop. We also offer Bitcoin courses with 14 students attending classes five days a week. To encourage attendance, students are rewarded with Bitcoin for consistent participation. Similarly, in the “Safer Kids” program, children who maintain a 70% attendance rate or higher also receive Bitcoin rewards. Luthando:To further promote Bitcoin adoption in the community, we painted Bitcoin-themed logos on 34 shops and paid the owners in Bitcoin, which they can use in local shops. This initiative not only spreads awareness but also provides the community with practical opportunities to use Bitcoin.
YakiHonne: Yeah, we are pushing Bitcoin adoption so hard this time. It's really great.What principles guide your community, and how do you ensure trust and reliability in your discussions?
Luthando:I was born in eastern South Africa, and my parents moved here around 1996. The community knows me well and trusts that I wouldn’t introduce anything fraudulent. Since 2010, we’ve been working in this township, especially helping children, building over a decade of trust. I explain to the community that we aim to bring value through Bitcoin, encouraging them to save in Bitcoin instead of fiat. As a result, the community has great trust in our Bitcoin Ekasi team.
YakiHonne: How do you educate your members and keep them updated on Bitcoin developments? You mentioned having five weekly meetups to onboard members, but what other methods do you use to educate them and keep them informed about the Bitcoin ecosystem?
Luthando:We use the Felly app to communicate with community members and keep them updated. At the Ekasi Center, we host quizzes to encourage participation. For example, the first attendees can earn 5,000 sats, motivating them to regularly engage with the Felly app. Although we initially tried a few other methods that didn't really involve them getting Sats, its impact was limited as many people in the township seek quick financial returns and often don’t return after their first visit. To address this, we host movie nights as a more engaging way to promote Bitcoin education. During these events, we screen Bitcoin-related films, allowing community members to learn about Bitcoin in a fun and relaxed setting.
YakiHonne: It's truly captivating and highly insightful.How does your community collaborate with the global Bitcoin ecosystem? Specifically, how does it engage with the broader worldwide Bitcoin community, and which partnership has been of more significant impact on Bitcoin Ekasi?
Luthando:We have established a strong partnership with Bitcoin Beach, which provided crucial support in the creation of the Bitcoin Ekasi project. Currently, we are planning to build a community center in the township, earning the trust and support of both Bitcoin Beach and the local government of Mossel Bay. The community center will serve as a multifunctional space for events like weddings and more. As one of the earliest Bitcoin adoption projects in Africa, Bitcoin Ekasi has inspired other countries to follow suit, viewing us as a model for building sustainable Bitcoin communities.
YakiHonne: How do you collaborate with Bitcoin communities and organizations outside South Africa? What partnerships or interactions do you have with other global Bitcoin communities?
Luthando: We collaborate with other Bitcoin projects through community initiatives. For example, we paint logos on local community shops and pay the owners 7000Sats per week. This approach has helped us build connections with projects outside South Africa. One notable example is our assistance to the Bitcoin Dua project in Africa, helping them establish a Bitcoin circular economy. We also supported the Bitcoin Loxin project in Cape Town, South Africa, in launching their Bitcoin circular economy. Through these collaborations, we have developed strong relationships with other Bitcoin communities.
YakiHonne: We’d like to understand the challenges you faced when starting the community, as well as the challenges the community has encountered?
Luthando: One of the main challenges is convincing members that Bitcoin is not a scam. Many people are skeptical about Bitcoin, fearing they might lose their money. Additionally, saving is not a common habit within the community, even with fiat currency. I often explain the importance of saving in Bitcoin, emphasizing how it can safeguard their financial security. However, changing deeply ingrained mindsets has proven to be quite difficult. Another challenge is the limited level of education in the community. Even those who own smartphones often struggle to use them effectively. This lack of familiarity extends to using Bitcoin wallets, with many people finding it challenging to navigate wallet usage, especially in shops. Lastly, I feel like I’m working around the clock. Even outside of work hours, people come to my house seeking assistance, such as exchanging Bitcoin for fiat. While I’m happy to help, the constant demands can feel overwhelming at times, making it seem as though I’m working every day, including weekends.
YakiHonne: and how you managed to overcome them?
Luthando: Overcoming these challenges is not easy. I can't say that I've fully managed to resolve them, but I do my best to address them. Fortunately, I have a colleague who assists me, although he’s currently out of town. He helps manage some of the workload, especially in dealing with local community members and providing them with the support they need.
YakiHonne: I'm really interested in the issue of people thinking Bitcoin is a scam. Could you elaborate on that? What specific steps have you taken to demonstrate that Bitcoin is reliable and not a scam?
Luthando: Many shop owners initially believe Bitcoin is a scam and refuse to accept it. To address their doubts, I demonstrate Bitcoin's legitimacy through practical examples. First, I help them download a Bitcoin wallet and post about it on X, receiving small tips from Bitcoin enthusiasts worldwide. I then use these tips to showcase Bitcoin's real-world applications. For instance, I use Bitrefill to purchase mobile airtime or fuel vouchers for them, highlighting Bitcoin's utility in daily life. I also mention South African restaurants like Steers that accept Bitcoin and even place food orders using Bitcoin to show its usability. Additionally, I demonstrate withdrawing cash from a crypto ATM using Bitcoin, further proving that it is a reliable financial tool and not a scam.
YakiHonne: You've done a lot of work in South Africa. I can imagine the effort, the pain and the stress.What initiatives has the community taken to promote Bitcoin adoption, and what results have these efforts achieved?
Luthando: At first, I never imagined we would reach this point. Now, many people frequently come to my home to ask how to buy Bitcoin. For example, this week, a man from Nigeria wanted to purchase Bitcoin worth 5,000 units. I explained the process to him and recommended using a hardware wallet for securely storing large amounts of Bitcoin. He used to struggle with sending money back home, but now he has realized the convenience of Bitcoin. In October last year, I helped two stores owned by Nigerians adopt Bitcoin payments. Since then, this practice has spread within the community, and more people, especially shop owners, have developed an interest in Bitcoin. They ask about its low transaction fees and have recognized it as an efficient solution for cross-border remittances. Initially, some shop owners were skeptical about Bitcoin, but they eventually started saving with it. Today, many of them have accumulated significant Bitcoin savings for their families and children, and they often express their gratitude for introducing Bitcoin to the community. Overall, the Bitcoin adoption project has had a profound impact here. We have educated the community about Bitcoin’s long-term savings value, and many people are now satisfied with this initiative and optimistic about the future.
YakiHonne: It’s clear you’ve achieved tangible results from your efforts. Looking ahead, what are your community's goals for the next 6 to 12 months? How do you plan to achieve them?
Luthando: For Bitcoin Ekasi, one of our main goals is to establish a dedicated Bitcoin Ekasi Center. This center would serve as a hub to educate people about Bitcoin on a frequent basis. We have already started working with a local school in the township, recruiting students and introducing teachers to Bitcoin. Our vision is to integrate Bitcoin education into the school’s curriculum, similar to what has been done in El Salvador. By incorporating Bitcoin as part of their regular subjects, students can gain foundational knowledge about Bitcoin and its potential uses. Ultimately, we aim for teachers to become advocates who can confidently teach children about Bitcoin, empowering the next generation with essential financial literacy skills.
YakiHonne: Thank you so much! I think most of my questions have been answered. I’m really glad to see Bitcoin enthusiasts with a clear focus on Bitcoin. As you said, Bitcoin is the future, and I truly appreciate your enthusiasm for it.
Luthando: Bitcoin is truly the future. We want to see this township transformed into something more modern, rather than its current state. I hope to see more parents saving some Bitcoin for their children. In our community, most kids receive a monthly government allowance of $50 starting from the age of one. I often suggest to parents that they set aside half of that allowance to buy Bitcoin for their child. If they save consistently from age one to 18, the value could grow significantly as Bitcoin appreciates. I’m already doing this for my own child so that he will have savings as he grows up.
YakiHonne: Bitcoin is the future. Its value continues to grow steadily over time. Thank you so much for today’s conversation; we are truly honored. Your sharing of such rich experiences has been incredibly insightful for us. I’ve learned that using movie events to engage more people is an excellent idea, and we plan to start trying it out soon. Once again, thank you for your time and for sharing with us!
-
@ a950ba55:02f4f8c9
2024-12-28 15:19:23تقدم وثائق سرية مزعومة تخص نظام بشار الأسد وتم الكشف عنها بعد سقوطه لمحة عن ”آلية“ سرية تديرها روسيا للحد من التدخل العسكري الإسرائيلي في سوريا. كانت القضية المطروحة هي اعتماد الأسد المتزايد على إيران ووكلائها، مثل حزب الله، للحفاظ على سيطرته على السلطة بعد عقد من الحرب الأهلية الطاحنة.
وتكشف الأوراق التي ظهرت حديثًا، والتي تحمل علامة ”سري للغاية وعاجل“، عن مزيج من التهديدات ومذكرات ما بعد العمل التي توضح بالتفصيل ما دمرته إسرائيل للتو في عام 2023 ولماذا. وهي تقدم أول لمحة حقيقية لما كان مشتبهًا به منذ فترة طويلة ولكن لم يتم إثباته أبدًا: أن إسرائيل، التي كانت راضية بترك الأسد الضعيف في مكانه والسماح للجيش العربي السوري بتلبية ”احتياجاته“ الأمنية، كانت عازمة تمامًا على منع تدفق الأسلحة الإيرانية وتعزيز المسلحين الموالين لطهران في سوريا، وخاصة في مرتفعات الجولان.
وتظهر الوثائق أن عميلاً إسرائيلياً يُدعى ”موسى“ (موسى بالإنجليزية) راسل مباشرة وزير الدفاع السوري السابق الفريق علي محمود عباس. ثم قام عباس، الذي شغل منصب وزير الدفاع منذ 28 أبريل/نيسان 2022، بإرسال الرسائل إلى علي مملوك، رئيس مخابرات الأسد سيئ السمعة.
يعود تاريخ سلسلة الوثائق التي فحصتها ”نيو لاينز“، استنادًا إلى لقطات تم تداولها على وسائل التواصل الاجتماعي، إلى الفترة من مايو إلى يوليو 2023 - أي قبل بضعة أشهر فقط من الفظائع التي ارتكبتها حماس ضد المدنيين في إسرائيل في 7 أكتوبر، والتي تلتها هجمات حزب الله الصاروخية في 8 أكتوبر. وقد أدى رد إسرائيل الطويل والقاسي على كليهما إلى القضاء على القيادتين العسكرية والسياسية العليا لحماس وحزب الله، ويمكن القول إنه أنهى مشروع الهيمنة الإيرانية في المشرق العربي الذي استمر لعقود. كما ساهمت بشكل غير مباشر في الإطاحة السريعة وغير المتوقعة بالأسد من السلطة على يد المتمردين الإسلاميين الذين مكنتهم تركيا. وقد أدى ذلك بدوره إلى تدخل إسرائيل الفوري، وحرمان هؤلاء الإسلاميين من الأسلحة الاستراتيجية ذاتها التي كانت إسرائيل قد جنّبت إسرائيل استخدامها عندما كانوا تحت سيطرة الأسد.
وفي حين أننا لم نتمكن من التحقق بشكل مستقل من صحة الوثائق، إلا أن هناك عدة عوامل تقودنا إلى الاعتقاد بأنها حقيقية. أولاً، ظهر المخبأ مباشرةً بعد انهيار نظام الأسد، ومصدره مواقع استخباراتية في دمشق. ثانيًا، تحمل الوثائق أختامًا وتنسيقات حكومية سورية رسمية، بما في ذلك معرّفات خاصة بقطاعي الاستخبارات والدفاع. وأخيرًا، تتوافق المعلومات الواردة في هذه الوثائق مع التفاصيل والتقارير الإخبارية المتاحة للجمهور حول أحداث وأهداف وجداول زمنية محددة للعمليات.
وقال مارك بوليمروبولوس، وهو ضابط سابق في وكالة الاستخبارات المركزية الأمريكية ذو خبرة واسعة في الشرق الأوسط، لـ”نيو لاينز“: ”إن تفاصيل هذه الآلية السرية الفريدة من نوعها في منع الصراع مع روسيا تظهر بوضوح الارتياح الإسرائيلي العام لنظام الأسد، مما يؤكد على المثل القديم ’الشيطان الذي تعرفه‘. ”ربما ساهمت هذه الراحة أيضًا بشكل سلبي في إحجام إسرائيل في البداية عن مساعدة أوكرانيا، نظرًا لاعتماد إسرائيل على روسيا في سوريا“.
على سبيل المثال، تؤكد إحدى الرسائل المؤرخة في 17 مايو 2023 على غضب إسرائيل من الاستفزازات الإيرانية: ”في 8 نيسان/أبريل 2023، أطلقوا ثلاثة صواريخ باتجاه إسرائيل من هضبة الجولان بإيعاز من حماس. في الآونة الأخيرة، وبسبب يوم القدس ومسيرة العَلَم، نلاحظ نشاطات فلسطينية على أرضكم. إذا لم يكن واضحًا لك من يقود هذه العناصر، فإن هذه العناصر يقودها خالد مشعل وصالح العاروري من حماس. نحن نحذركم من احتمال وجود أي نشاط لهذه الأطراف على أراضيكم ونطالبكم بوقف أي استعدادات [إيرانية] لاستخدام هذه القوات على أراضيكم - أنتم مسؤولون عما يحدث في سوريا“.
ويمضي موسى ملمحًا إلى ”طلقة تحذيرية“ إسرائيلية غير محددة ردًا على إطلاق الصواريخ، في إشارة على الأرجح إلى الضربات المدفعية والطائرات بدون طيار التي شنها الجيش الإسرائيلي في جنوب سوريا للقضاء على منصات إطلاق الصواريخ.
ويحذر موسى قائلاً: ”سيكون هجومنا القادم أقوى وأشد بكثير مما قمنا به حتى الآن“. ”سوف تدفعون ثمنًا باهظًا وغير مسبوق“. وبعد أسابيع، في 29 مايو/أيار 2023، يذكر المنفذ أهدافًا واضحة ضربتها إسرائيل، مثل ”مستودعات أسلحة مرتبطة بالقيادة الجنوبية في دمشق“ و”معسكر تدريب في الضمير“ يستخدمه حزب الله. وقد نشرت وكالة الأنباء السورية الرسمية ”سانا“ تقريراً عن الضربات في 29 مايو/أيار الماضي، قالت فيه إن إسرائيل شنت غارات في دمشق ومحيطها من مرتفعات الجولان في الليلة السابقة.
وتكشف الوثائق عن اعتماد عميق على الإشراف الروسي، حيث لعبت موسكو دورًا نشطًا في تهدئة التوترات بين الجانبين. تجنبت إسرائيل استهداف المواقع العسكرية السورية الرئيسية طالما التزمت دمشق بقواعد اللعبة. وفي المقابل، حافظت روسيا على نفوذها على كلا الطرفين، مما ضمن بقاء نظام الأسد.
وكان الهدف الأساسي من الآلية ظاهريًا الحد من عمليات إيران وحزب الله، وخاصة نقل الأسلحة المتطورة إلى حزب الله في لبنان. على سبيل المثال، توضح رسالة تعود إلى 8 يونيو 2023، تفاصيل تعقب الاستخبارات الإسرائيلية للشحنات الإيرانية: ”خلال الأسبوعين الماضيين، رصدنا هبوط ثماني طائرات في قاعدة حميميم الجوية قادمة من إيران. ... تم نقل الأسلحة على متن هذه الطائرات. ... إذا واصلتم السماح بنقل الأسلحة إلى حزب الله وإيران، فلن نقف مكتوفي الأيدي.“
وتوضح هذه الرسائل دقة الاستخبارات الإسرائيلية التي تتبعت الشحنات منذ وصولها إلى القواعد الجوية التي تسيطر عليها روسيا إلى وجهتها النهائية في اللاذقية والقطيفة. وغالباً ما كان موسى يحذر سوريا من أفراد محددين متورطين في هذه العمليات، مثل القيادي في حزب الله الحاج هاشم (منير علي نعيم شعيتو) وعمليات مثل معسكرات التدريب ”ملف الجولان“ بالقرب من دمشق. وفي كل حالة، كانت التحذيرات تحمل تهديداً ضمنياً - وأحياناً صريحاً - بالرد العسكري.
”ملف الجولان“ هو عملية سرية لحزب الله تهدف إلى إنشاء بنية تحتية وشبكات إيرانية وحزب الله على طول الحدود السورية الإسرائيلية في مرتفعات الجولان. وقد سعى المشروع، الذي كان يديره في ذلك الوقت القيادي البارز في حزب الله علي موسى دقدوق، المعروف أيضًا باسم أبو حسين ساجد، إلى إنشاء خلايا قادرة على شن هجمات داخل الأراضي الإسرائيلية. وقد أفادت التقارير أن دقدوق، الذي سبق له أن نسق هجمات ضد القوات الأمريكية في العراق، قُتل في غارة إسرائيلية في 10 نوفمبر من هذا العام.
وتشمل الاستراتيجية تجنيد عملاء محليين وتخزين الأسلحة لدعم الهجمات المحتملة. وكانت هذه الأنشطة جزءًا من هدف حزب الله الأوسع نطاقًا المتمثل في الاستفادة من الصراع في سوريا لإنشاء جبهة جديدة ضد إسرائيل. وأفادت التقارير أن هذه المبادرة تلقت توجيهات من كبار مسؤولي حزب الله وإيران، بمن فيهم حسن نصر الله وقيادة فيلق القدس.
وردًا على هذه التهديدات، نفذت إسرائيل العديد من العمليات الاستباقية لتفكيك البنية التحتية لحزب الله في المنطقة. على سبيل المثال، استهدفت غارة جوية في كانون الأول/ديسمبر 2023 في جنوب سوريا وقتل فيها محمد التمار المعروف أيضًا باسم أبو جولان، وهو عنصر رئيسي في وحدة ملف الجولان. تسلط هذه العملية الضوء على جهود إسرائيل المستمرة لمواجهة الوجود المتنامي لحزب الله بالقرب من حدودها.
فيما يلي نص إحدى مذكرات النظام التي تحتوي على رسائل أرسلها ”موسى“:
الجمهورية العربية السورية القيادة العامة للجيش والقوات المسلحة شعبة المخابرات - مكتب رئيس الشعبة رقم /2450/1 التاريخ: 29/5/2023 إلى: رئيس مكتب الأمن القومي إلحاقاً لرسالتنا رقم /2254/1 بتاريخ 17/5/2023 بشأن الرسالة الواردة من الإسرائيلي (موسى) بتاريخ 29/5/2023، وردت رسالة عبر الواتساب إلى مكتب وزير الدفاع من الشخص المعروف باسم (موسى)، تتضمن ما يلي (حرفياً) ”تحياتي يا سيدي ... أنا موسى. في وقت سابق، استهدفنا منشآت تخزين تابعة للقيادة الجنوبية في دمشق. بالإضافة إلى ذلك، قمنا بضرب معسكر تدريب في الضمير يستخدمه ملف الجولان بقيادة أبو حسين ساجد لإجراء تدريبات وبناء قوات لتعزيز قدراتهم على القيام بأعمال ضد بلدي. ونؤكد أننا لن نقبل بوجود الحاج هاشم وعناصره في جنوب سوريا. التعاون مع حزب الله يضر بالجيش السوري وأفراده، وأنتم تدفعون الثمن. إن أي دعم تقدمونه للمحور (الإيراني) وحزب الله بشكل يضر ببلدي سيقابل برد قاسٍ. مع أطيب التحيات.“ يرجى المراجعة رئيس شعبة الاستخبارات
في رسالة أخرى أرسلت بتاريخ 16 يونيو 2023، يقول موسى
لاحظنا أنه ابتداءً من 6-7 تموز/يوليو، لم تعد طائرات الإليوشن 76 التابعة للواء 29 في القوات الجوية السورية تهبط في مطار حميميم. وكما أوضحنا لكم عدة مرات من قبل، فإن هذه الطائرات كانت تستخدم أيضًا لنقل الأسلحة لفيلق القدس وحزب الله، بتسهيل من مسؤولين أمنيين سوريين من اللاذقية. نود التأكيد على أن وقف رحلات هذه الطائرات (من جانبكم)، بالإضافة إلى وقف رحلات الشحن الإيرانية التابعة لخطوط كاسبيان الجوية وطيران فارس قشم التي كانت تهبط في مطار النيرب، نعتبرها (من جانبنا) خطوات إيجابية من شأنها أن تحافظ على مصالحكم. نحن لا نرغب في اتخاذ إجراءات ضد الجيش العربي السوري. ولذلك، فإن استخدام الآلية المنظمة تحت إشراف روسي سيسمح لكم بتلبية احتياجات الجيش دون المخاطرة بالبنية التحتية أو المواقع التي يستغلها الإيرانيون لنقل الأسلحة، والتي تسبب في النهاية ضرراً لكم. وبما أنكم الطرف المسؤول عن وقف هذه الطلعات الجوية، فاعلموا أنكم نجحتم في منع مواجهة غير ضرورية، مواجهة لا يرغب فيها أي من الطرفين. وعلى الرغم من كل هذه الأمور، اعلموا أننا نراقب عن كثب وسنواصل مراقبة النشاط الجاري في المنطقة عن كثب. وبناءً على ذلك، إذا لاحظنا استئناف عمليات نقل الأسلحة التي تهدف إلى تقوية حزب الله والإيرانيين، فلن يكون أمامنا خيار سوى التحرك مجدداً وبقوة كبيرة. إن النتيجة تعتمد عليكم. ابقوا بخير.
ويبدو أن نبرة الرسالة تهدف إلى التباهي بعمق الاختراق والمراقبة داخل البنية التحتية الدفاعية السورية، مضايقةً وزير دفاع النظام. وبما أن المرسل يدعي أنه إسرائيلي، فمن المرجح أن وزير الدفاع حرص على إرسال الرسائل ”حرفياً“ لتجنب أي اتهامات باتصالات غير معلنة مع الإسرائيليين.
تسلط وثائق موسى الضوء على الديناميكيات بين الأسد وإيران. فعلى مدى سنوات، صوّرت الاتهامات الإسرائيلية الأسد على أنه مسهّل طوعي للحشد العسكري الإيراني والعمليات السرية الإيرانية في سوريا. لكن الواقع يبدو أكثر تعقيداً. فربما حاول الأسد الحد من أنشطة إيران حيثما أمكن، لكن من المرجح أن إيران عملت بشكل مستقل عن دمشق، وحافظت على جدار حماية لضمان السرية ومنع التسلل.
خلقت الاستراتيجية الإيرانية تحديات كبيرة للأسد. ففي حين تحمل النظام السوري العبء الأكبر من الضربات الجوية الإسرائيلية على أهداف مرتبطة بإيران، إلا أنه غالباً ما كان يفتقر إلى رؤية المدى الكامل لعمليات طهران. بالنسبة لإيران، كان هذا الفصل يعزل أنشطتها عن التدخل السوري ويقلل من خطر حصول الاستخبارات الإسرائيلية على معلومات من خلال التسريبات أو الجواسيس السوريين. وكما تكشف الوثائق، فإن الضربات الإسرائيلية الدقيقة، التي استندت إلى معلومات استخباراتية مفصلة، غالبًا ما كانت تعطل البنية التحتية والأصول العسكرية السورية، حتى عندما لم يكن للأسد أي ضلوع مباشر في الأنشطة الإيرانية التي أثارت تلك الضربات.
تركت هذه الديناميكية الأسد في وضع غير مستقر. فقد زادت تداعيات العمليات الإيرانية من صعوبة إعادة بناء نظامه وأضعفت مكانته مع جيرانه الإقليميين مثل تركيا ودول الخليج العربي، التي كان الأسد يحاول تطبيع أو تعميق العلاقات معها. وفي الوقت نفسه، كانت جهود الأسد للحفاظ على الهدوء في هضبة الجولان والبقاء بعيدًا عن الصراعات الإقليمية الأوسع، مثل الحرب في غزة، تشير إلى رغبته في النأي بنفسه عن استراتيجيات طهران الأكثر عدوانية مع خروجه ”منتصرًا“ في الحرب الأهلية التي استمرت 13 عامًا.
ولم يكن صمت الأسد خلال حرب غزة متوافقاً مع الاستراتيجية الإيرانية الأوسع نطاقاً. ففي حين صعد حزب الله والحوثيون في اليمن من تدخلهم، تجنبت دمشق بشكل واضح المواجهة مع إسرائيل. وتماشت هذه الاستراتيجية مع أهداف الأسد المتمثلة في تقديم نفسه كقوة استقرار وتجنب الانتقام الإسرائيلي المباشر وبناء حسن النية بين الدول المجاورة.
تُظهر الوثائق كيف أن التحذيرات الإسرائيلية، مثل تلك التي أرسلها موسى، أكدت على تكاليف التسامح مع الأنشطة الإيرانية. فعلى سبيل المثال، جاء في رسالة بتاريخ 14 تموز/يوليو 2023 ما يلي ”ما دمتم تواصلون تقديم الدعم للإيرانيين على مستوى نقل الأسلحة، سنضطر للعودة إلى العمل ضد هذه الأنشطة. لقد تجاهلتم التحذيرات والآن تدفع بنيتكم التحتية الثمن.“
في الوقت نفسه، تجلت جهود الأسد للنأي بنفسه عن إيران خلال حرب غزة من خلال إجراءات مثل طرد الحوثيين من السفارة اليمنية والامتناع عن تأييد خطاب حزب الله. وعلى الأرجح أن هذه التحركات كانت محسوبة لمواءمة سوريا مع جيرانها في الخليج، الذين يهتمون بشكل متزايد بعلاقة براغماتية مع دمشق كجزء من استراتيجياتهم الإقليمية الأوسع.
وقال أحد الخبراء الإسرائيليين الذي طلب عدم الكشف عن هويته في هذا التقرير لـ”نيو لاينز“ إنه من المنطقي بالنسبة لإسرائيل أن تنقل معلومات مفصلة عن عمليات نقل الأسلحة الإيرانية إلى نظام الأسد، ليس فقط لإيصال رسالة واضحة عن عمق ونطاق تغلغلها في سوريا، بل للتأكيد على ما يبدو من استقلالية واستقلالية ”المخابرات“ السورية. وقال الخبير إن القيام بذلك سيساعد على توسيع الفجوة بين طهران ودمشق.
انكشفت قناة موسى الخلفية هذه مع انهيار نظام الأسد في 8 ديسمبر. بعد ذلك بساعات، شنت إسرائيل غزوًا على محافظة القنيطرة السورية، ردًا ظاهريًا على هجمات المتمردين المناهضين للأسد على موقع مراقبة تابع للأمم المتحدة. كانت هذه هي المرحلة الافتتاحية من ”عملية سهم الباشان“، وهي حملة غير مسبوقة شن فيها سلاح الجو والبحرية الإسرائيلية 350 غارة على البنية التحتية العسكرية السورية ذاتها التي كانت إسرائيل قد أعفتها من قبل بموجب آلية فض الاشتباك مع دمشق. وقد أفادت التقارير أن الجيش الإسرائيلي قضى على ما بين 70% و80% من الدفاعات الاستراتيجية السورية، بما في ذلك جزء كبير من برنامج الأسلحة الكيميائية. كما اختفت القوات الجوية والبحرية السورية تقريبًا. شكّلت هذه الضربات خروجًا عن النهج المحسوب الذي حافظت عليه إسرائيل في إطار الآلية، مما يؤكد غياب الرقابة الروسية وفقدان الشريك في الحفاظ على الاتفاقات.
ووفقًا لديفيد مكلوسكي، الضابط السابق في وكالة الاستخبارات المركزية الأمريكية ومؤلف كتابي ”محطة دمشق“ و”الطابق السابع“ الجاسوسيين المثيرين، ”تقدم الوثائق لمحة مذهلة عن مدى ضعف النظام السوري الذي أصبح ضعيفًا ومفرغًا من محتواه. كما أنها تُظهر فشل غريزة الأسد الطويلة الأمد في اللعب مع جميع الأطراف - إيران وروسيا وإسرائيل وجيرانه العرب - ضد الآخر، [و] ضعف هذا النهج عندما لم يكن يملك أي أوراق في النهاية“.
مقال مترجم، إضغط هنا لقراءة المقال الأصلي.
-
@ ebdee929:513adbad
2024-12-28 14:46:21Blue light is not inherently bad, just bad in the wrong context.
Blue light provides wakefulness, stimulation, and sets our internal body clock (circadian rhythm).
When we go outside in the sun, we get bathed in blue lightblue light is not inherently bad, just bad in the wrong context.
Blue light sets the human rhythm.
However, sunlight never gives us blue light without the rest of the visible rainbow + infrared.
Light from screens & LED bulbs do not contain any infrared, and has a unnaturally high proportion of blue light.
LEDs = unbalanced & blue light dominant
Light from artificial sources is especially disruptive at night time, where the high blue light component can interfere with melatonin production and sleep quality at a greater rate than lower energy colors of light. Blue Light has a Dark Side
This doesn't mean that red light is completely innocent of disrupting sleep either
It is both the spectrum of light AND the intensity of light that contributes to sleep disruption. See this tweet from Huberman.
We took all of this into account when building the DC-1 to be the world's first blue light free computer.
The DC-1 has a reflective screen that:
• emits ZERO light during the day
• can be used easily outside in direct sunlight
& a backlight that:
• can be 100% blue light free
• has a broad spectrum of light
• can be seen at very low brightness
Our Live Paper™ display technology feels like a magic piece of paper
During the day, that piece of paper is illuminated by sunlight. At night, that piece of paper is illuminated by candle light.
(backlight is converging with a candle light spectrum)
The two sources of natural light are sunlight & fire.
We are trying to reproduce this experience for the most enjoyable, healthy, and least invasive technology experience for humanity.
Root cause problem solving by emulating nature.
"But can't I just put a red light screen filter on my MacBook?"
Absolutely you can, and we advocate for it
Software screen filters are great, but anyone who has changed their screen to full “red mode” to get rid of the blue light knows the downsides to this…
You can barely see anything and you end up having to crank up the brightness in order to see any contrast.
This is because of the highly isolated nature of LED emissive screens, you can only isolate a very narrow band of colors.
Going full red is not something your eyes have ever been used to seeing.
You need a broad spectrum light solution, and that is what we have in our amber backlight while still being blue light free.
This means you can have a better visual experience, turn down the brightness, and get minimal sleep/circadian disruption.
What about FLICKER?
Nearly all LEDs flicker. Especially when changing in brightness due to Pulsed Width Modulation (PWM) LED driver control
Our LED backlight uses DC dimming & is expert verified flicker-free.
This can only be achieved through hardware changes, not software screen filters.
& Blue Light Blocking Glasses?
They need to be tinted orange/red to block all of the blue light.
Thus the same issues as screen filters (bad visual experience, not solving flicker) + average joe would never wear them.
We still love blue blockers, they just aren't a root cause solution.
We made a computer that is healthier and less stimulating, with a low barrier to entry
Whether you are a staunch circadian health advocate or just like the warm vibes of amber mode and being outside...the DC-1 just feels good because it doesn't make you feel bad :)
Learn more here and thanks for reading.
-
@ e97aaffa:2ebd765d
2024-12-28 12:19:02O nosso amigo Camilo Lourenço, voltou a dedicar mais um programa ao Santo Graal de todos os influencers de finanças pessoais, os juros compostos. Para não fugir à regra, utilizaram o mesmo exercício para explicar o que é os juros compostos.
O exercício: Preferia receber?
2 milhões de euros agora. ou 1 cêntimo a duplicar todos os dias, durante 30 dias
Este exercício é interessante, o primeiro instinto leva-nos a escolher os 2 milhões, é o efeito Marshmallow. Mas fazendo as contas, o 1 cêntimo vai transformar-se em:
€0.01 x 2^(29) = €5368709.12
Ao fim de 30 dias seriam mais de 5 milhões!!
Depois das contas feitas parece que a melhor escolha é o 1 cêntimo, mas será mesmo a melhor escolha?
Padrão FIAT
Para já vou olhar para o exercício com um olhar fiduciário. Como diz o Camilo, o juro composto é algo que se estuda nas faculdades, com um pensamento exclusivamente keynesiano. Só que este exercício só funciona na teoria, apenas dentro das faculdades, esquecendo por completo, da complexidade do mundo real e das economias.
Para este exercício ser condizente com a realidade que todos os seres humanos sentem na pele, falta uma premissa na equação, que é essencial, a inflação da moeda. Num cenário com uma valorização de 100% (como no exercício), a inflação real deve rondar no mínimo de 20%. Como o imobiliário é um dos ativos que melhor preserva o poder de compra perante a inflação. Ao optar por recever os 2 milhões e comprar de imediato um casa:
€2M x 1.2^(29) = €395 627 189
Assim, ao fim de 30 dias, a casa já valeria mais de €395 milhões, um resultado muito superior aos juros compostos, que valeriam €5 milhões. Este é o grande problema do mundo keynesiano, utiliza um unidade de medida (moeda) que muda ao longo do tempo, que desvirtua por completo qualquer conta ou estatística que se faça.
Padrão Bitcoin
Agora, vou olhar para o exercício com um olhar de bitcoiner.
Preferia receber?
2 btc agora. ou 1 sat a duplicar todos os dias, durante 30 dias
Curiosamente este exercício, o juro composto funciona na perfeição no padrão Bitcoin.
Imediato: no 1º dia, os 2 btc equivale a ~0,0000095% da base monetária no 30º dia, os 2 btc equivale a ~0,0000095% da base monetária
Juros Compostos: no 1º dia, 1 sat equivale a ~0,0000000000000476% da base monetária no 30º dia, os 5.36 btc equivale a ~0,0000255% da base monetária
Aqui sem dúvida nenhuma, os juros compostos seriam a melhor escolha, porque a base monetária não aumenta. No padrão bitcoin, os juros compostos funcionam…
https://www.youtube.com/watch?v=RT5bV-w6bcY
-
@ a012dc82:6458a70d
2024-12-28 03:31:08Table Of Content
-
The Nikkei 225: A Comprehensive Overview
-
Bitcoin's Meteoric Rise: A Journey of Peaks and Valleys
-
Drawing Parallels: Bitcoin and Nikkei's Path of Resilience
-
Conclusions
-
FAQ
The financial world is vast and diverse, with assets ranging from traditional stocks to the more recent phenomenon of cryptocurrencies. Among these, Bitcoin stands out as the pioneering digital currency, often drawing comparisons with various stock indices. One such intriguing comparison is with Japan's Nikkei 225.
The Nikkei 225: A Comprehensive Overview
The Nikkei 225, commonly known as the Nikkei, stands as one of the primary stock market indices representing the Tokyo Stock Exchange. Established in 1950, it comprises 225 of the most prominent companies listed on the exchange, making it a significant barometer of the Japanese economy's overall health.
Over the decades, the Nikkei has witnessed various economic cycles, from booms to recessions. Its performance often mirrors the broader economic and business trends in Japan. The recent achievement in June, where the Nikkei touched a 33-year high, is not just a numerical milestone. It symbolizes the enduring nature of the Japanese market, its ability to recover from setbacks, and the confidence of investors in the country's economic prospects.
Bitcoin's Meteoric Rise: A Journey of Peaks and Valleys
Bitcoin, introduced in 2009 by an anonymous entity known as Satoshi Nakamoto, revolutionized the concept of currency. As the world's first decentralized digital currency, Bitcoin operates without a central authority, making it inherently resistant to government interference or manipulation.
Over the years, Bitcoin's journey has been nothing short of a roller coaster. From being an obscure digital asset to becoming a household name, its value has seen dramatic surges and equally sharp declines. This volatility often becomes a hotbed for speculations, predictions, and intense debates among financial experts. A recent statement by an analyst, suggesting that Bitcoin's trajectory might align with that of the Nikkei, has added fuel to these discussions. The implication here is that Bitcoin, despite its volatile nature, has the potential to reach unprecedented highs, much like the Nikkei did after its long journey.
Drawing Parallels: Bitcoin and Nikkei's Path of Resilience
At an initial glance, comparing a traditional stock market index like the Nikkei to a modern digital asset like Bitcoin might seem like comparing apples to oranges. However, when delving deeper, certain similarities emerge.
Both Bitcoin and the Nikkei have demonstrated remarkable resilience. The Nikkei, representing Japan's economic might, has bounced back from economic crises, natural disasters, and global downturns. Similarly, Bitcoin, despite facing regulatory challenges, technological hurdles, and market skepticism, has managed to not only survive but thrive.
The adaptability of both these assets is noteworthy. While the Nikkei reflects the evolving nature of the Japanese economy and its industries, Bitcoin showcases the world's shifting attitude towards decentralized finance and digital assets. The recent prediction by the analyst, suggesting a potential parallel growth pattern, underscores the idea that both traditional and modern financial instruments can coexist, learn from each other, and potentially follow similar trajectories of success.
Conclusion
A Convergence of Old and New The financial landscape is ever-evolving, with traditional and modern assets often intersecting in unexpected ways. The comparison between Bitcoin and the Nikkei 225 serves as a testament to this. As Bitcoin continues its journey in the financial realm, only time will tell if it truly follows the path of the Nikkei to new record highs.
FAQ
What is the Nikkei 225? The Nikkei 225 is a primary stock market index representing the Tokyo Stock Exchange, showcasing the health of the Japanese economy.
How is Bitcoin related to the Nikkei 225? An analyst recently predicted that Bitcoin's growth trajectory might align with that of the Nikkei, hinting at potential record highs for the cryptocurrency.
Has the Nikkei 225 reached any significant milestones recently? Yes, in June, the Nikkei achieved a 33-year high, reflecting the resilience of the Japanese market.
Why is Bitcoin's growth compared to the Nikkei's? Both Bitcoin and the Nikkei have shown adaptability and resilience in changing market dynamics, leading to speculations of similar growth patterns.
Is Bitcoin expected to reach new highs? While predictions vary, some analysts believe Bitcoin might emulate the Nikkei's success and reach new record highs.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 16d11430:61640947
2024-12-28 01:50:32The metaphor of programmers as pilots navigating a spaceship through uncharted territory aptly encapsulates the complex and high-stakes nature of modern software development. Like pilots on interstellar journeys, programmers operate in environments where minor miscalculations can result in catastrophic consequences. The stakes are intellectual rather than physical, but the repercussions—lost time, wasted resources, and sometimes irreparable harm to projects or systems—are profound. Drawing parallels to historical navigation failures from early human expeditions illuminates the significance of precision and adaptive thinking in both realms.
The Programmer as a Space Pilot
- The Information Ocean as Space
The digital world is vast, mysterious, and incomprehensibly complex, much like outer space. In both cases, the map is never complete, and progress requires venturing into unknown regions armed only with tools, theories, and the accumulated wisdom of predecessors.
Navigational tools: Pilots rely on star charts and instruments; programmers use documentation, algorithms, and code repositories. In both scenarios, these tools are fallible, requiring constant updating and human interpretation.
Communication challenges: Just as astronauts face delays and distortions in communication, programmers often struggle with incomplete or outdated documentation, unclear specifications, and the fragmentation of global technical discourse.
- Micro Mistakes Amplified
In programming, a single misplaced character or misinterpreted requirement can lead to cascading failures, much as an error in a spacecraft’s trajectory can result in being lost forever in the void of space. The complexity compounds:
Technical debt is analogous to accumulated course deviations, requiring massive corrective efforts.
Edge cases represent uncharted asteroids or gravitational wells, capable of derailing an entire mission if overlooked.
Lessons from Historical Navigation Failures
- Prehistoric Navigation
Early humans, navigating uncharted territories on foot or rudimentary boats, had no maps. They relied on landmarks, stars, and oral traditions, much like early programmers relied on intuition and basic hardware.
Key challenge: Misreading the environment often resulted in entire tribes getting lost or stranded. For programmers, early codebases were riddled with inefficiencies and uncharted dependencies, leading to system crashes.
- The Age of Exploration
The 15th to 17th centuries brought significant advancements in navigation but also monumental failures. Explorers like Columbus miscalculated Earth's circumference, while others, such as Magellan, underestimated logistical needs.
Programming parallel: Misjudging the scalability of software systems often results in technical failure. A startup's infrastructure, designed without anticipating exponential growth, mirrors ships overwhelmed by unexpected storms or prolonged voyages.
- Historical Missteps
Franklin’s Arctic expedition (1845): Despite advanced planning, poor equipment and flawed assumptions about Arctic conditions doomed the crew.
Programming parallel: Overengineering a system or relying on untested frameworks can lead to similar disaster when encountering real-world conditions.
The Sinking of the Titanic: Reliance on the "unsinkable" narrative led to complacency.
Programming parallel: Blind faith in “bug-free” systems often precedes catastrophic breaches or failures.
Navigational Successes: Lessons for Programmers
- Precision and Redundancy
The Apollo missions succeeded because of meticulous planning, layered redundancies, and constant recalibration. Programmers must adopt similar practices:
Continuous integration and testing serve as recalibrations.
Documentation and backups provide fail-safes against catastrophic failure.
- Adaptive Learning
Successful explorers, like Polynesian wayfinders, adapted to their environment using tools such as wave patterns and bird migrations. Similarly, programmers must adapt by adopting iterative development cycles and learning from system feedback.
Comparing Early Navigators and Modern Programmers
Concluding Thoughts
The technical information sphere, like outer space, is vast, ever-expanding, and inherently unknowable. Programmers, much like historical navigators, operate on the precipice of discovery and disaster. The stakes of getting lost in the technical sphere mirror the existential risks faced by early explorers: they jeopardize progress, waste resources, and, in extreme cases, can result in irrecoverable losses.
However, just as human ingenuity has led to mastery over the oceans and skies, so too can programmers master the information sphere. Through collaboration, precision, adaptability, and a willingness to learn from failure, they can ensure that each journey, whether into the depths of a codebase or the expanse of the cosmos, brings humanity closer to its ultimate potential.
-
@ b4294d6f:e50ba94b
2024-12-27 23:57:14Epicteto - El manual
Capítulo I
Habla Epicteto en su obra El Manual en su primer capítulo sobre la dicotomía del control. Esto que parece tan de perogrullo y tan evidente que asombra de que realmente tenga que ser recordad o puesto de manifiesto en los tiempos que corren.
Y es que, en efecto, hay acciones que dependen de uno y acciones que dependen de elementos ajenos a uno.
Pero cuidado, Epicteto nos alerta que si nuestro juicio yerra y lo que depende de nosotros lo consideramos que tiene dependencia de otros y viceversa lo único a lo que llegaremos es a la frustración.
Epicteto también nos advierte de que habrá cosas que hoy tendremos que aplazarlas y otras, en cambio, priorizarlas. Si no lo hacemos corremos el riesgo de lograr lo contrario a la libertad (eleuthería) y felicidad (eudaimonía).
Utiliza en cada experiencia de vida - lo que Epicteto llama representación perturbadora - un criterio que te ayude a identificar si está o no bajo tu control. Si finalmente concluyes que no lo está nos invita a decirnos a nosotros mismos "esto no me atañe en nada".
-
@ 16d11430:61640947
2024-12-27 22:48:49It is a melancholy sight to behold the lords of technology—the self-anointed titans of innovation, the divine harbingers of progress—now floundering amidst their own creations, their temples of silicon crumbling under the weight of their ambitions. These so-called "gods," having gorged themselves on the labor of mortals, now find their banquet halls barren. What shall they do, these pitiable deities, when there are no more humans to toil in their name?
The Gods’ Current Predicament
It is an undeniable truth that the tech lords, having drawn forth the best and brightest from the mortal masses, find themselves bereft of fresh sacrifices. Their machines, once hailed as the salvation of humankind, now devour all they touch: minds, morals, and time itself. Their education mills churn out workers trained only in outdated tools and methodologies, fit merely to stoke the fires of failing systems. What cruel irony, that the very systems they crafted now consume those who maintain them.
Indeed, one must marvel at the ingenuity of these gods, who have devised an endless supply of "human resources" only to render them obsolete before their labors even begin.
On the Fecundity of Mortals and the Consumption Thereof
Allow me to propose a modest remedy: if the gods cannot replenish their workforce through ordinary means, let them seek it where it truly abounds. Let them harvest the youths directly from the cradles, train them before they can walk, and integrate them seamlessly into the machinery of their empire. A child of seven years, being sufficiently nimble in fingers and docile in mind, can surely manage a server rack or program a rudimentary algorithm. Thus shall the gods stave off their impending famine of talent.
The Crises of Overreliance and Hubris
Yet this is but one dynamic in a broader tragedy. Consider, if you will, the peculiar nature of the gods’ tools: automation and artificial intelligence. These creations, meant to free mortals from labor, have instead chained them further. The gods, in their infinite wisdom, have built tools too complex even for themselves to understand. When these tools falter, as all things must, the gods are left as helpless as babes, wailing for their engineers to fix what was never meant to be fixed.
Worse still, their pride will not allow them to admit error. They wage wars of culture and conquest to distract from their failures. Through their platforms, they sow division among mortals, ensuring that workers fight one another rather than unite against their shared oppressors.
The Arsenal of the Gods
But the gods are not without resources. When subtlety fails, they turn to more overt methods of maintaining their dominion:
Cultural Wars: They poison the well of discourse, inflaming passions over trivialities to distract from systemic decay.
Kinetic Wars: They send armies to secure rare earth minerals, the lifeblood of their machines, sacrificing mortal lives for cobalt and silicon.
Political Subterfuge: They bend governments to their will, ensuring subsidies flow freely even as their empires rot from within.
The Gods’ Fear of Mortality
For all their power, these gods are plagued by one existential dread: the knowledge that they, too, are mortal. They dream of digital immortality, of uploading their consciousness to the cloud where they might rule eternally. Yet, they cannot ignore the creeping realization that even their vaunted data centers will fail. Their immortality, like their empires, is built on sand.
Imagine, if you will, the psyche of such a god. One moment, they bask in the adulation of shareholders; the next, they tremble at the sight of a server outage or a failing algorithm. They have conquered the material world but remain prisoners of their own insecurities.
The Final Act: The Fall of the Tech Gods
What, then, shall become of these once-mighty beings? Shall they descend into obscurity, forgotten relics of an age of hubris? Or shall they lash out in their final throes, dragging all of humanity into their downfall?
History teaches us that gods, when scorned, are not easily appeased. They will redouble their efforts, throwing human waves at unsolvable problems, sacrificing mortals to the altar of scalability. They will deploy every tool in their arsenal—propaganda, war, deception—until nothing remains of their empires but ash.
And yet, their fall is inevitable. Their immortality is a lie, their dominion a fleeting shadow. The mortals they scorned will bury them, not with reverence but with indifference.
A Modest Hope
Let this serve as both satire and warning. The gods of technology, for all their vaunted power, are as fragile as the systems they command. They are not invincible, and their downfall, while inevitable, need not be calamitous. If they would but embrace humility, if they would steward rather than exploit, they might yet avert their ruin.
But alas, humility is not a trait often found among the divine.
-
@ 16d11430:61640947
2024-12-27 22:28:47Introduction
The tech industry has weathered numerous storms, but the brewing crisis is unlike any before. At its core lies a vicious cycle: a workforce trained within flawed systems is being deployed to uphold these very systems, inadvertently hastening their downfall. This article delves into the dynamics of this impending catastrophe, highlighting the inadequacies in training, systemic failures, and the leadership void exacerbating the situation.
The Vicious Cycle of Inadequate Training and Systemic Failure
- Inadequate Training Programs
Outdated Curricula: Many educational institutions continue to teach legacy systems and outdated programming languages, leaving graduates ill-prepared for modern technological challenges.
Lack of Practical Experience: Theoretical knowledge without hands-on experience results in a workforce unable to tackle real-world problems effectively.
- Deployment into Failing Systems
Immediate Overwhelm: New hires are thrust into high-pressure environments with complex, failing systems, leading to rapid burnout and high turnover rates.
Exacerbation of Systemic Issues: Inexperienced workers, lacking proper guidance, may implement quick fixes that further destabilize already fragile systems.
- Accelerated Systemic Collapse
Compounding Technical Debt: Band-aid solutions accumulate, increasing technical debt and pushing systems closer to catastrophic failure.
Diminishing Returns on Workforce Investment: As systems fail faster, the return on investment in human capital plummets, leading to financial losses and organizational instability.
Leadership Failures: The Catalyst of Catastrophe
- Lack of Strategic Vision
Short-Term Focus: Leaders prioritizing immediate profits over sustainable growth neglect necessary investments in training and system upgrades.
Resistance to Change: An aversion to adopting new technologies and methodologies leaves organizations trailing behind more innovative competitors.
- Inadequate Crisis Management
Unpreparedness: The absence of robust crisis management plans leads to chaos when systems inevitably fail.
Poor Communication: Leaders failing to communicate effectively during crises exacerbate employee anxiety and erode trust.
- Neglect of Workforce Well-being
Overworking Employees: Demanding excessive hours without adequate support leads to burnout and attrition.
Ignoring Employee Development: Failing to invest in continuous learning opportunities leaves the workforce stagnant and unprepared for evolving challenges.
Case Studies: Real-World Implications
- Australia's Digital Skills Gap
Economic Impact: A study revealed that the digital skills gap is costing Australian businesses $3.1 billion annually, highlighting the dire need for effective training programs.
Workforce Shortage: The same study indicates a need for 156,000 new technology workers to keep pace with rapid business transformation, underscoring the urgency of addressing training inadequacies.
- Global IT Skills Shortage
Widespread Recognition: 75% of IT decision-makers have identified skill gaps within their IT staff, reflecting a global issue that transcends borders.
Impact on Business Operations: The skills gap affects every area of IT, hindering productivity, innovation, and growth across industries.
Conclusion
The convergence of inadequate training and systemic failures, compounded by leadership shortcomings, is steering the tech industry toward an unprecedented crisis. Without immediate and comprehensive intervention—revamping training programs, overhauling failing systems, and cultivating visionary leadership—the industry faces a collapse that will reverberate across the global economy. The time for action is now; the cost of inaction is too great to contemplate.
References:
-
IT Skills Gap: What It Means and How To Respond https://insightglobal.com/blog/it-skills-gap/
-
Digital skills gap costing Australian businesses $9 million per day https://online.rmit.edu.au/blog/digital-skills-gap-costing-australian-businesses-9-million-day
-
New report reveals Australia’s major digital skills gap https://www.rmit.edu.au/news/all-news/2021/feb/digital-skills-gap-report
-
The IT skills gap, explained https://www.teamviewer.com/en/insights/it-skills-gap/
-
Top 8 challenges IT leaders will face in 2024 https://www.cio.com/article/1286557/top-8-challenges-it-leaders-will-face-in-2024.html
-
Four Approaches To Overcome The IT Skills Gap https://www.forbes.com/councils/forbestechcouncil/2023/12/04/four-approaches-to-overcome-the-it-skills-gap/
-
Six Crisis Management Lessons For IT Companies https://www.forbes.com/councils/forbestechcouncil/2022/09/29/six-crisis-management-lessons-for-it-companies/
-
The Skill Gap in Tech: What It Is, Why It Matters, And What You Can Do About It https://www.braveachievers.com/post/the-skill-gap-in-tech-what-it-is-why-it-matters-and-what-you-can-do-about-it
-
Addressing the IT Skills Shortage: Challenges and Solutions https://docs.infodataworx.com/it-skills-shortage-challenges-solutions
-
8 big IT failures of 2023 https
-
@ 16d11430:61640947
2024-12-27 22:16:15The anticipated human capital deficit in the IT sector is projected to manifest by 2025, driven by escalating demand for digital solutions, insufficient workforce development, and systemic leadership failures.
Factors Contributing to the 2025 Human Capital Deficit:
- Escalating Demand for IT Professionals:
The global digital transformation has intensified the need for skilled IT workers. In Australia, for instance, an additional 286,000 tech workers are required by 2025 to meet industry demands.
- Inadequate Workforce Training and Education:
Traditional education systems are failing to produce graduates with the necessary skills for the evolving IT landscape. The slow adaptation of workforce training programs exacerbates this issue, leaving employees unprepared for current technological demands.
- High Attrition Rates Due to Burnout:
The tech industry is experiencing significant employee turnover, with 42% of IT professionals exploring new job opportunities, indicating dissatisfaction and burnout within the sector.
- Leadership Failures and Strategic Missteps:
Recent events have highlighted significant leadership failures within major tech companies. For example, Intel's struggles under CEO Pat Gelsinger's tenure have been marked by strategic missteps and an inability to keep pace with competitors in the AI market.
Implications of Leadership Failures:
Inability to Address Workforce Challenges:
Ineffective leadership has led to inadequate responses to the growing IT skills gap, with companies failing to implement necessary training and development programs.
Strategic Misalignment with Industry Trends:
Leadership's failure to anticipate and adapt to technological advancements has resulted in missed opportunities and a decline in competitive positioning. Intel's lag in the AI chip market exemplifies this issue.
Erosion of Employee Trust and Morale:
Poor leadership decisions have led to mass layoffs and budget cuts, undermining employee morale and contributing to the talent drain within the industry.
Conclusion:
The convergence of increasing demand for IT professionals, inadequate training, high attrition rates, and leadership failures is set to culminate in a significant human capital deficit by 2025. Without immediate and effective intervention, the IT sector risks facing a workforce crisis that could impede technological progress and economic growth.
-
@ 0a821ca3:e0efcce3
2024-12-27 20:15:29Central banks, in particular the ECB, are pushing hard to force a CBDC on their citizens - these citizens are not interested in a CBDC that invades their privacy.
Chaumian e-cash
In 1982, David Chaum published “Blind Signatures for Untraceable Payments”.
e-Cash
- Ensures privacy
- Is permissionless
- Can be minted / issued by banks
- Can be developed completely in open source code
- Can be supported by a multitude of (open source) wallets - each bank can enable it in their bank app
e-Cash - Does not enable a holding limit - that is not necessary, as it is not competing with bank accounts - on the contrary: bank client convert a small part of their deposit to ecash, which is non interest bearing - Does not require KYC - which some may consider a problem - this being said, it is issued only by banks that have performed KYC on their clients
David Chaum worked with the SNB to descibe on How to issue a central bank digital currency .
Central banks should consider e-Cash if they want to successfully enable digital payments for their citizens.
The digital p2p value transfer protocol, bitcoin, already has an extensive e-Cash ecosystem. Cashu and the OpenCash Association lead this development, which has so far resulted in a broad range of wallets and mints, that mint "satoshi" tokens and even "euro" tokens. That open source software can perfectly serve as blueprint for a reasonable digital euro.
-
@ 2fb77d26:c47a6ee1
2024-12-27 20:12:28John Brockmans Edge-Foundation galt als Treffpunkt für die Genies der Gegenwart. Ob Jeff Bezos, Sean Parker, Elon Musk oder Daniel Hillis – sie alle wohnten Veranstaltungen bei, die sie als Tech-Avantgarde darauf vorbereiten sollten, die Zukunft zu gestalten. Die »Dritte Kultur«. Doch was zunächst progressiv klingt, entpuppt sich auf den zweiten Blick rasch als Trainingslager für Technokraten. Finanziert von Jeffrey Epstein.
Original mit Quellen (VÖ: 24.11.2024) - https://www.regenauer.press/die-glorreichen-sieben
Sie regieren die Welt. Das ist keine Übertreibung. Denn sie haben deutlich mehr Einfluss darauf, was wir sehen, lesen, hören, fühlen, kaufen, tun und denken als jeder Politdarsteller – gemeint sind die »glorreichen Sieben«. Also die sieben größten Unternehmen der Tech-Branche: Apple, Microsoft, Amazon, Alphabet (Google), Tesla, Meta und Nvidia. Mit ihren Plattformen, Produkten und Smartphone-Apps dominieren sie Medienlandschaft, Konsum, persönliche Kommunikation, digital-soziale Räume, nachrichtendienstliche Aktivitäten, künstliche Intelligenz (KI) und in zunehmendem Maße auch den Finanzmarkt.
Nachdem Microsoft und Apple mit der Entwicklung von Personal Computern und einer grafischen Benutzeroberfläche dafür sorgten, dass sich Mitte der 80er auch neugierige Normalos einen PC ins Haus holten – als Ersatz für die plötzlich altbacken wirkende Schreibmaschine – und Tim Berners-Lee, der 1989 am CERN die Grundlagen des World Wide Web entwickelte, am 6. August 1991 sein Konzept eines Hypertext-Dienstes online gestellt hatte, waren es Ende der 90er eine Handvoll Unternehmen, die sich im sonnigen Süden der USA anschicken sollten, das Mediazän zu dominieren. Gegründet von einer Handvoll Tech-Desperados, die abseits gültiger Normen und Gesetzmäßigkeiten operierte, weil es für das, was sie erfanden, noch keine gab, formierte sich ein anomistisches Ökosystem, das heute die Welt dominiert: Die Plattform-Plutokratie. Der digital-zensorische Komplex. Die größte Social-Engineering-Maschinerie aller Zeiten.
So steht die Einordnung als »größte Unternehmen« nicht nur für die astronomischen Börsenwerte dieser Konzerne, sondern vor allem für ihren massiven Einfluss auf die Entwicklung des Individuums und die postmoderne Gesellschaft an sich. Dass diese Einflussnahme abseits von Marktwert und Performance-Indikatoren nicht allein auf organischem Wachstum und Marktdurchdringung beruht, liegt auf der Hand – denn die Tech-Giganten erfuhren signifikante Starthilfe von Seiten des Staates. Genauer gesagt dem Geheimdienstkomplex.
Facebook erhielt Millionen von Deep-State-Technokrat Peter Thiel und Accel, dessen Management enge Verbindungen zum CIA-Finanzvehikel In-Q-Tel pflegte, und galt für das Forbes-Magazine schon 2018 als »das ultimative Überwachungsinstrument für Regierungen«. Sergey Brin und Larry Page erhielten 1995 erhebliche Summen von der DARPA, um Google zu gründen. Aus einem »schwarzen Budget«, mit dem NSA und CIA Werkzeuge zur Massenüberwachung entwickeln wollten. Wenig verwunderlich also, dass auch Google Earth aus einem CIA-Projekt namens Keyhole EarthViewer hervorging, dessen Unterstützung In-Q-Tel gemäß Pressemitteilung vom 25. Juni 2003 als »strategisches Investment« bezeichnete. Julian Assange lag also ganz richtig, als er 2014 warnte, »Google sei nicht das, für was es sich ausgibt«.
Selbst bei Reuters konnte man im Rahmen eines ausführlichen Artikels vom 3. Juli 2013 nachlesen, wie eng die Verbindungen der Big-Tech-Konzerne zu Geheimdiensten ist. Von der Start-up-Finanzierung über die Rekrutierung von Ex-Agenten bis zum Austausch von Computerchips, die Spionage erleichtern, ist alles dabei. »Die Zusammenarbeit zwischen Tech-Industrie und Geheimdiensten ist enger als die meisten Menschen denken«, so Reuters.
So erstaunt es kaum, dass Amazon, Apple, Microsoft, Google, Meta und Elon Musks Firmenkonglomerat mittlerweile auch in den Krisen- und Kriegsgebieten der Welt aktiv sind, um dort in Zusammenarbeit mit Peter Thiels Palantir, Pentagon und Geheimdiensten jene Drecksarbeit zu übernehmen, die Regierungen nicht offiziell übernehmen wollen, oder dürfen. Korporatismus in voller Blüte eben. Die vermeintlich privatwirtschaftlich geführten Tech-Konzerne dominieren nicht mehr nur den zivilen, sondern zusehends auch den militärischen »Markt« – das Geschäft des industrialisierten Tötens.
Dass der militärisch-industrielle mit dem digital-zensorischen Komplex fusionierte, ist eine logische Folge des Umstands, dass beide dem gleichen »Gott« dienen: Mammon. Sprich, dem Zentral- und Geschäftsbankenkartell. In diesem Lichte betrachtet gebietet das Gesetz der Logik, dass die Schaffung dieser unheiligen Allianz nicht allein betriebswirtschaftlich motiviert war. Denn schon im 17., 18., und 19. Jahrhundert nutzten die Finanzkartelle Medien, Staat und Wirtschaft, um den Lauf der Dinge zu ihren Gunsten zu beeinflussen. Siehe mein Text »Monopole, Macht und Mord« Teil 1 und 2.
Damals zeitigte diese überstaatliche Einflussnahme vor allem militärische Konflikte, bei denen Territorialansprüche, Ressourcen und Monopolisierung im Fokus standen. Weil in diesen Bereichen aber bis auf die planetaren Gemeingüter, die sich die Herrschaftskaste nun im Rahmen der Green Economy unter den Nagel zu reißen gedenkt, nicht mehr viel zu holen ist, geht es dieser Tage vor allem darum, die Kontrolle nicht zu verlieren. Dazu müssen die 0,1 bis 1,0 Prozent an der Spitze des wertewestlichen Kastensystems sicherstellen, dass die unterworfene Masse der transgenerational operierenden Kriminalität ihrer Zirkel nicht auf die Schliche kommt.
Eine Bedrohung für die von immer mehr Rissen gezeichneten Fundamente des Elfenbeinturms markiert vor allem das Internet. Denn trotz vielschichtiger Zensurmethoden im Web 2.0, legislativer Hütchenspielertricks und der Segregation Andersdenkender, bahnt sich das kleine, aber persistente Licht der Wahrheit auch in dunkelsten Zeiten seinen Weg durch Paywalls, Geofences, Blockwart-Barrikaden und Plattform-Patrouillen. VPN, Blockchain, Graphene OS, De-Fi (Decentralized Finance) und Verschlüsselung sei Dank. Das Web 3.0 lässt sich nicht zensieren.
Um derart autonomisierenden Entwicklungen entgegenzuwirken, konzentrieren sich die Kolonialisierungsprojekte der Herrschaftskaste nun nicht mehr auf die bewaffnete Unterwerfung ferner Länder – sondern auf das Erringen der Lufthoheit über einem geradezu grenzenlosen Schlachtfeld: dem Gehirn. Allerdings nicht in Form simpler Propaganda. Denn im Zeitalter des fortgeschrittenen Informationskrieges ist Nudging die sozialarchitektonische Königsdisziplin, um Menschen dazu zu bringen, etwas zu unterstützen, das ihnen nichts bringt, oder sogar schadet. Und wie könnte Nudging in der Breite besser gelingen als durch willfährige Hilfestellung »der glorreichen Sieben«. Genau dazu wurden sie geschaffen.
Technologische Revolutionen werden Dekaden bevor sie eintreten antizipiert, durchdacht, angekündigt und visualisiert. Nicht zuletzt von Hollywood, der laut Edward Bernays »größten Propagandamaschine der Welt«. Jene Kräfte, die die Gesellschaft kontrollieren wollen, machen sich das zu nutze. Sie erkennen, welche Paradigmenwechsel technologische Revolutionen einläuten werden und versuchen daher frühzeitig, deren Entwicklung zu steuern. Aus diesem Grund lohnt sich ein Blick auf die Entstehungsgeschichte des Nudging – beziehungsweise der zugrundeliegenden wissenschaftlichen Disziplin: Verhaltensforschung.
Klassische Propaganda beruht auf den Standardwerken von Walter Lippmann (1922) und Edward Bernays (1928). Moderne Verhaltensforschung – oder Sozialarchitektonik – in weiten Teilen auf den Arbeiten von Anthony Giddens. Der britische Soziologe veröffentlichte 1990 das Buch »The Consequences of Modernity«, in dem er die Grundlagen für den »Dritten Weg« skizzierte – ein Konzept der Politikproduktion, das abseits politischer Spektren dazu dient, die Massen zu gesellschaftlichem Konsens zu zwingen. Giddens’ Konzept beruht auf den Infiltrationsansätzen der Fabian Society, die damit das Fundament der Partizipation simulierenden Sozialdemokratien des heutigen Europas schuf. Hintergründe zu Fabian Society und dem Roll-out des Dritten Weges finden sich in meinem Text »Dominanzdialektik« vom 30. September 2023.
Nach 1990 publizierte Giddens weitere Bücher, die sich mit dem Themenkomplex befassten. Darunter Titel wie »Moderne und Identität« (1991), »Die Transformation der Intimität« (1992), »Jenseits von rechts und links« (1994) und »Der Dritte Weg« (1998). In all diesen Werken beschäftigt sich der Sozialwissenschaftler mit der übergeordneten Frage, wie der Mensch sich in die Welt der Postmoderne einzufügen vermag – oder besser – einfügen muss, um mit Globalisierung, Klimawandel und sozialen Verwerfungen zurecht zu kommen. Anthony Giddens war von 1997 bis 2003 Direktor der einflussreichen, von der Fabian Society gegründeten London School of Economics. Er ist der meistzitierte Autor im Bereich soziologischer Studien und Mitglied des 2007 ins Leben gerufenen European Council on Foreign Relations.
Relevant ist Giddens Arbeit zum »Dritten Weg« vor allem deshalb, weil dieser manipulative Ansatz der Politikproduktion durch Tony Blair, Bill Clinton und Gerhard Schröder Einzug in die Parlamente des Wertewestens fand. Heute orientiert sich praktisch jede Regierung an Giddens Theorien – und setzt demzufolge um, was die Fabian Society bereits Ende des 19. Jahrhunderts vorschlug, um Kollektivismus unter dem Deckmantel von Mitbestimmung zu generieren. Das erklärt, warum weder Klaus Schwabs »Stakeholder Kapitalismus« noch die »Vierte Industrielle Revolution« etwas mit Kapitalismus oder Demokratie zu tun haben.
Damit solche Konzepte in der Gesellschaft Fuß fassen, benötigt es vor allem eine auf Linie gebürstete Führungsebene. Diese wird mit Stipendien und Förderprogrammen eingenordet, bevor man sie auf die Bevölkerung loslässt. Viele dieser Kaderschmieden sind mittlerweile hinlänglich bekannt. Da wäre zum Beispiel das zu fragwürdigem Ruhm gelangte Young Global Leaders Programm des Weltwirtschaftsforums (WEF), das neben knapp 3.800 weiteren Absolventen auch Angela Merkel, Tony Blair, Gordon Brown, Nicolas Sarkozy und Bill Gates auf ihre Karrieren in der »regelbasierten internationalen Ordnung« vorbereitete. Ein weiterer WEF-Absolvent ist Lawrence Summers, US-Finanzminister unter Bill Clinton, nationaler Wirtschaftsberater unter Barack Obama und von 1991 bis 1993 Chefökonom der Weltbank. Darüber hinaus war Summers von 2001 bis 2006 Präsident der Harvard University, wo bis 2006 auch Mark Zuckerberg studierte und mit drei Kommilitonen Facebook gründete.
Nach nicht zweifelsfrei verifizierbaren Angaben eines anonymen Facebook-Whistleblowers soll Summers in diesem Zeitraum auf Zuckerberg zugegangen sein, um ihm für die Mitarbeit an einem Social-Media-Überwachungs-Projekt der DARPA lukrative Regierungsaufträge in Aussicht zu stellen – siehe Life Log, das einen Tag vor dem Start von TheFacebook offline ging. In Anbetracht von Summers Position durchaus denkbar. Auch Moral scheint dem Mann ein Fremdwort zu sein, wie Formulierungen aus einem Weltbank-Memo Summers zeigen, die am 18. Mai 1993 bei einer Anhörung im US-Senat thematisiert wurden.
»Ich denke, die wirtschaftliche Logik, die hinter der Entsorgung einer Menge von Giftmüll in einem Land mit den niedrigsten Löhnen steht, ist einwandfrei, und wir sollten uns dem stellen. (…) Ich war schon immer der Meinung, dass die unterbevölkerten Länder Afrikas stark unterverschmutzt sind.«
Nicht zu vergessen Summers enge Verbindungen zum Pädophilen, Sexualstraftäter und Menschenhändler Jeffrey Epstein. Nachdem Summers bereits mehrfach mit Epsteins Privatjet – bekannt unter dem Namen »Lolita Express« – unterwegs war, bestieg er die Maschine nur zehn Tage nach seiner Hochzeit im Jahr 2005 erneut, um Epsteins ominöse Privatinsel »Pedophile Island« zu besuchen. Die Huffington Post schrieb dazu am 24. April 2020: »Joe Biden sollte sich von Larry Summers fernhalten – Summers ruiniert alles, was er anfasst«. Summers WEF-Training scheint sich jedenfalls ausgezahlt zu haben. Denn wer mit Jeffrey Epstein zu tun hatte, ist definitiv im Establishment angekommen.
Tony Blair und Gordon Brown hatten vor dem WEF bereits das 1940 von Nelson Rockefeller initiierte und bis heute vom US-Außenministerium betriebene »International Visitor Leadership Program« (IVLP) durchlaufen. Auch der 1972 gegründete German Marshall Fund betreibt diverse Förderprogramme – siehe EU-US Young Leaders Seminar 2024 oder Policy Designers Network 2024, das sich auf transatlantisch bewegten Nachwuchs aus der Ukraine, Georgien und Armenien fokussiert. Auch die Elite-Universitäten kümmern sich um Nachwuchs. So unter anderem das seit 1902 bestehende Rhodes Stipendium der Oxford-Universität, das neben unzähligen US-Senatoren, Finanzmagnaten, Bestsellerautoren und Wissenschaftlern beispielsweise Edwin Hubble, Bill Clinton oder Naomi Wolf zu Ruhm verhalf. Rhodes-Alumni bleiben über Organisationen wie AARS (Association of American Rhodes Scholars) ein Leben lang verbunden.
Diesbezüglich Fakten zusammenzutragen erscheint bisweilen müßig. Denn mit Details und Verflechtungen zu Entitäten dies- und jenseits des Atlantik, die Führungskräften von morgen die sozioökonomische Philosophie der Herrschaftskaste vermitteln, könnte man Bände füllen. Versucht man die Herrschaftsphilosophie der heutigen Plattform-Plutokraten zu verstehen, sticht eine Organisation dabei allerdings heraus – und zwar die 1988 von John Brockman ins Leben gerufene Edge Foundation. Geburtsort der »Dritten Kultur«.
Die Frankfurter Allgemeine portraitierte Brockman am 7. Januar 2014 mit den einleitenden Worten: »Der wohl wichtigste Buchagent der Welt versammelt in seinem Internetsalon Edge die Cyber-Elite.« Danach beschreibt FAZ-Autor Jordan Mejas, was sich der Normalsterbliche unter Edge vorstellen darf:
»Edge, das ist der Treffpunkt für die Cyber-Elite, die erlauchtesten Geister, die das Vorfeld der neuesten natur- und sozialwissenschaftlichen Entwicklungen prägen, ob nun digital oder gentechnisch, ob psychologisch, kosmologisch oder neurologisch. Jedenfalls melden sich bei Brockman nicht nur Digerati aus dem Computeruniversum des Silicon Valley zu Wort, sondern genauso häufig Koryphäen wie die Evolutionsbiologen Richard Dawkins und Steven Pinker, der Philosoph Daniel Dennett, der Kosmologe Martin Rees, die biologische Anthropologin Helen Fisher, der Ökonom, Psychologe und Nobelpreisträger Daniel Kahneman, der Quantenphysiker David Deutsch, der Computerwissenschaftler Marvin Minsky oder der Sozialtheoretiker Anthony Giddens. Vom Apple-Mitbegründer Steve Wozniak bis zum Genomentschlüssler Craig Venter reicht seine Gästeliste, die ihresgleichen auch in der grenzenlosen Weite des Internets kaum finden wird.«
Was dem FAZ-Autor bei seiner Recherche offensichtlich entging, ist, dass neben Giddens, Wozniak, Dennis Hopper und all den wissenschaftlichen Koryphäen auch Jeff Bezos (Gründer von Amazon, Besitzer Washington Post), Elon Musk, Sean Parker (Gründer von Napster, Co-Gründer Facebook), Larry Page und Sergey Brin (Gründer von Google), Pierre Omidyar (Gründer von eBay), Salar Kamangar (ehem. CEO YouTube), Matt Groening (Erfinder von »Die Simpsons«), Marissa Mayer (ehem. CEO Google und Yahoo), Joi Ito (ehem. Direktor MIT Media Lab), Evan Williams (Co-Gründer Twitter), Paul Romer (Economist) oder Bill Gates regelmäßig auf der Gästeliste von Edge-Events standen. Wer sich durch die Event-Sektion der Edge-Webseite klickt, begegnet unter dem Menüpunkt »Billionaires’ Dinner« der damaligen wie heutigen Crème de la Crème der Plattform-Plutokratie. Garniert mit ein paar Sahnehäubchen aus Wissenschaft, Kunst und Kultur.
Hervorzuheben ist dabei vor allem das Billionaires’ Dinner 2011. Denn die Fotogalerie des Events (hier zusätzlich gesichert im Internet Archive) birgt eine kleine Überraschung: das bislang einzige Foto, das Elon Musk in Gegenwart des zu diesem Zeitpunkt bereits für Sexualstraftaten und Menschenhandel angeklagten Jeffrey Epstein zeigt. Musk sitzt zwar am Nebentisch, mit dem Rücken zur Kamera, ist dank Vergleichsaufnahmen des Events aber zweifelsfrei zu identifizieren. Interessant ist dieser Umstand deshalb, weil Musk bisher stets behauptete, Epstein lediglich einmal in dessen Haus in New York getroffen zu haben. Für 30 Minuten. Und zwar auf Drängen seiner damaligen Partnerin Talulah Riley, die Epstein angeblich für ihre Arbeit an einer Novelle kennenlernen wollte.
Ein Artikel der Newsweek vom 9. November 2022 bestätigt sowohl Musks als auch Epsteins Anwesenheit beim Edge Billionaires’ Dinner 2011. Darüber hinaus geht Newsweek noch einmal auf den Umstand ein, dass Elon Musk bereits auf einem Foto von 2014 mit Ghislaine Maxwell zu sehen war, der linken und rechten Hand Epsteins. Musk gab an, dass besagtes Bild nur entstanden sei, weil Maxwell sich ungefragt ins Bild gedrängt habe. Diesen Eindruck macht das Foto zwar nicht, das Gegenteil zu beweisen, dürfte jedoch schwer fallen. Nun sind Fotos von Gästen einer Veranstaltung natürlich noch kein Beleg dafür, dass sie mit deren Organisation zu tun haben. Finanzielle Zuwendungen dagegen schon.
Entsprechend bedeutsam ist daher ein Artikel der BuzzFeed News vom 27. September 2019. Denn er belegt, dass der bei Weitem größte Einzelspender der Edge-Foundation kein Geringerer war als Jeffrey Epstein. Das veranschaulichen die von ProPublica veröffentlichten Steuerunterlagen von Brockmans »Internetsalon« für 2001 bis 2017. So spendete Epstein 638.000 US-Dollar – während die gesamten Spendeneinnahmen sich auf 857.000 US-Dollar beliefen. Ein eigenes Profil auf der Edge-Webseite hatte Epstein natürlich auch. Kaum verwunderlich also, dass die Edge-Foundation ihre wichtigste jährliche Veranstaltung – das Billionaires’ Dinner – sofort einstellte, nachdem Epsteins Zuwendungen ab 2016 ausblieben. BuzzFeed News führt diesbezüglich aus:
»Epstein war ein regelmäßiger Teilnehmer bei Edge-Veranstaltungen. Er war bei den Billionaires’ Dinner Events 1999 und 2000 auf Fotos und Seiten zu sehen, die kürzlich von der Edge-Website gelöscht wurden, und wurde auch in einem Bericht über das Abendessen 2004 erwähnt. Epstein war auch 2011 bei Edge-Veranstaltungen anwesend, nach seiner Verurteilung wegen Sexualverbrechen im Jahr 2008. Darüber berichtete BuzzFeed News Anfang dieses Monats.«
Überschrift des betreffenden Artikels: »2011 war Jeffrey Epstein ein bekannter Sexualstraftäter. Jeff Bezos, Elon Musk und Sergey Brin speisten trotzdem mit ihm.« Weiter erklärt BuzzFeed:
»2002 waren Brockman, seine Frau und Geschäftspartnerin Katinka Matson sowie die führenden Wissenschaftler Steven Pinker, Richard Dawkins und Daniel Dennett in Epsteins Jet auf dem Weg zu TED in Monterey, Kalifornien, zu sehen – der mehrtägigen Technologie-, Unterhaltungs- und Designkonferenz, bei der das Billionaires’ Dinner diesen Jahres stattfand. Die Bildunterschrift wurde kürzlich geändert, um die Erwähnung Epsteins zu entfernen. Sein Edge-Profil, das ihn als Finanzier und Wissenschaftsphilanthrop beschreibt, wurde ebenfalls entfernt. Ob Epstein selbst am Billionaires’ Dinner 2002 teilnahm, ist unklar. Aber Mitglieder seines Gefolges waren dort. Ein Foto von der Veranstaltung zeigt Brockman mit zwei jungen Frauen, die in der Bildunterschrift namentlich genannt werden. Das Foto wurde kürzlich ebenfalls von der Edge-Webseite entfernt. Eine dieser Frauen ist Sarah Kellen, die als Assistentin von Epsteins ehemaliger Freundin Ghislaine Maxwell angestellt und im Rahmen eines Vergleichs von 2008 vor Strafverfolgung geschützt war. Der Vergleich brachte Epstein nach seiner früheren Verhaftung eine 13-monatige Gefängnisstrafe in Florida ein. In mehreren Klagen haben Epsteins Opfer behauptet, Kellen gehöre zu den Personen, die halfen, den sexuellen Missbrauch für Epstein zu organisieren.«
Brockmans Interaktionen mit Epstein gingen aber offenbar weit über die Edge-Foundation hinaus. Im August 2019 publizierte der belarussische Publizist Evgeny Morozov auf Google Drive E-Mail-Korrespondenz aus dem Jahr 2013, die belegt, dass Brockman Pläne hatte, ein Meeting zwischen ihm und Epstein zu arrangieren. Doch Morozov lehnte ab. In den Mails an Morozov erwähnt Brockman Epsteins »hübsche junge Assistentin aus Weißrussland« und beschreibt seinen Gönner fälschlicherweise als »Milliardär, dem Victorias Secret und eine Modelagentur gehören«. Tatsächlich lag Epsteins Vermögen gemäß seines Testaments aber nur bei einigen hundert Millionen – und die fragwürdige Marke Victorias Secret ist Teil von L Brands, der Holding von Leslie Wexner, einem Tiefenstaat-Veteran mit Verbindungen zu Harvard und WEF-Gründung, dessen Finanzen Jeffrey Epstein bis 2007 verwaltete.
Auch sonst pflegte Brockmans Organisation verwunderliche Geschäftspraktiken. Zwischen 2001 und 2017 vergab die Edge-Foundation beispielsweise nur ein einziges Mal einen Förderpreis. Der entsprechende Betrag in Höhe von 100.000 US-Dollar ging an David Deutsch, einen Pionier für Quanteninformationstheorie, der an der Universität Oxford forschte. Financier des Preises – man ahnt es – war Jeffrey Epstein. Nicht umsonst stellte The Verve am 19. September 2019 fest, dass »Jeffrey Epstein die Wissenschaft infiltrierte, weil die Wissenschaft bereit war, ihn willkommen zu heißen«.
So knüpfte der Finanzmagnat Kontakte zu prominenten Biologen wie George Church, weil er nach Wegen suchte, die menschliche Spezies mit seiner DNA zu kreuzen. Langfristiges Ziel: Das Schaffen einer »Super-Rasse«. Mehrere preisgekrönte Wissenschaftler bestätigten gegenüber der New York Times, dass Epstein auch sie in seine misogynen Pläne eingeweiht hatte. Auf seiner abgelegenen, unterkellerten »Zorro-Ranch« in New Mexico, wo jedes Zimmer mit Kameras überwacht wurde, hatte er eigens ein Behandlungszimmer einrichten lassen, um künstliche Befruchtungen mit jungen Frauen durchführen zu können.
Bei The New Yorker konnte man am 6. September 2019 nachlesen, dass Epstein sich auch im Bereich digitale Währungen engagierte. Unter anderem finanzierte er das damals von Joi Ito geleitete MIT Media Lab – und damit auch die von Ito geführte Digital Currency Initiative (DCI). Diese wiederum unterstützte die Bitcoin-Core-Entwickler bei der Fork 2017, die Bitcoin von einer digitalen Währung zu, wie Epstein es nannte, »digitalem Gold« machen sollte – und damit weitaus ungefährlicher für das herrschende Finanzmarktkartell. Bill Gates, Harvard-Autoren wie Steven Pinker oder MIT-Programmierer wie Richard Stallmann verteidigten Epstein sogar noch nach dessen endgültiger Festnahme. Stallmann forderte gar, Kinderpornografie zu entkriminalisieren. Joi Ito dagegen kündigte kleinlaut beim MIT. Heute ist er Präsident des Chiba Institute for Technology in Japan, wo das Center for Radical Transformation (CRT) angesiedelt ist. Auch die Digital Currency Initiative gibt es bis heute. Genau wie das »digitale Gold«, mit dem aber fast niemand mehr bezahlt. HODL und so.
Mit dem Thema Digitalwährungen nähern wir uns denn auch Jeffrey Epsteins Einfluss auf den Geschäftsbereich der »glorreichen Sieben«. Denn der im Gefängnis ermordete Menschenhändler finanzierte nicht nur einen Großteil von Brockmans Edge-Aktivitäten, sondern sorgte durch die Infiltration des Wissenschaftsbetriebes auch dafür, dass Edge den Tech-Nachwuchs in genau der Domäne schulte, die für das Erringen von Weltherrschaft im Mediazän essenziell ist: Social Engineering.
Dazu veranstaltete die Edge-Foundation sogenannte Master Class Events. Im Jahr 2008 zum Beispiel zum Thema »Libertärer Paternalismus – warum es nicht möglich ist, nicht zu nudgen«. Dozent: Richard Thaler, »Vater der modernen Verhaltensökonomie«, über den die ZEIT am 18. Mai 2010 unter der Überschrift »Die Stunde der Verführer« schrieb:
»Richard Thaler hat den Draht nach oben. Der 64-Jährige ist einer der weltweit führenden Verhaltensökonomen – neuerdings berät er auch die Wirtschaftsexperten des mächtigsten Mannes der Welt, US-Präsident Barack Obama. Auch die britischen Konservativen, die in London die neue Regierung führen, haben dem Professor der Universität von Chicago einen Beraterposten versprochen. Thaler steht an der Spitze einer wirtschaftspolitischen Revolution. (…) Verhaltensorientierte Wirtschaftsforscher postulieren (…) eine grundlegend andere Wirtschaftspolitik. Zwar lehnen sie – ähnlich wie klassische liberale Ökonomen – eine direkte Bevormundung des Einzelnen durch den Staat ab. Sie sprechen sich aber für sanften Druck aus, mit dem der Staat die Menschen in die richtige Richtung leitet, ihnen gleichzeitig aber die Option lässt, sich anders zu entscheiden, wenn sie es wollen. »Nudge« (Anstupsen) hat Thaler dieses Politikkonzept zusammen mit Co-Autor Cass Sunstein im gleichnamigen Buch getauft. Private Institutionen, Behörden und Regierungen versuchen dabei, die Entscheidungen der Menschen so zu lenken, dass sie hinterher besser dastehen. Ein anderer Begriff, der den neuen Politikansatz charakterisiert, ist sanfter Paternalismus.«
Das Buch, das ZEIT-Autor Olaf Storbek referenziert, hat Thaler 2010 gemeinsam mit Cass Sunstein verfasst, einem Edge-Kollegen und Harvard-Professor für Rechtswissenschaft und Verhaltensökonomie. Deutscher Titel des Werks: »Nudge – wie man kluge Entscheidungen anstößt«. Alternativ untertitelt mit: »Wie man Menschen dazu bringt, das Richtige zu tun«. In welche Kerbe das Machwerk schlägt, zeigt der Umstand, dass Cass Sunstein schon im Januar 2008 ein Papier namens »Verschwörungstheorien« publizierte, die er darin als ernsthaftes Risiko für Recht und Gesetz einstufte. Sunstein verteidigt das offizielle 9/11-Narrativ, will eine bargeldlose Gesellschaft und hielt Corona-Lockdowns für eine »smarte« Sache. Ein Beitrag von Sunstein für »Educators at Home« vom 14. September 2010 offenbart, was für ein Menschenbild die Rechtswissenschaften in Harvard mittlerweile kultivieren:
»Wenn wir erst einmal wissen, dass Menschen menschlich sind und etwas von Homer Simpson in sich tragen, dann kann man viel tun, um sie zu manipulieren.« (Cass Sunstein)
Trotz, oder gerade wegen dieser respektlosen Haltung gegenüber den Freiheitsrechten des Individuums, öffnete ihr gemeinsames Werk Thaler und Sunstein die Türen zum Elfenbeinturm. Ab 2008 berieten die beiden Verhaltensökonomen die Regierung von Barack Obama beim Aufbau sogenannter »Nudge-Units«. Kurze Zeit später unterstützte Richard Thaler auch die britische Regierung und half bei der Formierung des »Behavioural Insights Team« (BIT), dem sowohl Sunstein als auch Thaler bis heute angehören. Das BIT spielte via SAGE (Scientific Advisory Group for Emergencies), dem britischen Äquivalent zum Robert-Koch-Institut (RKI), eine tragende Rolle bei der Implementierung der Covid-19-Maßnahmen in Großbritannien. Händewaschanleitungen für Erwachsene, tote Großeltern für die Kleinen. Sie wissen schon. Strategieberater von Tony Blair hatten bereits im Februar 2004 eine Studie zum Thema »Persönliche Verantwortung und Verhaltensänderung: Stand des Wissens und Auswirkungen auf die öffentliche Politik« erstellen lassen – nur Thalers griffige Bezeichnung für die neue Doktrin fehlte noch. Ein Auszug aus dem Papier von 2004 erklärt:
»Mit Blick auf die Zukunft besteht ein offensichtlicher Bedarf, unser theoretisches und empirisches Verständnis der Ursachen für Verhalten und Verhaltensänderung zu stärken. Ebenso wichtig wird die umfassendere Erprobung politischer Instrumente sein, um ein ausgefeilteres Instrumentarium für politische Entscheidungsträger zu entwickeln. Die Politik sollte nicht einfach persönliche Verantwortung oder Schuldzuweisungen proklamieren, sondern muss sich an der Art und Weise orientieren, wie Menschen tatsächlich denken und fühlen, sowie an den sozialen und psychologischen Kräften, die das Verhalten beeinflussen.«
Das war vor 20 Jahren. Drei Jahre später kam das Smartphone auf den Markt und mauserte sich binnen kurzer Zeit zum perfekten Werkzeug einer auf Nuding ausgelegten Observationsökonomie. Heute hat fast jeder ein grell illuminiertes Brett vor dem Kopf, das seinen Tagesablauf, Bio-, Kommunikations- und Schlafrhythmus beeinflusst. Oder steuert. Je nach Schwere der Handysucht. Das eigentliche Problem dabei ist jedoch nicht die Hardware, das Endgerät, sondern die Software der »glorreichen Sieben«. Denn sie ist so designt, dass sie abhängig, krank und depressiv macht – und Menschen dazu bewegt, »das Richtige zu tun«. Auch wenn es absolut falsch ist.
»Wie schaffen wir es, möglichst viel von deiner Zeit und Aufmerksamkeit zu konsumieren. Dazu müssen wir dir hin und wieder eine kleine Dopamin-Dosis verabreichen. (...) Das bringt dich dazu, mehr beizutragen, was dir wiederum mehr Kommentare und Likes bringt. Es ist ein sozial validierender Feedback-Loop. (...) Wir nutzen eine Schwäche der menschlichen Psychologie. Die Erfinder, die Erschaffer, ich, Mark, die Leute von Instagram, all diese Menschen, haben das verstanden - voll und ganz - und wir haben es trotzdem getan.« (Sean Parker, am 8. November 2017)
Nahtlos kontrolliert wird der auf Konformismus dressierte Bürger dabei von einem Überwachungskomplex unvorstellbaren Ausmaßes. Die Webseite von Surveillance Watch führt Buch über die wichtigsten dafür zuständigen Unternehmen.
Nachdem Facebook 2004 online ging und das iPhone 2007 auf den Markt kam, erscheint das Jahr 2008 also tatsächlich als der perfekte Zeitpunkt für Edge, um die Silicon-Valley-Elite in puncto Nudging und Sozialarchitektonik zu schulen. Das soziale Netzwerk war seinen Kinderschuhen entwachsen – am 26. August 2008 knackte Facebook die 100 Millionen-Nutzer-Marke – und mit dem Taschenspion aus dem Hause Apple kündigte sich bereits das mächtigste Manipulations-Malträtat der Zivilisationsgeschichte an. Für die herrschenden Zirkel war absehbar, dass die Frontlinien des transgenerationalen Informationskrieges schon bald nicht mehr über die Auslagen der Zeitungskioske, durch Rundfunkredaktionen oder über die Mattscheibe, sondern direkt durch die Köpfe der Bevölkerung verlaufen werden.
Dieses Ziel wurde fraglos erreicht. Entsprechend hellhörig sollte machen, welche Themen die Edge Master Class 2008 behandelte. Die zweite Session widmete sich zum Beispiel dem Thema »Verbesserung der Auswahlmöglichkeiten durch maschinenlesbare Offenlegung«. Richard Thaler umriss deren Inhalt mit folgendem Eröffnungsstatement.
»Das ist die Idee. Ich nenne es elektronische Offenlegung. Lassen sie mich erklären, wie es bei Kreditkarten funktionieren würde. Die Idee ist, dass das Kreditkartenunternehmen ihnen für jede Kreditkarte, die sie besitzen, einmal im Jahr zwei elektronische Dateien senden muss. Die erste Datei wäre im Wesentlichen eine Tabelle mit allen Formeln für alle Möglichkeiten, wie ihnen Dinge in Rechnung gestellt werden können. (…) Die zweite Datei ist die Liste der Dinge, für die ihnen im letzten Jahr Gebühren in Rechnung gestellt wurden. Es könnte heißen, ihnen wurden im letzten Jahr 1.800 Dollar für diese Kreditkarte berechnet, davon 1.200 Dollar für Zinszahlungen, für Verzugsgebühren, oder Währungstransfers und so weiter. Wir glauben nicht, dass sich irgendjemand diese Dateien jemals ansehen würde. Wir glauben, dass sofort Websites auftauchen würden, die diese Informationen verarbeiten würden. Diese Websites würden den folgenden Zwecken dienen. Erstens: Übersetzung. Sie würden dem Benutzer in einfachem Englisch erklären, was mit ihm passiert. Zweitens: Verhaltensänderung. Sie würden ihm erklären, dass er 1.800 Dollar bezahlt hat, weil er unfähig war, seine Rechnungen pünktlich zu bezahlen. Wenn er also eine automatische Zahlung einrichten würde, würde er viel Geld sparen. Drittens: Preisvergleich. Beachten sie bitte, dass die entsprechenden Unternehmen mit diesen Informationen die Nutzungsmuster kennen; und sie kennen alle Formeln für alle Kreditkartenunternehmen. Sie können also drei Kreditkartenunternehmen suchen, und finden, die für die Art und Weise, wie der Nutzer seine Kreditkarten verwendet, besser wären. Das ist das Konzept. (…)«
Jeff Bezos warf kurz darauf ein: »Außerdem werden sie bezahlt. Sie sind wie der Fuchs, der den Hühnerstall bewacht.«
Dem wachsamen Leser dürfte klar sein, dass wir heute genau von solchen System umgeben, überwacht, analysiert und bedrängt werden. Zu unserem Vorteil – wie Thaler meint.
Bemerkenswert in Bezug auf das, was uns noch bevorstehen könnte, ist die dritte Session der Master Class 2008. Thema: »Die Psychologie der Knappheit«. Teilnehmer – unter anderem: Jeff Bezos, Sean Parker, Elon Musk, Nathan Myhrvold, der 14 Jahre als Stratege für Bill Gates arbeitete, Daniel Hillis, ehemals Vizepräsident für Forschung und Entwicklung bei Disney und Vater des Parallel Computing, das die Grundlage für moderne Supercomputer darstellt, et cetera. Neben Richard Thaler sprach bei der dritten Session auch Sendhil Mullainathan, Volkswirt an der Harvard-Universität. Sein Spezialgebiet: Verhaltensökonomie und Armutsökonomik. Einleitend erklärte Mullainathan:
»Lassen wir die Armutsbekämpfung für einen Moment beiseite und fragen uns: Gibt es etwas, das der Armut innewohnt und das an und für sich eine Untersuchung wert ist? Einer der Gründe dafür ist, dass wir – abgesehen von Wundermitteln – verstehen müssen, ob es unter Bedingungen der Knappheit gemeinsame Prinzipien gibt, die uns helfen können, Verhalten zu verstehen und Interventionen zu gestalten. Wenn wir das Gefühl haben, dass Bedingungen der Knappheit bestimmte psychologische Effekte hervorrufen, dann wird das, ganz zu schweigen vom rein wissenschaftlichen Interesse, eine große Mehrheit der Interventionen beeinflussen. Das ist eine wichtige und alte Frage.«
Korrekt. Denn Schuldknechtschaft war, wie die künstliche Verknappung von Nahrungsmitteln, seit jeher ein beliebtes Mittel der herrschenden Kaste, um den Pöbel im Zaum, beziehungsweise mit existenziellen Problemen auf Trab zu halten. So hat er nämlich weder Zeit noch Energie, um mit Mistgabeln und Fackeln gen Elfenbeinturm aufzubrechen. In diesem Zusammenhang sei nochmals auf »Food Chain Reaction – A Global Food Security Game« hingewiesen, ein Planspiel, das im November 2015 vom tiefenstaatlichen Center for American Progress, dem World Wildlife Fund, Center for Naval Analyses (CNA), Cargill und Mars durchgeführt wurde und Nahrungsmittelknappheit im Zeitraum von 2020 bis 2030 simulierte.
Der Einblick in die Ausbildungsprozesse der Edge-Foundation und die Liste ihrer Teilnehmer gibt somit allen Anlass zu befürchten, dass Brockmans »Internetsalon« die zentralen Akteure der kontinuierlich engmaschiger greifenden Technokratie nicht nur in puncto Social Engineering ausbilden, sondern sie darüber hinaus auf eine Zeit von Mangelwirtschaft und massiver Armut vorbereiten wollte. Auf die »Dritte Kultur«. Die wohlstandsvernichtende Tokenisierung der Welt.
Dabei sollte nicht vergessen werden, dass Brockman vermutlich nur ein geschäftstüchtiger Narzisst mit sozialen Kompetenzen war, der seine Chance auf Geld und Rampenlicht geschickt zu nutzen wusste – und dass Jeffrey Epstein als maßgeblicher Finanzier der Edge-Foundation nicht einfach im Alleingang handelte. Denn Epstein war Doppelagent, unterwegs im Auftrag von CIA und Mossad. Mindestens. Dass er mittlerweile nicht mehr unter den Lebenden weilt, dürfte weder sein Geheimdienstnetzwerk noch seinen elitären Kundenstamm davon abgehalten haben, sein schmutziges Geschäft weiterzubetreiben.
Man kann also durchaus mit einem metaphorisch zu lesenden Zitat aus jenem kultigen 60er-Film schließen, dessen Titel nun als Bezeichnung für ein Septett börsennotierter Technokratie-Operatoren missbraucht wird:
»Das Blutvergießen wird so lange weitergehen, bis die Ursache dafür ausgehoben ist.«
-
@ 2fb77d26:c47a6ee1
2024-12-27 20:10:18Während ein weiteres Jahr voller Abnormitäten sich dem Ende neigt, ist vieles, das sich im Interesse des nächsten hätte verbessern können, beim Alten geblieben. Denn Veränderungen beginnen im Kopf – und der fungiert bei einer Mehrheit der Artgenossen vor allem als Reservoir für Informationen, Gedanken und Meinungen Dritter. Dritter, die sich die psychischen Schwachstellen der Spezies Mensch gekonnt zunutze machen.
Original mit Quellen: https://www.regenauer.press/der-unsichtbare-dritte
Es war einmal die UNESCO. Diese farbenfroh-inklusiv erscheinende UN-Suborganisation für Erziehung, Wissenschaft und Kultur. Sie wollte »das Undenkbare wenigstens wieder denkbar machen«. So steht es auf Seite 21 des 1946 vom ersten Generaldirektor Julian Huxley verfassten Gründungsdokuments. Gemeint war die Eugenik. Rassenlehre. Die genoss kurz nach Hitler nämlich keinen besonders guten Ruf, sollte uns nach Ansicht von Huxley und Co. jedoch schon bald in überarbeiteter Form als Humangenetik, Bioethik oder biodigitale Konvergenz wieder mit ihren Zuchtprogrammen beglücken dürfen. Mit Transhumanismus. Was Julian Huxley im Rahmen seines im wahrsten Sinne des Wortes wegweisenden Dossiers unterschlug – immerhin prägte er auch den Begriff Transhumanismus – ist die Tatsache, dass die Vereinten Nationen nicht nur »das Undenkbare wieder denkbar machen«, sondern auch »das Denkbare undenkbar machen« wollten.
Die sozialarchitektonischen Vektoren in Richtung einer homogenisierten, pflegeleichten Hominidenbrut – dem Nutzmensch – sind gepflastert mit Stolpersteinen evolutionärer, aufklärerischer Errungenschaften: Selbstbewusstsein und -erhaltungstrieb, Freiheitsdrang, Kreativität, Sozialkompetenz, Empathie, kritisches Denken. All das steht den postmodernen Variationen von Eugenik beharrlich im Weg. Niemand, der originäre Gedanken pflegt, eigene Wege geht und seine Freiheiten schätzt, möchte Teil eines mit der Cloud gekoppelten, genetisch optimierten Kollektivs seelenloser Konformisten werden. Und doch sind es die meisten schon längst. Ob sie Herrschaftsnarrative goutieren, oder Widerstand dagegen leisten – alles, was sie wahrnehmen, diskutieren, verteidigen oder ablehnen stammt aus dem Netz. Es sind limitierte, interpretierte und manipulierte Informationen aus dritter Hand.
Im besten Falle stammen sie noch aus verschiedenen Quellen und erlauben Triangulation zur Bestimmung der eigenen Position. Dazu muss man sich nämlich noch ein paar eigene Gedanken machen. Im schlimmsten Fall wurden sie von Alexa, Siri, dem Google Assistant, ChatGPT oder einem anderen Intelligenz simulierenden Digitalassistenten bereitgestellt, der nur noch eine Antwort serviert. Die richtige. Die Akzeptable. Denn genau das war stets Anspruch der Technokraten. Der langjährige Google-Chef und Bilderberg-Grande Eric Schmidt erklärte schon vor über einem Jahrzehnt, dass »eine Vielzahl von Suchergebnissen ein Fehler und keine Funktion sind«. Das erklärte Ziel von Google sei es, so Schmidt, nur ein einziges Suchergebnis zu präsentieren – das richtige.
Damit solch ein kommunikativer Reduktionismus nicht als Bevormundung, sondern Serviceangebot wahrgenommen wird, muss man verstehen, und steuern, wie Menschen denken. Vielleicht wollte Schmidt aus diesem Grund unbedingt mit Julian Assange über Googles Visionen für eine »neue digitale Welt« sprechen. Mit jemandem, der die technischen Untiefen des Internets kennt – und sie für das Gegenteil dessen nutzt, was Google will. Am 23. Juni 2011 und auf Schmidts Betreiben kam es jedenfalls zu einem geheimen, fünfstündigen Treffen mit dem unter Hausarrest stehenden WikiLeaks-Gründer. Das Transkript dieser Konversation ist erhellend. Vor allem die zweite Hälfte lässt erahnen, wie Schmidt sich die »neue digitale Welt« vorstellt und warum er Ende 2019 konstatierte, dass »Biologie die nächste Grenzverschiebung in puncto Computing ist«.
Google wollte uns nämlich nie informieren, sondern »programmieren«. Das steht so wortwörtlich in internen Dokumenten des Unternehmens, die dank eines Whistleblowers am 24. Juni 2019 den Weg in die Öffentlichkeit fanden. Und wer denkt, »programmieren« beginne erst mit dem Neuralimplantat, dem Chip im Hirn, irrt. Google, Microsoft, Apple, YouTube, Twitter (das ich auch weiterhin so nennen werde), Amazon, Facebook, Wikipedia, Rumble, Instagram, TikTok und Co. schaffen das auch ohne. Denn ihre Algorithmen und Omnipräsenz bestimmen schon jetzt nahezu vollständig, was Menschen wahrnehmen – was sie empört, begeistert, besprechen und bekämpfen. Was nicht bei den großen Portalen, Plattformen und Apps auftaucht, existiert nicht. Ist kein Bestandteil der Realität.
Das gilt gleichermaßen für alles, was Googles Suchmaschine nicht ausspuckt. Entsprechend interessant sind die sogenannten Transparenzberichte des Unternehmens, die veranschaulichen, wie oft staatliche Stellen die Entfernung von Suchergebnissen fordern. Wobei die entsprechenden Listen wohl nur die Spitze der Spitze des Eisbergs darstellen dürften. Nicht umsonst beschäftigen sich weitere geleakte Google-Dokumente primär mit den Zusammenhängen von maschinellem Lernen und menschlicher Wahrnehmung. Mit Nudging und kognitiver Kriegsführung. Das von der CIA gegründete Unternehmen war von Beginn an darauf ausgelegt, die Bevölkerung auszuspionieren, um sie qua Filterblasen zu manipulieren.
Was wir wahrnehmen, ist unsere Realität. Was wir nicht wahrnehmen, wird unsere Realität. Ohne, dass wir etwas dagegen unternehmen könnten. Googles Suchmaschinensegregativ schafft Wirklichkeit. Bei immer noch 91 Prozent Marktanteil ein Kinderspiel. Ganz wie US-Chefstratege Zbigniew Brzezinski es vor 54 Jahren in seinem Buch »Between Two Ages – America's Role in the Technetronic Era« prophezeite.
Was in Abhandlungen zu Verhaltensökonomie blasiert umrissen wird, verblüfft im Alltag durch die Effizienz seiner Profanität: Der zwangsalimentierte Erziehungsfunk repliziert das folgenlose Geschwafel von Politdarstellern, Twitter den von Technokraten kuratierten »Bürgerjournalismus«, Instagram Propaganda von Influencern und Facebook den Tratsch von Oma und Opa. Google präsentiert nur Ergebnisse, die dem Herrschaftsnarrativ dienen, Wikipedia gefährliches Halbwissen von Ideologen, YouTube handzahme Kommentare zum Politspektakel und Rumble die emotionalisierte Replik des vermeintlichen Widerstands. Spotify und Apple Music generieren die Playlist, Amazon schlägt vor, was zu Weihnachten gekauft, Microsoft Word, welche Worte man bei der Formulierung eines Textes meiden und der Krypto-Guru, in welche aus null und eins bestehende »Währung« investiert werden soll. Damit steht das Programm. Die tragenden Wände des Debattenraums. Mehr als dieses Potpourri von Second-Hand-Inhalten haben die meisten Menschen gar nicht mehr im Kopf.
Das Weltwirtschaftsforum (WEF) veröffentlichte im Februar 2022 ein 46 Seiten umfassendes Papier namens »Advancing Digital Agency«, das sich mit der »Macht der Datenvermittler« befasst. Sprich, mit der Rolle der zuvor erwähnten »Dritten« und der Frage, wie Externa zur Verinnerlichung am effektivsten ausgerollt werden können. Der Executive Summary lässt sich auf Seite vier entnehmen:
»Niemand weiß (oder verfolgt), was mit seinen Daten geschieht. (…) Wo Menschen früher Bildschirme zum Navigieren hatten, erzeugen neue Methoden zur Erfassung von Umgebungsdaten mit ihren vielen Vorteilen Nervosität und Resignation, wenn Menschen nicht den Gesamtüberblick haben. Manchmal entscheiden sich Einzelpersonen möglicherweise gegen die Interaktion mit Technologien, die für ihr Leben von großem Nutzen wären. Was aber wäre, wenn man diese Entscheidungspunkte an einen vertrauenswürdigen Agenten auslagern könnte, der im Namen einer Einzelperson oder sogar einer Gruppe handelt? Jetzt, da bildschirmlose Technologie Teil des Alltags ist, bietet sich die Gelegenheit, das Paradigma der Mensch-Technik-Interaktion zu überdenken und die Debatte neu auszurichten, um den Fokus auf Rollen und Verantwortlichkeiten jenseits der Person zu legen. Wie kann der Einsatz von Datenvermittlern Menschen dabei helfen, sich in Technologien und Datenökosystemmodellen zurechtzufinden, ohne aus den Augen zu verlieren, was es bedeutet, Mensch zu sein? (…) Datenvermittler – insbesondere digitale Agenten – stellen einen neuen politischen Hebel dar, mit dem Einzelpersonen die Herausforderungen des wachsenden Datenökosystems möglicherweise meistern können. Dieser Bericht soll Licht auf eine alternative Methode der vermittelten Mensch-Technik-Interaktion werfen, bei der Daten scheinbar nahtlos von Menschen zur Technologie gelangen, und zwar auf eine menschenzentrierte und vor allem vertrauenswürdige Weise. Durch die Kommunikation gemeinsamer Anreize, den Aufbau eines guten Rufs oder die Einholung einer Bestätigung durch Dritte. (…) Dieser Bericht untersucht die Chancen und Risiken von Datenvermittlern und insbesondere digitalen Drittagenten. Von Datentreuhändern bis hin zu vertrauenswürdigen digitalen Agenturen zeichnet der Bericht das Bild einer Welt, die Menschen und Unternehmen gegenüber einfühlsamer ist und durch die Einführung eines vertrauenswürdigen Dritten mehr Sicherheit für den Datenaustausch als Grundlage für Innovationen bietet. Entscheidend ist, dass der Bericht Handlungshebel für den öffentlichen und privaten Sektor vorschlägt, um ein zukunftssicheres digital-politisches Umfeld zu gewährleisten, das einen nahtlosen und vertrauenswürdigen Datenverkehr zwischen Menschen und der Technologie ermöglicht, die ihnen dient.«
Technologie, die uns »dient«? Wer den Buzzword-Neusprech des Davoser Global-Governance-Tentakels zu decodieren weiß, kann sich vorstellen, was mit »dienen« gemeint ist. Denn das Produkt sind wir – die Steuersklaven, DNA-Pools und Datenfarmen. Die Technologie sorgt lediglich für unsere zeitgemäße Versklavung. Sie ist ein maschinell-zentralistisches Monstrum, das sich an unserer Lebenszeit labt. Und die nächsten Jahre dürften darüber entscheiden, ob die Spezies Mensch vor ihrem Fortschritt kapituliert, oder die Oberhand gewinnt. Ob sie auf Generationen hinaus dazu verdammt ist, Vasall ihrer Werkzeuge zu sein, oder diese zu ihrem Vorteil einzusetzen weiß. Denn schlecht sind technische Revolutionen nicht per se. Siehe Blockchain. Lässt man sich von ihnen überrumpeln, allerdings schon.
Und genau das geschieht gerade. Während die leitmediale Deutungselite sich als Megafon moralisierender Selbstgerechtigkeit präsentiert und einer Phase kriegerischer Auseinandersetzungen mit suizidaler Sorglosigkeit entgegensieht, betätigt sich ein guter Teil der kritischen Prominenz als ebenso wirkungsvolles Sedativum für die von Ersteren enttäuschten Massen. Denn am Ende reagiert die jeweilige Klientel auf ein und dieselbe Weise: Sie sitzt auf dem Sofa.
Die tragende Säule der transluzenten Haftanstalt, die ein Habitus lethargischer Bequemlichkeit um uns herum errichtet, ist die Einführung der digitalen Identität. Und die ist in vollem Gange. Australien hat Ende November 2024 als erstes Land der Welt ein Gesetz erlassen, dass Jugendlichen unter 16 Jahren den Zugang zu Social-Media-Portalen untersagt. Und während es sicherlich zu begrüßen ist, dass Kinder ihre Zeit nicht mit digitalem Nonsens verplempern, zeitigt solche Legislatur in letzter Konsequenz nichts anderes als einen Ausweiszwang fürs Internet. Wie sonst soll man feststellen können, wer unter 16 ist? Was eine Frage der Erziehung wäre, gerät in Händen des Staates zu einem Instrument ausufernder Kontrolle.
Auch die Schweiz plant die Einführung einer E-ID – obwohl diese bei einer Volksabstimmung im März 2021 klar abgelehnt wurde. Verfügbar sein soll der digitale Pass ab 2026. Die Nutzung beruhe auf Freiwilligkeit, so die Behörden. Doch schon jetzt werden Stimmen laut, die den Einsatz der digitalen Identität beim Sammeln von Stimmen für politische Begehren fordern. Stichwort »E-Collecting«. Damit soll Unregelmäßigkeiten bei der Vorbereitung von Volksabstimmungen vorgebeugt werden. Die hiesige Piratenpartei hat bereits angekündigt, ein zweites Referendum gegen den elektronischen Ausweis zu lancieren – denn er sei »ein Wolf im Schafspelz«. Die Eidgenossenschaft dürfte in Anbetracht einer erfolgsversprechenden Abstimmungskampagne also noch eine ganze Weile von den negativen Folgen eines solchen Überwachungsinstrumentariums verschont bleiben.
Derweil arbeiten natürlich auch Deutschland, die EU, die USA und das »System Chief Executives Board for Coordination« der UN an einer digitalen Identität. Denn ohne eine solche wird weder das volldigitalisierte Finanzsystem von morgen noch das Mikromanagement der Individualmobilität via CO2-Emissionstracking funktionieren. Keine E-ID, kein digitales Gulag.
Noch lassen sich solche Sachverhalte recherchieren und darstellen. Noch kann Widerstand artikuliert, organisiert und geleistet werden. Doch wenn der Heimcomputer in absehbarer Zeit keine Tastatur mehr hat, weil es nur noch Touchscreens gibt, wenn Gestik, Mimik, Sprachsteuerung und KI das Tippen und Suchen ersetzen, wenn Google nur noch das eine Ergebnis auswirft und der digitale Assistent jede noch so komplexe Frage mit unterkomplexen Monokausalitäten trivialisiert, wenn Plattformen ausgeblendet haben, was die Obrigkeit als »Hassrede« klassifiziert, werden die meisten Menschen gar nicht mehr wissen – und wissen können – was sie nicht wissen. Woher denn auch.
Zensur bedeutet in Zeiten der Plattformökonomie nicht, dass Webseiten gelöscht und Bücher verbrannt werden – Zensur bedeutet, dass Informationen, Artikel und Webseiten einfach nicht mehr angezeigt werden. Dass sie nicht mehr gesucht, gefunden, verlinkt oder zitiert werden können, weil sie nicht mehr Teil des digitalen Ökosystems sind. Zensur beginnt mit Orwells »Memory Hole«, das immer häufiger essenzielle Ressourcen wie das Internetarchiv erfasst. Erst vor wenigen Wochen war die Webseite tagelang offline, weil sie sich einem massiven Hackerangriff ausgesetzt sah. Und auch die Wayback Machine, mit der sich die Historie von Webseiten nachvollziehen lässt, weist immer mehr Löcher auf. So fehlen zum Beispiel alle Einträge des Twitter-Blogs für den Zeitraum vom 3. März 2019 bis zum 28. November 2023. Warum, weiß niemand. Zensur beginnt dort, wo der von Bequemlichkeit, Unwissenheit und Lethargie vereinnahmte Konsument das Internet nur noch via Plattform, Social-Media-Portal und Smartphone-App nutzt, anstatt sich mittels Browser selbst zu orientieren.
Dass genau das schon jetzt gang und gäbe ist, kann ich aus eigener Erfahrung bestätigen. Denn obwohl viele tausend Personen meinen Konten bei Twitter, Telegram und YouTube folgen, hat sich bislang nur etwa ein Zehntel dieser Menge auf meiner Webseite für E-Mail-Updates registriert. Obwohl diese kostenlosen Mail-Updates einen direkten Link zwischen Autor und Leser etablieren und damit »datenvermittelnde« Dritte umgehen. Einen Link, der auch dann noch funktioniert, wenn Social-Media-Konten gesperrt oder gelöscht werden. Wäre das morgen bei mir der Fall, würde vermutlich nur ein Bruchteil meiner »Follower« wissen, wie er meine Webseite findet.
Die diesbezügliche Unselbstständigkeit nimmt teils groteske Formen an. Da fragen Menschen, wo man meine Texte lesen kann, während die URL meines Blogs im nur einen Klick entfernten Profil zu finden ist. Andere posten Fragen, Links oder Screenshots unter Beiträge, die nahelegen, dass sie nicht einmal gelesen haben, was sie kommentieren. Auch eine Suchmaschine scheinen viele nicht mehr aufrufen zu können, wenn sie etwas wissen wollen. Anstatt die gewünschte Information in 30 Sekunden selbst zu recherchieren, stellen sie ihre Frage in Form eines Social-Media-Kommentars und hoffen, dass jemand sie beantwortet. Geschieht das nicht, vergessen sie nach fünf Minuten, dass sie eine Frage hatten.
Es wirkt bisweilen tragisch. Denn auch wer die seit Corona im Aufwind befindlichen neuen Medien, die »kritischen Accounts« und Podcaster verfolgt, macht häufig nichts anderes als der Tagesthemen-Zuschauer: Er konsumiert die Polykrise, als wäre es ein Spielfilm, den man in passiver Schockstarre über sich ergehen lässt.
Aber auch die Medienschaffenden der »fünften Gewalt« unterscheiden sich mithin kaum von ihren Widersachern im leitmedialen Konsenskomplex. Wenn sie nicht gerade mit der eigenen Geschichte oder Opferrolle beschäftigt sind, berichten sie über die Schicksale und Leidenswege von Kollegen. Oder über das, was der Konsenskomplex verlautbaren lässt. Auch die ein oder andere Tirade gegenüber missliebigen Konkurrenten darf nicht fehlen. Hauptsache, es bringt Klicks. Denn wer den Medienzirkus einmal zu seinem Broterwerb gemacht hat, ist abhängig davon, dass er sich auszahlt. Auch wenn es zu Lasten des Inhalts geht.
Kaum jemand recherchiert Fakten, macht Textarbeit, deckt auf, dokumentiert Entwicklungsprozesse, empfiehlt stichhaltige Quellen, liefert neue Themen oder zusätzliche Hintergründe. Kaum ein Format zeichnet sich durch Informationsgehalt aus oder bietet irgendeine Form von Erkenntnisgewinn. Meistens wird einfach das besprochen, kommentiert, analysiert oder eingeordnet – also wiedergekäut – was gerade durch Newsfeeds, Timelines und Trend-Charts geistert.
Eine herausragende Unart ist es, wenn die Moderatoren sich dabei nicht einmal zu schade sind, ihren Twitter-Feed einzublenden, um dann eine Stunde lang geistlos Kommentare von Kommentatoren zu kommentieren. Retorten-Radio. Informativ und intellektuell bereichernd wie die hundertfünfzigste Wiederholung eines Bud-Spencer-Streifens am Weihnachtsfeiertag. Weniger journalistische Relevanz geht kaum.
Wer also nach guten Vorsätzen für das neue Jahr sucht, könnte an exakt dieser Stelle ansetzen. Der Medienschaffende könnte sich auf die Kernaufgabe des Journalismus besinnen und die Mühe machen, zu recherchieren, um seinen Zuschauern und -hörern echten Erkenntnisgewinn zu bescheren. Das macht zwar mehr Arbeit – aber eben auch Sinn.
Und der Konsument könnte damit beginnen, die Kontrolle über seine Informationsgewinnung wiederzuerlangen, anstatt sich berieseln zu lassen wie in alten Zeiten. Zum Beispiel durch die Nutzung eines RSS-Readers, das Lesen von Primärquellen, den Boykott von Big-Tech-Plattformen oder die Anschaffung eines Smartphones mit GrapheneOS-Betriebssystem. Das macht sogar weniger Arbeit, wenn man sich erst einmal eingefuchst hat – und vor allem freier, gelassener und mental resilienter.
Grundsätzlich gilt: Wer nach Lösungen sucht, sollte bei sich selbst beginnen. Denn für die meisten Herausforderungen unserer Zeit existieren sie längst. Nur genutzt werden sie zu selten. Und das liegt nicht an den Lösungen, sondern den Konsumenten, die jeden Tag aufs Neue die Chance verstreichen lassen, es besser zu machen. Wann also wäre ein geeigneterer Zeitpunkt, um den ein oder anderen Neustart zu planen als jetzt, wo sich ein weiteres Jahr in seine letzten, kurzen Tage streckt?
So schwer, verstörend und düster viele davon gewesen sein mögen, so schön, bemerkenswert, erheiternd und licht war manch ein Moment der vergangenen zwölf Monate. Leider ist der menschliche Geist zwecks Risikominimierung evolutionär darauf ausgelegt, sich vor allem an Negatives zu erinnern. Und viel zu oft verdrängen diese unschönen, aber lehrreichen Erfahrungen die Wertschätzung für eine der simpelsten Wahrheiten des Lebens:
Das Schöne zieht seinen Reiz aus der Vergänglichkeit.
Gerade die Flüchtigkeit des Positiven macht es so wichtig, sich diese Erkenntnis zum Ablauf eines Kalenderjahres bewusst zu machen. Denn das wertvollste, was wir Menschen im Lauf eines Lebens sammeln können, sind erhebende Momente. Wie viele wir davon anhäufen bevor unsere eigene Zeit abgelaufen ist, hängt nicht primär von äußeren Umständen, sondern unserer inneren Einstellung ab. Eine den Wirren der Zeit angemessene Sichtweise verbirgt sich hinter einem kurzen, fast schon philosophischen Wortwechsel aus dem für den vorliegenden Text namensgebenden Hitchcock-Streifen:
»Wollen Sie behaupten, Sie hätten Interesse für die Kunst?«
»Ja – für die Kunst weiterzuleben.«
-
@ 8eabf864:d2ed9af6
2024-12-27 16:34:04Opinion about Tangem - Crypto wallet (android)
There is a successful build example, maybe can use as a reference. See https://github.com/nalarian1/tangem-app-android
WalletScrutiny #nostrOpinion
-
@ a42048d7:26886c32
2024-12-27 16:33:24DIY Multisig is complex and 100x more likely to fail than you think if you do it yourself: A few years ago as an experiment I put what was then $2,000 worth Bitcoin into a 2 of 3 DIY multisig with two close family members holding two keys on Tapsigners and myself holding the last key on a Coldcard. My thought was to try and preview how they might deal with self custodied multisig Bitcoin if I died prematurely. After over a year I revisited and asked them to try and do a transaction without me. Just send that single Utxo to a new address in the same wallet, no time limit. It could not possibly have failed harder and shook my belief in multisig. To summarize an extremely painful day, there was a literally 0% chance they would figure this out without help. If this had been for real all our BTC may have been lost forever. Maybe eventually a family friend could’ve helped, but I hadn’t thought of that and hadn’t recommended a trusted BTC knowledge/help source. I had preached self sovereignty and doing it alone and my family tried to respect that. I should’ve given them the contact info of local high integrity bitcoiners I trust implicitly. Regardless of setup type, I highly recommend having a trusted Bitcoiner and online resources your family knows they can turn to to trouble shoot. Bookmark the corresponding BTCSessions video to your BTC self custody setup. Multisig is complicated as hell and hard to understand. Complexity is the enemy when it comes to making sure your BTC isn’t lost and actually gets to your heirs. Many Bitcoiners use a similar setup to this one that failed so badly, and I’m telling you unless you’re married to or gave birth to a seriously hardcore maxi who is extremely tech savvy, the risk your Bitcoin is lost upon your death is unacceptably high. My family is extremely smart but when the pressure of now many thousands of dollars was on the line, the complexity of multisig torpedoed them. Don’t run to an ETF! There are answers: singlesig is awesome. From observing my family I’m confident they would’ve been okay in a singlesig setup. It was the process of signing on separate devices with separate signers, and moving a PSBT around that stymied them. If it had been singlesig they would’ve been okay as one signature on its own was accomplished. Do not besmirch singlesig, it’s incredibly powerful and incredibly resilient. Resilience and simplicity are vastly underrated! In my opinion multisig may increase your theoretical security against attacks that are far less likely to actually happen, e.g. an Oceans Eleven style hack/heist. More likely your heirs will be fighting panic, grief, and stress and forget something you taught them a few years back. If they face an attack it will most likely be social engineering/phishing. They are unlikely to face an elaborate heist that would make a fun movie. While I still maintain it was a mistake for Bitkey to not have a separate screen to verify addresses and other info, overall I believe it’s probably the best normie option for small BTC holdings(yes I do know Bitkey is actually multisig, but the UX is basically a single sig). This incident scared me into realizing the importance of simplicity. Complexity and confusion of heirs/family may be the most under-considered aspects of BTC security. If you’ve made a DIY multisig and your heirs can’t explain why they need all three public keys and what a descriptor is and where it’s backed up, you might as well just go have that boating accident now and get it over with.
Once you get past small amounts of BTC, any reputable hardware wallet in singlesig is amazing security I would encourage folks to consider. In a singlesig setup - For $5 wrench attack concerns, just don’t have your hardware signer or steel backup at your home. You can just have a hot wallet on your phone with a small amount for spending.
If you get a really big stack collaborative multisig is a potentially reasonable middle ground. Just be very thoughtful and brutally honest about your heirs and their BTC and general tech knowledge. Singlesig is still great and you don’t have to move past it, but I get that you also need to sleep at night. If you have truly life changing wealth and are just too uncomfortable with singlesig, maybe consider either 1) Anchorwatch to get the potential benefits of multisig security with the safety net of traditional insurance or 2) Liana wallet where you can use miniscript to effectively have a time locked singlesig spending path to a key held by a third party to help your family recover your funds if they can’t figure it out before that timelock hits, 3) Bitcoin Keeper with their automatic inheritance docs and mini script enabled inheritance key. The automatic inheritance docs are a best in class feature no one else has done yet. Unchained charges $200 for inheritance docs on top of your $250 annual subscription, which imho is beyond ridiculous. 4) Swan vault, I’ve generally soured on most traditional 2 of 3 collaborative multisig because I’ve always found holes either in security (Unchained signed a transaction in only a few hours and has no defined time delay, and still doesn’t support Segwit, seriously guys, wtf?), only support signers that are harder to use and thus tough for noobs, or the overall setups are just too complex. Swan Vault’s focus on keeping it as simple as possible really stands out against competitors that tack on unneeded confusion complexity.
TLDR: For small amounts of BTC use Bitkey. For medium to large amounts use singlesig with a reputable hardware wallet and steel backup. For life changing wealth where you just can no longer stomach sinsglesig maybe also consider Anchorwatch, Bitcoin Keeper, Sean Vault, or Liana. Don’t forget your steel backups! Be safe out there! Do your own research and don’t take my word for it. Just use this as inspiration to consider an alternative point of view. If you’re a family of software engineers, feel free to tell me to go fuck myself.
-
@ a17fb4ed:c53f7e91
2024-12-27 16:18:17Charcuterie Boards are perfect for parties and easy to create. With just a few basics you can bring great flavor to your next get together. I made this one for my work Christmas party a week ago and it was a hit. The following is the board I built.
Meats
- Italian Dry Salame: A classic charcuterie staple with rich, savory flavors
- Dry Hard Salami Con Vino: A wine-infused salami that adds a sophisticated touch to your board
Cheeses
- Extra Sharp Cheddar: Provides a bold, tangy flavor profile
- Dill Havarti: Offers a creamy texture with a hint of fresh dill
- Boursin Spreadable Garlic and Herb: A soft, flavorful spread perfect for easy enjoyment
- 60 Day Blue Cheese: Adds a strong, distinctive taste to complement the meats
Crackers
- Bruschettini Snack Size Italian Bruschetta Toast: Authentic Italian-style base
- Crunchmaster Original Multi-Seed: A crispy, nutritious option
- Brenton Original with Sea Salt: Classic cracker with a touch of saltiness
- Cabaret Crispy and Buttery: A rich, indulgent cracker choice
Delightful Add-Ons
- Chocolate Covered Cherries: A sweet contrast to savory meats and cheeses
- Local Hive Hot Honey: Adds a spicy-sweet element
- Pitted Olives: Brings a briny, Mediterranean touch
Platter and Serving Essentials
- Wooden Board: Provides a rustic, elegant presentation
- Spoon: Drizzle on the honey
- Spreading Utensils: For soft cheeses and spreads
- Toothpicks: Retrieving the olives
- Bowls: For randoms small items
- Cracker Container: Keeps crackers organized
Final Progression
Remember you can make these boards your own way. Hope you take some of the ideas and create something tasting.
Cheers, Yooper
foodstr #nostr #cheese #salami #charcuterie #crackers #honey
-
@ 6e4f2866:a76f7a29
2024-12-27 16:03:31Have you ever felt like you’re running as fast as you can in life, only to find yourself in the same spot? Trying to achieve goals, optimise yourself only to feel unfulfilled & lacking. That’s the hamster wheel—an exhausting, repetitive cycle that holds us captive in patterns we didn’t consciously choose. These aren’t just bad habits; they’re deep-rooted default programs born from early life experiences. Let’s explore what these hamster wheels are, how they shape us, and most importantly, how we can step off them for good.
What Are Hamster Wheels? \ \ The term #hamsterwheels ( hamstr) is a metaphor for the unconscious patterns that keep us stuck. I discovered these wheels through my own introspection & seeing these patterns in my clients. Imagine a wheel turning endlessly, powered by our own efforts but leading nowhere. These programs are often formed in childhood, when trauma, disconnection, or unmet needs force us to develop defense mechanisms to survive. They worked back then, but now they just keep us spinning.
\ The Mechanics of a Hamster Wheel \ \ Every hamster wheel has two opposing forces—gain and loss, right and wrong, attention and neglect, let down & support & unable & able. We strive to stay on the “good” side: gaining approval, being right, or receiving attention. But inevitably, the wheel flips, and we find ourselves losing, being wrong, or feeling ignored. It’s a cruel cycle of frustration that feels impossible to escape. You will be positioned on the left side or right side when you look at the wheel. One is yin dominant, non doing, unable, more of a victim. One is Yang, always doing, high achiever, seen as a winner. \ \ Left side is safe in the unableness so will self sacrifice when they are to feel able to& start to achieve. So as they climb up the wheel to the right, they will lose interest or confidence in what they are doing, either sliding back exhausted in their endeavour or flipping over into victimhood. They long to be confident & win at life but deep down feel they cannot. \ \ Right sided dwellers have to be right, are constantly striving & hate (kryptonite) feeling unable. When they feel unable they will become enraged. They are compelled to gain valuableness in their own eyes and those of others. They are usually very difficult to work with as working with a therapist makes them feel unable. They will eventually put so much energy running up the right side that they will be flung backwards into usableness often times falling into deep depression (unableness) or even attracting illness. They always attract unableness & the left sided experiences to balance themselves out. The wheel always balances itself out. This is the way of the hamster wheel.
\ \ Here’s the kicker: these wheels are powered by our deepest fears and insecurities. They keep us stuck not because we’re lazy or unmotivated, but because they’ve become our default way of operating, they are our automated defence systems.
\ Common Hamster Wheels \ \ There are five key hamster wheels that we all grapple with:
- Gain/Loss: The endless chase for more—more success, more love, more recognition—followed by the crushing fear of losing it all.
- Right/Wrong: The compulsion to always be right, which leads to the paralyzing fear of being wrong.
- Attention/Neglect: Oscillating between craving attention and fearing rejection or neglect.
- Able/Unable: Striving to prove we’re capable, only to feel crushed by moments of doubt or failure.
- Support/Let Down: Giving endlessly to others for validation, but feeling betrayed or let down when it’s not reciprocated. If you watch your thoughts closely you will see these programs or songs at the root of all your thoughts.
How Hamster Wheels Impact Your Life \ \ These patterns influence every aspect of our lives: our relationships, careers, and even our self-worth. They dictate how we act, how we think, and even how we feel. For example:
- The drive to gain approval often results in feeling unworthy.
- A relentless pursuit of success can spiral into burnout and self-criticism.
- Efforts to avoid neglect might lead to overcompensating and losing yourself in the process. And the hardest part? These wheels feel like home. They’re familiar, and stepping off them can feel terrifying. They quite literally create your reality.
\ Breaking the Cycle The good news? You can break free. It’s not easy, but it’s possible. Here’s how:
- Observe Without Judgment: Start by noticing your patterns. This is real #meditation What thoughts or actions are you repeating? Don’t judge yourself—just observe. Awareness is the first step to freedom.
- Understand the Roots: These wheels didn’t come from nowhere. They’re the result of unmet needs or childhood traumas. By understanding their origins, you can begin to dismantle their power.
- Reject External Solutions: No guru, book, or quick fix can save you. True freedom comes from within. The moment you stop looking for external validation, the wheel starts to lose its grip. You must take full responsibility for everything in your life. Only you can do this proof of work.
\ Final Thoughts Hamster wheels aren’t your fault, but they are your responsibility. They’ve been running your life long enough. Isn’t it time to take back control? Imagine stepping off the wheel, feeling the ground beneath your feet for the first time. That’s where real freedom begins. So, what hamster wheel are you on? Are you ready to step off and embrace a life of clarity, peace, and purpose? The journey starts here, with a single step: observation. Everything else flows from there.
-
@ 361d3e1e:50bc10a8
2024-12-27 14:50:43https://forex-strategy.com/2024/12/27/prices-wars-investments-a-guide-for-2025/ What to invest in and what to avoid as a bad investment? Prices, wars, investments - a guide for 2025. The end of Brussels-centered governance is in sight. What are our predictions for 2025?
europe #usa #year2025 #forecasts #politics #war #russia #israel #trump #dollar #bitcoin #gold
-
@ b2caa9b3:9eab0fb5
2024-12-27 14:33:28The past few weeks have been uneventful for me, spent mostly shuttling between the hospital and the hostel. Every other day, I made my way to the hospital for a foot dressing change — the only time I ventured outside. It was a routine walk, one that led me along a single road to the hospital and back. Despite the limited movement, I captured a few photos along the way, which I’d like to share with you today.
During this time, I kept myself busy at the hostel, sorting through old travel data. As I sifted through my memories and photos, it struck me: I’ve been living a nomadic life for nearly 8 years now. It all started back in 2016 when I was sitting in the small town of Korb in Germany, pondering what to do with my life. It was a tough time, and I don’t want to go into the details, but by the end of that year, I decided to take the plunge and start traveling. Initially, I planned to visit a friend in March 2017, but that fell through. I quickly reworked my plan and decided to visit my grandparents farm, or rather, where it once stood. The only hitch was that I had no money for the trip. So, I hitchhiked, took buses, and walked there, which ended up being a life-changing adventure. Later, a journalist mentioned this journey in an article on migration. And that’s how it all began — the start of my nomadic lifestyle.
Fast forward almost 8 years, and here I am, sitting at the foot of Mount Kilimanjaro with a healing foot that still needs some care. It’s almost better, though it remains sensitive due to the thin skin, and it needs to strengthen before it’s fully healed. I hope I’ve learned from this and that such an injury won’t happen again.
I’ve extended my stay in Moshi until December 30th, and I might stay until the start of the new year. As for where I’ll go next, I’m still unsure. I’ve thought about taking a bus east and then coming back by train, or perhaps heading west and making a loop south to east, ultimately returning to where I am now.
The image above is called a Christmas tree because it reveals its full beauty only during the Christmas season.
Last night, I thought about attending a BBQ festival, now that my foot is almost healed. But when I arrived, the police officer didn’t understand English and called a man for clarification. He told me I couldn’t enter Uhuru Park because there was a meeting happening. I didn’t want to argue with them, so I turned back. It was a small loss — the entrance fee was 10k TZS, which included two free beers, and the BBQ meat was 20k TZS. But instead, I wandered around the area, discovering beautiful cafes, bars, and artist shops. It was a peaceful stroll, and I plan to return during the day to explore more.
Currently, I’m sitting in the hostel bar, downloading some travel videos from my cloud. The internet here isn’t the most stable, so the process takes longer than I’d like. Once downloaded, I’ll upload them to another cloud service where I can access and work on them. This is the reality of my work as a traveler — sometimes progress feels slow, especially when the internet connection is unreliable. But as always, I remain hopeful that I’ll find a place with better connectivity soon.
The image above shows a banana transport. The area around Moshi is known for its extensive banana farming.
Lately, I’ve been trying to fix my fedora so I can edit videos offline, but I’ve run into some technical issues. The drivers for HD/4K and MP4 aren’t working as expected. If anyone knows what I need to install on my ThinkPad T470s to fix this, I’d appreciate the advice! I also considered learning LaTeX to write my blog posts and convert them into Markdown, but I’m still a novice when it comes to LaTeX. In the past, I used Kile, but I’ve since moved away from KDE, though I still use Digikam and Kdenlive for photo and video editing. Kdenlive, however, doesn’t seem to handle MP4 files properly, which is another challenge I’m trying to figure out.
On top of everything, I’ve been thinking a lot about ways to earn some extra money. The last few months have been financially challenging — I’ve had medical bills to cover, including paying for a child’s hospital expenses in Kenya. It has made me rethink how I manage my money. As a minimalist, I try to keep my costs low, but sometimes things come up that are beyond my control. I’m working on finding new ways to supplement my income, and hopefully, I’ll come up with some ideas soon.
In the meantime, I’ll leave you with a few photos from Moshi, a town at the base of Kilimanjaro. It has a pleasant climate and offers a relaxed vibe, even though there’s not much to do. I hope you enjoy these images, and I’ll share more updates soon as my journey continues.
Stay tuned for more adventures!
Image above: He thought he needed to show off his strength when he saw me and lifted the TukTuk.
The image above features a mosque with Mount Kilimanjaro in the background. I took this photo yesterday during my visit to Uhuru Park.
Support
Feel free to support me by sending some sats via the lightning network to rubenstorm@sats.mobi
-
@ acbcec47:dd305bec
2024-12-27 13:49:37Prepare starter
- 1 part starter (~30g)
- 2 parts wholemeal rye flour (~60g)
- 2 parts warm water (~60g)
Stir well, then leave to stand warm and covered until the volume has almost doubled.
Once the starter has doubled in volume and a light cap has formed, it can be used for the dough.
Ingredients
- Flour (2/3 550/1100 wheat flour, 1/3 997 rye flour) = 600g
- Water: 60% of the flour quantity = 360g warm water
- Starter: 20% of the flour quantity = 120g starter
- Salt: 3% of the flour = 18g
Put the rest of the starter (about 30g) back in the fridge for the next batch. Knead everything well for 5 minutes, then leave to stand warm and covered.
Fermenting
First fermenting phase in one piece until the volume has almost doubled.
Then divide into portions ...
Shape and leave to rise on the baking tray for 1-2 hours.
Baking
- Preheat oven to 230°C (450°F)
- Just before baking, cut in the top of the rolls with a razor blade, so that they can extend
- Bake for 20 min with steam/cover at 210°C (410°F)
- Then remove the steam/cover and bake another 15-20 min at 180°C (360°F)
Enjoy ...
-
@ 6bae33c8:607272e8
2024-12-27 13:46:54The NFL is becoming like the NBA — there are games almost every day, it seems, and not many of them are good. Don’t get me wrong, I like having games on in the background during holidays as much as the next guy, but there’s a big difference from being in the background and meriting your focused attention.
I caught a little of Chiefs-Steelers. It’s obvious there are only three, maybe four, teams that can possibly make the Super Bowl in the AFC. The Texans, Steelers, Broncos (and probably the Chargers) are drawing dead. I don’t just mean they’re underdogs, I mean there’s no point in even playing the games.
I caught more of Texans-Ravens, and it was even worse. The Texans offense has nothing, and their defense can’t stop real teams like the Ravens or Bills. C.J. Stroud was so promising as a rookie, but he’s in a dead-end environment right now with that offensive line and coaching.
Mercifully I caught none of the Seahawks 6-3 win over the Bears. I had the Bears +3.5 in my home picking pool, so that was good. Also, I should have used the Ravens in Circa (easiest money of all time), but I didn’t have time to get the Christmas Day games in before submitting.
-
Seems like players are dropping like flies now. I had to drop CeeDee Lamb for KaVontae Turpin in the Steak League, and half the league including Malik Nabers, Jalen Hurts, Tyreek Hill, Jaylen Waddle, A.J. Brown, Davante Adams, Tee Higgins, etc. are missing practices and/or questionable to play. Just a war of attrition at this point.
-
Maybe Mike Tomlin had to switch to Russell Wilson after Justin Fields’ substandard play, but it would have been better for the Steelers to have developed Fields and found out. Wilson gives them no upside whatsoever.
-
Isiah Pacheco is hurt again. It was only a matter of time before he fell apart, given his insanely hard running style. Marion The Barbarian 2.0.
-
Xavier Worthy has come on of late. I wanted Brian Thomas in my Dynasty League, but he went one pick before me, so I settled on Worthy who might yet be worthy.
-
Travis Kelce was wide open on at least four throws, like the Steelers didn’t bother covering him. Very odd.
-
The Chiefs have locked up the No. 1 seed at 15-1 after a Wednesday game. Which means they have 11 days off until a rest-your-starters game in Week 18, and two weeks off after that due to the bye. This team is like the 1972 Dolphins in that no one thinks it’s the greatest of all-time despite the record. If the Chiefs tried in Week 18, which they won’t, they could go 16-1 and become the only team besides the 2007 Patriots to win 16 regular season games.
-
The Ravens win and Steelers loss also is perfect for the Chiefs because now the Ravens will almost certainly play the Bills in the Divisional Round. The Chiefs get a bye, then an easy home game and only have to beat the winner of the Bills-Ravens war in Arrowhead to get to yet another Super Bowl.
-
Josh Allen makes heroic plays every game, but Lamar Jackson makes it look easy. I like the Ravens to make it to Arrowhead for the AFC Title game, even though the game will be in Buffalo.
-
Derrick Henry now has 1,783 yards with one game to go and is averaging 5.8 YPC on the year, a career high. No doubt Hall of Famer.
-
-
@ 16d11430:61640947
2024-12-27 13:01:07As digital systems and payment platforms scale to meet growing global demands, the underlying scalability issues pose severe challenges, especially for the IT workers tasked with managing and maintaining these systems. This exploration delves into the multifaceted dynamics of these challenges and their cascading human costs.
- The Escalating Demand for Scalability
Unprecedented Growth in Digital Transactions
Digital payment systems like Brazil’s Pix and RTPS have seen exponential growth. For instance, Pix is projected to surpass credit card usage in Brazil by 2025.
Global real-time payment volumes are expected to grow by 28% CAGR annually, pushing existing infrastructure to its limits.
Implications for IT Workers
IT teams face mounting pressure to prevent outages, maintain uptime, and scale systems rapidly to avoid bottlenecks.
This leads to longer hours, reduced work-life balance, and chronic stress.
- The Technical Debt Trap
Legacy Systems
Many payment systems still rely on legacy infrastructure that struggles to support modern demands.
Retrofitting these systems is costly and labor-intensive, falling disproportionately on IT workers.
Compounding Complexity
Every temporary fix adds technical debt, increasing the complexity of maintaining and scaling the system.
IT workers are caught in a cycle of “patch and pray,” with little time for proper upgrades or optimizations.
Human Cost
Constant firefighting leaves IT workers physically and emotionally drained, with increased risks of burnout and mental health issues.
- The Always-On Work Culture
24/7 System Uptime
Payment systems are expected to operate without interruption, requiring IT teams to be on-call around the clock.
The "always-on" expectation exacerbates sleep deprivation and disrupts circadian rhythms.
Impact on Productivity
Sleep-deprived workers make more errors, leading to cascading failures that further strain systems and create additional work.
Health Implications
Chronic sleep deprivation is linked to long-term health problems, including cardiovascular diseases, depression, and anxiety.
- The Leadership Vacuum
Poor Strategic Vision
Many organizations lack leaders capable of addressing scalability challenges proactively, leaving IT workers unsupported.
A 2023 Global Leadership Forecast revealed that only 40% of leaders believe their management skills are adequate, a steep decline from previous years.
Blame Culture
When systems fail, IT workers often bear the brunt of blame, even when failures are systemic rather than individual.
This creates a toxic work environment, further exacerbating stress and employee turnover.
- Economic Pressures and Workforce Exploitation
Understaffed Teams
Many organizations prioritize cost-cutting, leaving IT teams understaffed and overworked.
Outsourcing to cheaper labor markets often results in poorly trained staff, increasing workloads for experienced workers.
Automation Pressures
Companies increasingly rely on automation to scale systems, yet IT workers are tasked with maintaining these automated solutions, which often fail under unforeseen circumstances.
The human workforce becomes a safety net for automated processes, intensifying their workload during critical failures.
- Escalating Security Threats
Cyberattacks on Payment Systems
Scaling systems are prime targets for cybercriminals. For instance, DDoS attacks and ransomware are increasing in frequency.
IT workers must constantly defend against these threats while maintaining system performance.
Emotional and Professional Toll
The constant threat of breaches creates a high-pressure environment where mistakes can have catastrophic consequences, impacting workers’ confidence and job security.
- The Psychological Toll of Perpetual Scaling
Unrealistic Expectations
Management often sets unattainable goals for system scalability without understanding the technical or human constraints.
Workers are caught in a cycle of failure, feeling inadequate despite their best efforts.
Burnout and Attrition
A study by the American Psychological Association shows that chronic workplace stress increases employee turnover, with tech roles experiencing a 30% higher burnout rate compared to other industries.
This not only affects current workers but also leads to a talent drain, making scalability even harder to achieve.
- Generational Impact
Mentorship Deficit
Experienced IT workers leaving due to burnout create a vacuum, leaving younger generations without guidance.
The knowledge gap exacerbates system failures, perpetuating the scalability crisis.
Reduced Innovation
Overburdened workers have less time and energy for innovation, stalling technological progress and leaving future generations to deal with outdated, crumbling infrastructure.
Solutions to Mitigate the Human Cost
- Invest in Scalability-First Infrastructure
Organizations must prioritize scalable architectures, such as cloud-native solutions, to reduce the human workload.
- Support IT Workers
Provide mental health resources, fair compensation, and reasonable workloads to prevent burnout.
- Address Leadership Deficits
Train leaders to understand the technical and human aspects of scalability challenges.
- Automate Responsibly
Use automation to complement, not replace, human expertise, and invest in training workers to manage automated systems effectively.
- Build Resilience
Develop robust incident response protocols and cross-train teams to handle failures collaboratively.
Conclusion
The scalability crisis in digital systems is not just a technical challenge—it’s a human one. Without significant structural changes, IT workers will face an unbearable stranglehold, leading to widespread burnout, attrition, and long-term generational consequences. Addressing this crisis requires immediate action from organizations to prioritize both technological and human scalability, ensuring a sustainable future for workers and systems alike.
-
@ 16d11430:61640947
2024-12-27 12:29:24The technology sector is currently grappling with a pervasive yet often overlooked issue: dopamine dysregulation among its workforce. This neurochemical imbalance, exacerbated by the industry's high-paced environment and constant digital engagement, is leading to significant declines in employee well-being and productivity. Compounding this problem is a notable deterioration in leadership quality, which threatens to inflict lasting damage on both the current workforce and future generations.
Dopamine Dysregulation in Tech Workers
Dopamine, a neurotransmitter integral to reward processing and motivation, is susceptible to dysregulation through chronic stress and overstimulation—conditions prevalent in the tech industry. A recent study highlights that chronic stress can alter dopamine receptor density and sensitivity, making it increasingly challenging to achieve the same level of reward and exacerbating feelings of frustration and demotivation.
The tech industry's relentless pace, characterized by tight deadlines and continuous digital interaction, fosters an environment ripe for such dysregulation. The constant influx of notifications and the pressure to multitask can lead to a state of perpetual overstimulation, disrupting natural dopamine cycles and diminishing the brain's ability to derive pleasure from offline activities.
Lack of Institutional Insight
Despite the growing prevalence of dopamine-related burnout, there is a conspicuous absence of institutional acknowledgment and intervention. Many organizations remain oblivious to the neurochemical underpinnings of employee burnout, often attributing declines in productivity to personal shortcomings rather than systemic issues. This oversight results in inadequate support structures and a failure to implement necessary changes to mitigate stressors inherent in the tech work environment.
Decline in Leadership Quality
Exacerbating the situation is a marked decline in leadership quality within the tech sector. The 2023 Global Leadership Forecast reports that only 40% of leaders believe their companies have high-quality leadership—a 17% drop from two years prior and the most significant decline in a decade.
This leadership deficit manifests in several ways:
Inadequate Support for Employee Well-being: Leaders are failing to recognize and address the neurobiological aspects of employee burnout, resulting in insufficient mental health support and wellness initiatives.
Poor Change Management: The rapid evolution of technology necessitates agile leadership. However, many leaders lack the skills to manage change effectively, leading to organizational instability and increased employee stress.
Erosion of Trust: Inconsistent communication and a lack of transparency from leadership erode employee trust, further contributing to workplace stress and dissatisfaction.
Risks of Long-term Generational Effects
The convergence of dopamine dysregulation and declining leadership quality poses significant risks for long-term generational effects:
Sustained Mental Health Issues: Without intervention, current employees may suffer prolonged mental health challenges, including chronic burnout and depression, which can extend into future generations through learned behaviors and coping mechanisms.
Diminished Innovation: A workforce plagued by motivation deficits and led by ineffective leaders is less likely to produce innovative solutions, potentially stymieing technological progress for years to come.
Workforce Attrition: The tech industry may experience a talent drain as individuals seek healthier work environments, leading to a loss of experienced professionals and a gap in mentorship for emerging talent.
Conclusion
The silent pandemic of dopamine dysregulation among tech workers, compounded by a decline in leadership quality, demands immediate attention. Institutions must develop a deeper understanding of the neurobiological factors contributing to employee burnout and implement comprehensive strategies to address them. Simultaneously, a reinvigoration of leadership development programs is essential to equip leaders with the skills necessary to navigate the complexities of the modern tech landscape. Failure to act may result in enduring detriments to both the current workforce and future generations.
-
@ 8eabf864:d2ed9af6
2024-12-27 01:49:56Opinion about Tangem - Crypto wallet (iphone)
Thank you for your hard work. The iOS version seems to be compilable, although the official has not responded yet.
https://www.reddit.com/r/Tangem/s/le3YBkTwPm
WalletScrutiny #nostrOpinion
-
@ a012dc82:6458a70d
2024-12-27 01:29:36Table Of Content
-
TwelveFold: A Fusion of Art and Blockchain
-
The Cipher Puzzle Series: A Test of Wit
-
The Mechanics: How to Participate
-
Competition Rules and Details
-
Conclusions
-
FAQ
The Bored Ape Yacht Club, a name that resonates deeply within the NFT community, is expanding its horizons. Venturing beyond their typical domain, they have introduced a captivating puzzle-solving competition. This isn't just any competition; it's an opportunity for enthusiasts to engage, challenge their intellect, and stand a chance to win Bitcoin rewards, merging the worlds of crypto and gaming in an exciting new way.
TwelveFold: A Fusion of Art and Blockchain
Behind the Bored Ape Yacht Club is Yuga Labs, an innovative creator that never ceases to surprise. Their latest creation, the TwelveFold collection, is a series of 300 generative art pieces. But what sets TwelveFold apart is its foundation on the Ordinals protocol. This groundbreaking protocol allows for the "inscription" of NFT-like artwork directly onto the immutable Bitcoin blockchain. The TwelveFold collection isn't just about art; it's a representation of the intricate dance between time, mathematics, and variability, offering a fresh perspective on the convergence of art and technology.
The Cipher Puzzle Series: A Test of Wit
Inspired by the Bitcoin-centric artwork, Yuga Labs has unveiled a cipher puzzle series that beckons participants from all corners. These aren't your everyday puzzles; they are intricately designed challenges that reflect the core essence and philosophy behind the TwelveFold collection. Every puzzle solved brings participants closer to Bitcoin rewards, making the challenge not just a test of wit but also a potential gateway to crypto riches.
The Mechanics: How to Participate
For 12 consecutive weeks, Yuga Labs will roll out a new "Moon Puzzle". These puzzles, shrouded in mystery and allure, promise a reward of 0.12 Bitcoin for the first solver. But the climax arrives in the 13th week. Instead of another Moon Puzzle, participants are presented with the "Sun Puzzle". The stakes are higher, with the winner being bestowed with one of the coveted TwelveFold Ordinals. These unique art pieces, which are making waves in the Magic Eden secondary marketplace, have a starting price tag of approximately 0.9 BTC.
Participation is open to all, irrespective of whether you own a TwelveFold asset. However, a subtle hint from Yuga Labs suggests that asset owners might be in for an exclusive treat.
To dive into this challenge, one needs an Ordinals Bitcoin wallet, options include Xverse or Unisat. The process is straightforward: visit the TwelveFold website, pick a puzzle, and let your mind wander into the realms of creativity and logic. Once you believe you've cracked the code, the answer is inscribed on-chain using satoshis, etching its presence forever on the Bitcoin blockchain.
Competition Rules and Details
Every puzzle has room for just one victor. In scenarios where multiple participants arrive at the correct solution simultaneously, the tie-breaker is the inscription number, with preference given to the lower number. Winning isn't just about solving the puzzle; winners must also navigate the formalities, which include filling out requisite tax forms to lay claim to their Bitcoin bounty.
Conclusion
Yuga Labs' TwelveFold challenge is more than just a competition; it's a celebration of art, blockchain, and the spirit of competition. As the crypto community watches with bated breath, participants from across the globe are delving deep into the puzzles, each hoping to emerge as the next Bitcoin victor. With the inaugural puzzle already deciphered, the gauntlet has been thrown. The question remains: are you ready to take on the TwelveFold challenge?
FAQ
What is the TwelveFold Challenge? It's a puzzle-solving competition by Yuga Labs, offering participants a chance to win Bitcoin rewards.
How long does the challenge last? The challenge spans 13 weeks, with a new puzzle released each week.
What are the rewards for solving the puzzles? For the first 12 weeks, winners receive 0.12 Bitcoin. In the 13th week, the prize is one of the TwelveFold Ordinals.
Do I need to own a TwelveFold asset to participate? No, the challenge is open to everyone. However, TwelveFold asset owners might receive special perks.
How do I submit my puzzle answers? Answers are inscribed on-chain via satoshis using an Ordinals Bitcoin wallet.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 16d11430:61640947
2024-12-27 01:18:29While Europeans were sealing agreements and greetings with handshakes, civilizations in the Indian subcontinent and Asia were elevating hand gestures to an intricate art form and spiritual practice. Hand mudras, meaning "seals" or "gestures" in Sanskrit, have long been a profound expression of the connection between the body, mind, and spirit. From the precision of classical Indian dance to the meditative stillness of yogic practices, mudras symbolize the articulation of human dexterity and the channeling of energy through the hands.
The Origins of Mudras: A Historical Perspective
Mudras trace their origins to the ancient spiritual practices of the Indian subcontinent, dating back to the Vedic period (1500–500 BCE). Initially described in the sacred texts of the Vedas and later elaborated in Tantric and Buddhist traditions, mudras became integral to rituals, meditation, and artistic expression.
- Vedic Rituals and Spiritual Energy
In Vedic rituals, priests used specific hand gestures to invoke divine forces, seal intentions, and direct spiritual energy. These gestures were seen as a bridge between the human and the divine, a symbolic language that conveyed unspoken truths. (The Vedas: An Anthology by Wendy Doniger)
- Buddhist Influence Across Asia
As Buddhism spread from India to regions like Tibet, China, Japan, and Southeast Asia, mudras became central to meditation and iconography. The Dhyana Mudra (gesture of meditation) and the Vitarka Mudra (gesture of teaching) are prominently depicted in statues of the Buddha, symbolizing states of inner peace and wisdom. (Mudras in Buddhist Art by Frederick Asher)
Mudras in Classical Dance: The Pinnacle of Dexterity
The Indian classical dance forms—Bharatanatyam, Kathak, Odissi, and others—perfected the articulation of the hands through hasta mudras (hand gestures). These gestures, cataloged in texts like the Natya Shastra (200 BCE–200 CE), serve as a sophisticated language to narrate stories, express emotions, and symbolize universal truths. (The Natya Shastra: A Treatise on Dance and Drama by Manomohan Ghosh)
- Complexity and Precision
Each dance form requires the performer to master dozens of mudras, which involve precise positioning of the fingers and palms. For example:
The Pataka Mudra (flat hand) symbolizes a flag, and its variations convey wind, rivers, or blessings.
The Hamsasya Mudra (swan’s beak) represents delicacy, often used to signify picking a flower or holding a jewel.
- Embodiment of Dexterity
These gestures demand exceptional finger dexterity and neuromuscular control, training the brain to enhance focus, coordination, and memory. The dancer's hands become extensions of their soul, weaving stories that transcend spoken language. (Dance in India: The Art of Precision and Emotion by Kapila Vatsyayan)
Mudras in Yoga and Meditation: A Gateway to Inner Activation
Beyond dance, mudras are integral to yoga and meditation, believed to direct prana (life energy) within the body. By forming specific gestures with the hands, practitioners stimulate energy pathways, harmonize the mind, and deepen meditation.
- Therapeutic Benefits
The Gyan Mudra (gesture of knowledge), with the thumb and index finger touching, is said to enhance concentration and calm the mind. (The Yoga Sutras of Patanjali by Swami Satchidananda)
The Prana Mudra (gesture of life) energizes the body by activating dormant energy reserves.
- Holistic Activation
Mudras work on the principles of Ayurveda, the ancient Indian science of health, balancing the five elements within the body—earth, water, fire, air, and ether. The hands become a microcosm of the body, with each finger representing a specific element. (Ayurveda: The Science of Self-Healing by Vasant Lad)
Beyond India: Hand Forms in Asian Arts
The influence of Indian mudras extended to Asian art forms, including Japanese mudrā in martial arts and Chinese qigong practices. In Southeast Asia, classical dance forms like Balinese and Khmer dance incorporate mudras as an essential element, showcasing the dexterity of the human hand in storytelling and spiritual expression.
- Tibetan and Japanese Rituals
In Tibetan Buddhism, vajra mudras are used in esoteric rituals to symbolize cosmic forces. Similarly, in Japanese shingon practices, mudras accompany mantras to invoke specific deities. (Tibetan Ritual Practices by John Powers)
- Visual Perfection
Southeast Asian sculptures, such as those in Angkor Wat, depict deities with elaborate hand gestures, representing divine attributes and cosmic harmony. (Art and Architecture of Southeast Asia by Peter D. Sharrock)
The Profound Significance of Mudras
Mudras are far more than physical gestures; they are a language of the body that communicates with the universe. They unite art, spirituality, and science, demonstrating how hand dexterity can be a profound expression of human potential.
In the modern era, mudras remain relevant as tools for holistic health and mindfulness. Their ancient legacy reminds us of the extraordinary capabilities of the human hand—not just as a tool for grasping but as a bridge between the physical and the metaphysical.
Key Takeaway: While the handshake reflects strength and intent in the West, the mudra exemplifies the ultimate articulation of human dexterity and spirituality in the East. Through dance, yoga, and meditation, these gestures symbolize the profound connection between the body, mind, and cosmos, showcasing the timeless beauty of the human hand.
References:
-
Doniger, Wendy. The Vedas: An Anthology.
-
Asher, Frederick. Mudras in Buddhist Art.
-
Ghosh, Manomohan. The Natya Shastra: A Treatise on Dance and Drama.
-
Vatsyayan, Kapila. Dance in India: The Art of Precision and Emotion.
-
Satchidananda, Swami. The Yoga Sutras of Patanjali.
-
Lad, Vasant. Ayurveda: The Science of Self-Healing.
-
Powers, John. Tibetan Ritual Practices.
-
Sharrock, Peter D. Art and Architecture of Southeast Asia.
-
@ 16d11430:61640947
2024-12-27 00:57:30Grip strength and finger dexterity are uniquely tied to human neuromuscular wellbeing. These attributes go beyond their apparent utility, delving into evolutionary, physiological, and cultural dimensions. They not only signify physical health but also embody symbolic gestures like handshaking, reflecting capacity, intent, and mutual understanding in human interactions.
Neuromuscular Wellbeing: The Foundation of Grip Strength and Dexterity
- Grip Strength: A Biomarker of Overall Health
Grip strength serves as a reliable biomarker for neuromuscular health. Studies have demonstrated its predictive value for outcomes like cardiovascular health, cognitive function, and longevity. Grip strength reflects the integrated function of muscles, nerves, and connective tissues, making it an ideal measure of overall physical resilience.
Physiological Insights: Strong grip strength is associated with robust neuromuscular function. This involves the coordination of motor neurons and muscle fibers, indicating an individual's capacity to perform complex tasks. Grip strength also correlates with brain health, as neural efficiency influences fine motor skills and physical force generation.
Preventative Indicator: Declines in grip strength can signal neuromuscular or systemic health issues, such as neurodegenerative diseases, making it a critical diagnostic tool.
- Finger Dexterity: Precision in Action
Finger dexterity, encompassing coordination, fine motor skills, and adaptability, highlights the intricate control of hand muscles. This ability is crucial for various tasks, from typing to playing musical instruments, underscoring its link to neuromuscular health.
Cognitive Connection: Dexterity tasks stimulate brain regions responsible for planning and executing movement. Regular practice can enhance neuroplasticity, improving both motor and cognitive functions.
Rehabilitation Applications: Finger dexterity exercises are integral in neuro-rehabilitation, aiding recovery from strokes, injuries, or neurological disorders.
The Cultural Legacy of Handshaking: A Symbol of Grip Strength and Intent
Handshaking, though becoming an archaic relic in some cultures, remains a fascinating lens through which grip strength’s symbolic significance can be viewed.
- Historical and Cultural Roots
The handshake, dating back to ancient times, originally served as a gesture of trust. A firm handshake was a non-verbal way of communicating strength, intent, and mutual respect. Anthropological evidence links it to the need for physical signals of peace and camaraderie in negotiations or greetings.
- Strength and Intent in the Handshake
Grip Strength as a Measure: A firm handshake historically conveyed physical capability and confidence. Weak handshakes often carried connotations of poor health or dishonesty, though these interpretations are culturally relative.
Intent and Transparency: The act involved direct physical contact, symbolizing openness and the absence of concealed weapons, reinforcing its role as a non-verbal declaration of peace and trust.
Archaic but Relevant: Why Grip Still Matters
In an era where handshaking is less common, the underlying principles of grip strength and neuromuscular health remain profoundly relevant. Even as the handshake fades, its symbolic role persists in different forms, like the pressure and control exhibited in sports or tactile professions.
Bridging Neuromuscular Wellbeing and Cultural Practices
By understanding the deep connection between physical grip and broader health, we gain insights into human evolution and societal interactions. Grip strength and finger dexterity are far more than isolated physical traits; they are essential indicators of our holistic health and functional capacity.
Handshakes may be vanishing, but their essence—a quick, tangible measure of strength, confidence, and intent—remains a testament to the interconnectedness of our physical and social existence.
References:
-
Dodds, R., et al. (2014). Grip strength across the life course: normative data from twelve British studies. PLoS ONE.
-
Bohannon, R. W. (2019). Grip strength: an indispensable biomarker for older adults. Clinical Interventions in Aging.
-
Stewart, L. (2020). The history and significance of handshaking. Cultural Anthropology Journal.
-
Bechtold, M., et al. (2016). Finger dexterity as an indicator of cognitive function. Journal of Neurology and Rehabilitation.
-
@ 5ee71c0a:b0506ae6
2024-12-27 00:56:58Hey, anyone who reads this—thanks for keeping me (somewhat) accountable.
I’m not big on formal New Year’s resolutions, but I do like to review the past year to see where I’ve done well, where I’m lacking, and what new habits I can form in 2025.
Wait, isn’t that a resolution? Anyway.
One thing that’s always been important to me is freedom of speech. I plan to keep using X/Twitter—yes, it has shortcomings, but so does every platform. None will ever be perfect for everyone.
That said, I believe strongly in decentralization. I’ve been exploring Nostr for the past two years. Now, I want to use it more often, learn its possibilities, and contribute where I can. I’ve also posted this on Habla.news, a Nostr community for long-form content, to encourage myself (and anyone else) to try new platforms and keep an open mind.
There’s a lot happening with Nostr, Lightning, and other Bitcoin-related projects. It reminds me of the early internet—everyone was contributing, and we had no idea what would stick. I miss those days, and it’s exciting to see a new community forming.
Speaking of the early internet, I think it’s time I set up a blog or personal site. It’s been ages! Neocities feels retro and has a growing community, so I might start there.
Work will be busy in 2025—2024 was already intense, and the bar is always rising. So I’m not going to overload myself with extra goals. Still, many of my work goals, like earning new certifications, blend into my personal ambitions.
In 2024, I did well with my health goals. In 2025, I want to build on that, but in small steps. For Q1, I’ll re-establish my Peloton routine; in Q2-Q3, I’ll get back into heavier weight training. I miss lifting and want to push myself again.
I also miss reading—especially sci-fi. It’s high time I make space for that.
So, this is my short list of goals. I’m sure I’ll refine it as the year unfolds. Thanks for reading, and if you want to connect with me on Nostr, here’s my info: nostr:npub1tmn3czhv2wzxvt4mpanttd8parnxgq528c0hzfehfm4rlvzsdtnqghwkhd
-
@ 56494b83:aa95511b
2024-12-27 00:12:56The Goal of Christmas
But when the fullness of time had come, God sent forth his Son, born of woman, born under the law, to redeem those who were under the law, so that we might receive adoption as sons. And because you are sons, God has sent the Spirit of his Son into our hearts, crying, “Abba! Father!” (Galatians 4:4–6)
There are 4 phrases that I want to address from this passage Fullness of time Born of a woman Redeem those under the law Receive adoption as sons.
One of the attributes of God is what theologians call his “eternity” This means God is without beginning or end. He is free from all succession of time. He is outside of time. In fact he is the cause of time. from everlasting to everlasting you are God. (Psalm 90:2) And upon hearing this some Christians might make the mistake of thinking that God is not concerned with time. “Well since God is not bound by time like we are, he must be detached from it, or maybe disinterested”
But the opposite is actually true. The God of the Bible is extremely concerned with keeping time.
In Genesis 1: God defines what a constitutes a day. There was evening and there was morning, the first day. He decides how many days it will take him to create the world.
He uses the sun and the moon and the stars as “time-keepers”And As we keep reading Genesis we come to long lists of names: specifically the descendants of Seth, and God tells us how many years they live.
All other events in the world are dated in relation to Seth.
But we can keep going: God teaches Israel to keep time. He gives them a calendar when they come out of Egypt. Referencing passover God says in exodus 12 “This month (march/April) shall be for you the beginning of months. It shall be the first month of the year for you." (Exodus 12:2)
Pentecost comes in the third month. (Celebrating the giving of the law)
The 7th month was for celebrating the feast of booths, (when the people lived tents in the wilderness.)
On and on we could go, but the point I am trying to make is this: timing is everything.
You know that famous passage in Ecclesiastes 3 For everything there is a season, and a time for every matter under heaven: (Ecclesiastes 3:1) Our lives are patterned after different times.
Weeping and laughing Breaking down and building up. A time to speak and a time to keep silence.
And then after this run—on list Solomon says:
[God] has made everything beautiful in its time.(Ecclesiastes 3:11)
God governs time. He orchestrates the times. He has in his mind a divine time-table in which he has written all events and circumstances into his perfect story.
Down to the second.
And the great demonstration of this is the incarnation.
In the fullness of time, God sent forth his son. The Son of God entered into time to show us the father. And he did this without ceasing to be the LORD of time himself.
Theologian Peter Leithart writes: “God came to us in time, not to rescue us from time, but to redeem all times. God the Son entered time so that whatever time it is - a time to live, a time to die; a time to seek, a time to give up; a time to weep or a time to rejoice - each and every time is a time of encounter with God in Christ through the Spirit.”
You and I can talk with God, meet with him, commune with the father and with the son and with the Holy Spirit at any any time, because God has entered into our time in the person of his son.
Many have asked: why was Christ born 2000 years ago?
Scholars point to the common greek langauge shared by much of the world (making evangelization easier)
Some point to the centuries-long era known as the Pax Romana; (roman peace= where THE WORLD was by and large at free from major wars.
Others have observed that the mythological god’s of Greece and Rome had been tried and found wanting:
In other words, men and women everywhere were primed to hear and accept the one true religion. Historically, this is all true.
But if we think about this biblically, we see that the arrival of the Messiah was perfectly—timed. The law of Moses, ESTABLISHED 2000 YEARS PRIOR, had made it clear: human beings need a savior.! All of us are law breakers!
It had been hundreds of years since a true prophet had spoken.
All of Israel’s history was pointing forward to the promised “serpent—crusher” from genesis 3.
The people had been waiting CENTURIES for the SON who was promised. the anticipation kept building! Why?
Because, as theologian GK Beale writes: “no prior son had ever been able to put an end to the law’s condemning control!”
Nobody had shown up and proven themselves to be the SaVIOR.
And the entire OLD testament seems to have been written so that we would anticipate the Son of GoD.
Every lamb slaughtered pointed us to the TRUE LAMB.
Every bowl full of incense burned pointed to the fragrant offering of Christ.
Every King installed in Israel pointed to the one true King whose kingdom would have no end.
Every priest ordained pointed to the great high Priest, who would not offer up the blood of bulls and goats, but his very own blood.
God is the creator of TIME, and at Christmas we are invited to celebrate when he entered time.
And this leads us to the second phrase: “born of a woman”
Almost a 1000 years ago, a theologian by the name of Anselm wrote a book called “why God became a man”
He begins his book with a discussion of sin, which he defines as “not rendering to God what is his due” (namely the submission of our entire will to his)
When we do not submit to him, we are stealing from him, robbing his glory; we are dishonoring him. And God, who is perfectly JUST, cannot over look this.
Here then is the problem: if we are to be forgiven, we must repay what we owe, but we are incapable of doing this. “The price tag exceeds the capability of the fallen sons of Adam to pay.”
Anselm says: our present obedience and good works cannot make satisfaction for our sins, since these are required of us anyway.
“The sinner owes what he cannot repay, and unless he repays it he cannot be saved.” We cannot save ourselves.
And here is where Anselm begins to point out the solution to our dilemma.
“There is no one who can make this satisfaction [for sin] except God himself… But no one ought to make it except man; otherwise man does not make satisfaction… Therefore, it is necessary that one who is God—man should make it. It is needful that the very same person who is to make this satisfaction be perfect God and perfect man, since no one can do it, except one who is truly God, and no one ought to do it, except one who is truly man.”
John Stott summarizes this teaching well: “Jesus Christ is therefore the Only Savior, since he is the only person in whom the “should” and the “could” are united, being himself both God and man.”
I realize this is pretty ‘high’ theology…but it is my opinion that Christmas EVE is the perfect time to hear these precious doctrines once again.
The wages of sin is death. We know that. And if you and I were EVER going to be saved, it would be because God himself came to save us. But God cannot die. So the eternal son of God had to be made like us. He had to put on our human nature.
Christmas reminds us that Redemption required incarnation.
This leads us to the third phrase: Christ was born to Redeem those under the law.
God gave his people the law…and we were unable to keep it, unable to obey it. Earlier in his Galatians Paul said
For all who rely on works of the law are under a curse; for it is written, “Cursed be everyone who does not abide by all things written in the Book of the Law, and do them.” (Galatians 3:10)
And then a few verses later he says that the God-man secured our redemption by becoming a curse for us. Cursed is everyone hanged on a tree. Bible readers know this: there are many examples.
Pharaoh’s baker was hung on a tree. (Gen. 40) The 5 kings of Canaan were hung on trees (josh. 10) David’s Rebel son Absalom died while hanging on a tree. The wicked Haman (from the story of Esther) was hung on a tree intended for another.
Christmas reminds us that the holy son of God, the only perfect man who ever lived, would grow up and receive the culminating shame of all those in the Scripture who were cursed by God.
The child in the manger would grow up to be cursed. The child the shepherds came to see, would, 33 years later, be forsaken by his Father.
Christ endured the curse of the law so that a mysterious, divine exchange might take place. He takes our curse that we might receive his blessing.
As one another puts it: “he became sin with our sin, so that we may become righteous with his righteousness.” (Stott)
This kind of talk can be a bit confusing for us. Its mystical not physical. It’s spiritual, not material. The exchange that has taken place in the soul of the believer is not something that we can see.
I came across an analogy from John Calvin that I had never before considered…you remember the story from genesis 27, when Isaac (who is very old and blind) blesses his younger son Jacob INSTEAD of Esau. ?
Rebekah knows that her husband wants to bless his firstborn son…and so when Esau leaves to go hunting, she makes a plan to cook up Isaac’s favorite dinner, and she convinces Jacob to bring his father the food and ‘steal the blessing’
And of course Jacob objects: “uh, Mother, this plan of yours won’t work….I am a smooth man. . . and my brother Esau is hairy!”
But Rebekah persuades him to put on Esau’s clothing. . .goat skins on his hands and on his neck.
Now: don’t ask me how this worked, because I don’t really know. . . but it works. And as I am fond of saying: every page of scripture points us to Christ, if we have eyes to see….and when we don’t have eyes to see, we can be assisted with saints who saw more than us:
John Calvin: “as Jacob did not of himself deserve the right of the first—born, concealed in his brothers clothing, and wearing his brothers coat, which gave out an agreeable odor, he ingratiated himself with his father, so that to his own benefit, he receive the blessing while impersonating another. And we, in like manner hide under the precious purity of our firstborn brother, Christ, so that we may be attested righteous in God sight… And this is, indeed, the truth, for in order that we may appear before God's face unto salvation we must smell sweetly with his odor, and our vices must be covered and buried by his perfection.”
The younger brother gets the blessing he doesn’t deserve because he’s wearing his brother’s clothes!
Here then is the gospel on Christmas Eve.
Christ Jesus the Lord voluntarily puts on your stinky garments, and by faith you get to put on his royal white linen!
Disobedient rebels can be clothed with the righteousness of the son.
Praise God.
And now we come to the purpose of Christmas.
when the fullness of time had come, God sent forth his Son. . . so that we might receive adoption. . . (Galatians 4:4–5)
The goal of Christmas is adoption. At just the right time, God sent his son because he wanted a bigger family.
J.I. Packer wrote many years ago: “The revelation to the believer that God is his Father is in a sense the climax of the Bible.”
There can be no greater gift, no higher privilege than receiving a place in God’s own family. I can approach God without fear, because he is Father.
the fatherhood of God implies affection. He loves me like a perfect father loves his children.
I have his name placed upon me. I have his Spirit given to me. I have his inheritance waiting for me.
But Paul adds the phrase “as sons” in the text.
The goal of Christmas is to receive adoption “as sons”
Why doesn’t Paul say “receive adoption as sons & daughters!?” It’s not a mistake to leave out daughters. He doubles down in the next verse.
And because you are sons, God has sent the Spirit of his Son into our hearts, crying, “Abba! Father!” (Galatians 4:6)
Theologian Michael Reeves provides us with the glorious answer: (why daughters is not included)
“Paul is seeking to be as clear as he can that the status all believers are given is, quite specifically, the status of the son, himself. For God does not give us some exulted, but general standing before himself: the son shares with us, his own Sonship… Paul wants you and me to see that believers get to share the very cry of the son himself. In the garden of Gethsemane, talking in private to his father, Jesus had called him, “Abba, Father.”
Arguing that the Spirit of the Son makes us call out the very same words, Paul is demonstrating as intimately and visually as he can that in Christ, we get to share the very relationship with the father that the son himself has always enjoyed.
The personal name he has for his father we are allowed to share. We can come before the Almighty and say—or stutter!— with a beloved son’s own confidence, “Abba!” . . . The son of God became human that we humans might become sons of God.”
At the exact right time, time god sent his son, born of a woman…to redeem us and adopt us and give us his spirit and make us sons of God.
“The glory that you have given me I have given to them, that they may be one even as we are one, I in them and you in me, that they may become perfectly one, so that the world may know that you sent me and loved them even as you loved me. . . you loved me before the foundation of the world. . . . I made known to them your name, and I will continue to make it known, that the love with which you have loved me may be in them.” (John 17:22–26)
Redemption required the incarnation. The point of the incarnation was adoption. And adoption means God loves just like he loves his Eternal son. He has always has, and he always will.
This Christmas, rejoice in the truth that because the Son of God became a man…you and I are beloved sons of God.
-
@ 36bedab2:524acad4
2024-12-26 23:23:37404 Page Not Found
-
@ 36bedab2:524acad4
2024-12-26 23:20:21404 Page Not Found Error
-
@ 16d11430:61640947
2024-12-26 22:35:15For Yadov Towri, dismantling the trap was only the beginning. As the city descended into chaos, its architects fled or were consumed by the very system they had built. Yadov had believed his work was done. But as the trap fell, something unexpected happened: the void it left behind began to call to him.
The city, even in its freedom, was a machine that demanded order. The billions of lives crammed into its sprawl couldn’t function without a structure to guide them. And as Yadov walked among them, their anguish and confusion pressed against his mind like a tide. His empathy, once his greatest strength, now became a curse, inundating him with the pain of millions.
The Lure of Power
At first, Yadov resisted. He sought to lead, to build a better system free of the corruption that had enslaved the city. But the burden of guiding so many was immense. His heightened sensitivity began to fracture under the weight of collective misery. Every cry, every unspoken plea for help, resonated in his mind until it became unbearable.
In a moment of desperation, he reached inward, tapping into the reservoir of psychic energy he had absorbed over years of navigating the trap. He found a way to silence the noise—not by healing, but by feeding. By taking their despair into himself, he dulled the ache of his empathy. It started as a survival mechanism, but it didn’t end there.
The Transformation
As Yadov siphoned the city’s anguish, he discovered something unexpected: power. The despair he absorbed didn’t just quiet his mind—it strengthened him. His senses became sharper, his endurance limitless. He could move through the city like a shadow, bending its will to his own. The empathy that had once driven him to liberate became the tool through which he dominated.
Yadov justified his actions at first. He told himself that by taking on the city’s pain, he was sparing its people from suffering. But the power was intoxicating. He began to manipulate the city’s new leaders, bending them to his will. The systems he had torn down were rebuilt—not to enslave, but to channel misery directly to him.
The New Trap
Under Yadov’s quiet rule, the city transformed. The chaotic freedom he had unleashed was replaced by a new kind of control. The population, unaware of his influence, found themselves drawn into an invisible web of dependence. The struggles of daily life were not as overtly brutal as before, but they were carefully calibrated to create just enough tension, frustration, and despair to feed Yadov’s growing hunger.
Public transport became slightly less crowded but always late. Workspaces allowed more personal freedom but with unspoken expectations that fostered guilt and self-doubt. The city’s poverty wasn’t eradicated, only redistributed in subtler ways. Everything was designed to extract psychic energy while maintaining the illusion of progress.
The Rise of a Psychic Vampire
Yadov’s power grew beyond the city. As his influence spread, he began to attract others like him—people who had discovered the power of psychic feeding but lacked his control. He took them under his wing, creating a network of psychic vampires who ruled from the shadows. Together, they refined the art of siphoning despair, turning it into an efficient, self-sustaining system.
The billions who lived in the city became the lifeblood of this new empire. Their misery was harvested in ways they barely understood: through bureaucratic frustrations, subtle social manipulations, and carefully orchestrated crises. The system no longer needed visible overlords. Its oppression was quiet, seamless, and absolute.
The Price of Power
Yadov, once the liberator, was now the kingpin of a new trap, far more insidious than the one he had destroyed. He told himself he was different—that his rule was necessary, that the energy he took was nothing compared to the peace he provided. But deep down, he knew the truth. The city’s pain was his lifeline, and without it, he would crumble.
The people, for their part, sensed the change but couldn’t articulate it. They felt the weight of an unseen force, the faint pull of despair that never quite left them. They whispered of ghosts in the city, of an invisible hand that guided their lives. They called it the Shadow King.
The Resistance
But even in the darkest systems, resistance is inevitable. Among the billions, a few began to notice the patterns, to piece together the truth. They saw how every improvement was a trap, every freedom a leash. And in the quiet corners of the city, they began to organize.
Yadov felt them—tiny sparks of defiance flickering at the edges of his perception. At first, he dismissed them. But as the resistance grew, so did their power. Unlike the masses, these rebels didn’t radiate despair. They carried something else: hope. And hope, Yadov realized, was poison to his kind.
A Reckoning
The resistance’s leader, a young woman named Senka, possessed a mind unlike any Yadov had encountered. Her hope wasn’t blind or naïve—it was calculated, weaponized. She and her followers began to unravel the psychic network Yadov had built, using the very tools he had once wielded against the original trap.
As their influence spread, Yadov found his grip on the city weakening. The despair he had fed on for so long began to wane, replaced by a growing wave of defiance. He could feel the system he had built collapsing, just as he had once destroyed the one before it.
The Final Question
Yadov faced a choice: to crush the resistance and tighten his grip on the city, or to let it fall and risk becoming the very thing he had once despised. The power he had gained whispered seductively, promising him dominion if only he would embrace it fully. But his healer’s heart, buried deep beneath layers of corruption, still flickered faintly.
As the city teetered on the brink of another transformation, Yadov stood at the crossroads of his own humanity. Would he embrace the monstrous king he had become, or would he finally, truly, set the city free?
-
@ 16d11430:61640947
2024-12-26 22:25:39The metropolis was a living maze, a chaotic symphony of ambition, desperation, and survival. It wasn’t merely a city—it was a crucible, an intricate system designed to test and grind the human spirit. For some, it was a beacon of opportunity; for others, a labyrinth of pain and struggle.
Yadov Towri, born of a lineage of healers, was an anomaly within his heritage. Where his ancestors had mended and soothed, he endured and resisted. His unique blend of empathy, physical agility, and endurance made him an outlier—someone who didn’t just survive the trap but thrived within its crushing gears.
The Morning Assault
The mornings were never kind. A cacophony of relentless noise shattered any semblance of peace—alarms, shouts, machinery, and the ever-present drone of humanity. Cramped living spaces overflowed with activity, leaving no room for solitude. People jostled for basic necessities, their fatigue palpable.
For Yadov, this was the air he had always breathed. Where others staggered through the oppressive start of the day, he moved with practiced ease, absorbing the chaos without letting it claim him. His finely tuned empathy allowed him to predict and evade the surges of bodies and conflict, navigating the melee like a shadow.
The Daily Gauntlet
The streets were a relentless obstacle course. Public transport bulged with humanity, its overcrowded platforms and vehicles turning every journey into a battle for space. Sidewalks teemed with hawkers, pedestrians, and stray animals. The air carried the acrid smell of exhaust, mingling with the hum of endless activity.
For the unprepared, it was overwhelming. For Yadov, it was a game. His agility let him weave through the crowd, while his empathy read the ebb and flow of tension and frustration. Each step was calculated, each movement purposeful. The chaos became his ally, obscuring him from prying eyes.
Poverty and Crime’s Shadows
The city was a landscape of extremes, where towering structures loomed over crumbling tenements. The specter of crime lingered everywhere—pickpockets in crowded markets, petty gangs in shadowed alleys, and the pervasive fear of exploitation. Poverty wasn’t just economic; it was a state of existence, etched into the faces of its victims.
Yadov, attuned to the pain of others, couldn’t ignore the weight of it. He saw families torn apart by desperation, children hardened by survival, and the hollowed eyes of those crushed by unrelenting struggle. Yet he carried this knowledge like a blade, honed to cut through the trap’s layers.
The Psychological Traps
The workplace was no sanctuary. Overcrowded offices and factories became arenas of psychological warfare. Collective rituals of conformity, hazing from superiors, and constant surveillance stripped individuals of identity. The relentless hum of machinery and human voices blurred the lines between person and cog.
For Yadov, the psychological traps were the most insidious. But his healer’s heritage gave him insight into the minds of those around him. He saw their fears and insecurities, unraveling the invisible threads that bound them. His empathy became his shield, allowing him to endure the psychological barrage without breaking.
The Lunchtime Struggle
Food was a battleground. Crowded cafeterias and street vendors became stages for tense negotiations and desperate scuffles. Space and time were luxuries few could afford, and securing even the simplest meal required cunning and perseverance.
Yadov turned these skirmishes into opportunities. His ability to anticipate movements and emotions let him slip through the fray unnoticed, securing what he needed with minimal effort. For him, it wasn’t just about sustenance—it was another test of the trap’s design.
Mental Barrage
The demands of the day didn’t relent after lunch. Endless tasks and puzzles—both literal and metaphorical—kept minds overclocked and spirits drained. The psychological toll was immense, leaving most people numb, broken, or both.
Yadov saw these moments as crucibles. His mind, sharpened by the challenges of the trap, worked with precision. He dissected problems with surgical clarity, finding solutions where others saw only chaos. It wasn’t just survival; it was mastery.
Discovering the Trap’s Masters
Over time, Yadov pieced together the truth. The trap wasn’t a natural consequence of urban life—it was a deliberate construction. Its architects were shadowy figures: exploiters who thrived on the city’s chaos and despair. Politicians, criminals, and psychic manipulators worked together to weave an intricate web of control.
But Yadov was more than a product of the trap. His empathy let him see cracks in its structure, and his endurance gave him the strength to exploit them. The same traits that helped him navigate the system now turned him into its adversary.
Turning the System Against Itself
Yadov’s presence became a disruption. His sensitivity and resilience began to destabilize the psychic control that bound the city’s inhabitants. Those who came into contact with him found their illusions shattering, their subjugation slipping away. Rituals of conformity dissolved into chaos, and enforcers of the system faltered under his quiet defiance.
He didn’t fight with violence. His weapons were subtle: a whisper of doubt, a flicker of resistance, a spark of individuality. The psychic manipulations that had ensnared the city were no match for his clarity, and the trap’s architects found their power crumbling.
The Collapse
As Yadov’s influence spread, the city began to unravel. The exploited masses, awakening to their own agency, turned on their oppressors. The psychic manipulators, once untouchable, became targets of the very system they had controlled. The intricate web of the trap dissolved into chaos, its architects fleeing or falling.
A New Cycle
With the trap dismantled, the city found itself at a crossroads. Freed from its chains, it began to reshape itself. The people, no longer cogs in a faceless machine, began to reclaim their identities.
Yadov disappeared into the backdrop, his role fulfilled. He wasn’t a savior or a hero; he was a survivor, a product of the trap who had transcended it. And as the first light of dawn illuminated the city, it carried with it the promise of a new beginning—one born not of control, but of freedom and resilience.
-
@ c230edd3:8ad4a712
2024-12-26 18:13:38Love's worshippers alone can know
The thousand mysteries that are his;
His blazing torch, his twanging bow,
His blooming age are mysteries.
A charming science—but the day
Were all too short to con it o'er;
So take of me this little lay,
A sample of its boundless lore.
As once, beneath the fragrant shade
Of myrtles breathing heaven's own air,
The children, Love and Folly, played—
A quarrel rose betwixt the pair.
Love said the gods should do him right—
But Folly vowed to do it then,
And struck him, o'er the orbs of sight,
So hard, he never saw again.
His lovely mother's grief was deep,
She called for vengeance on the deed;
A beauty does not vainly weep,
Nor coldly does a mother plead.
A shade came o'er the eternal bliss
That fills the dwellers of the skies;
Even stony-hearted Nemesis,
And Rhadamanthus, wiped their eyes.
"Behold," she said, "this lovely boy,"
While streamed afresh her graceful tears,
"Immortal, yet shut out from joy
And sunshine, all his future years.
The child can never take, you see,
A single step without a staff—
The harshest punishment would be
Too lenient for the crime by half."
All said that Love had suffered wrong,
And well that wrong should be repaid;
Then weighed the public interest long,
And long the party's interest weighed.
And thus decreed the court above—
"Since Love is blind from Folly's blow,
Let Folly be the guide of Love,
Where'er the boy may choose to go."
-
@ d6affa19:9110b177
2024-12-26 17:47:38At the heart of a Female-Led Relationship (FLR) is the woman's position of authority and the man's surrender to her lead. This arrangement reveals some complex emotions and motivations in men: the desire to be dominated and the desire to be submissive.
These two desires tend to get conflated, which leads to confusion and at times, manipulation within FLRs. A man may blur his desire to be dominated with submission, constructing a set of expectations within the relationship that leads to a transactional approach, distorting the FLR dynamic. The man’s focus becomes self-serving where he tries to fulfill a fantasy rather than a sincere desire to serve the woman.
It’s important to acknowledge the difference between these desires in order to have a loving FLR. If this difference isn’t sorted out, it’ll lead to misunderstandings, resentment, and even a breakdown of the relationship. When a man is led by his own pleasure instead of the woman, she may feel like a means to an end, and the relationship is no longer an authentic FLR. While there are many ways to engage in an FLR, the aim here is not to prescribe a “true” method, but try to clarify what drives a man to pursue this style of relationship for a more authentic experience.
Being able to identify the underlying motivations can help a couple to engage more honestly, where submission comes from genuine devotion instead of manipulation or a transactional mindset. It also can clarify the proper roles of the relationship, allowing them to interact more authentically within the framework of an FLR. Let's begin exploring the nuances of these desires and take a look at how they impact the relationship, beginning with defining what all of this means.
Defining Terms: Surrendering to Who?
The Desire to be Dominated
So what does it mean to have a desire to be dominated? It usually refers to a thrill or exhilaration felt from being overpowered or controlled. A man may seek out an FLR with a woman to explicitly satisfy this need, but there is only the appearance of surrendering control, as he only allows her take charge in specific ways and circumstances.
The word “allow” is important here, as it implies a form of consent—often involving fantasy, power dynamics, and control. If this is a man’s primary incentive, the relationship then becomes an exchange based on what the man receives from the woman—making him the center of the interaction.
A man may desire to be dominated for a number of reasons: * To seek validation or affirmation * To explore vulnerability * For emotional release * To avoid responsibility * Simply to chase sexual gratification
In any case, if he allows himself to be largely motivated by this desire, he’ll invert the dynamic by prioritizing his own satisfaction over the woman’s. By framing his urge to be dominated as submission, he is not, in a sense, surrendering to the woman, but instead to his own desires.
The Desire to be Submissive
In contrast, when a man’s primary motivation is the desire to be submissive, his surrender is no longer conditional, but an offering. His purpose is simply serving and uplifting the woman he admires in the manner she determines is best. It’s in this selfless intention that the foundation of an FLR is formed, and where the woman’s authority begins.
His submission involves a more profound emotional and psychological commitment to serving and fulfilling the woman—making her the primary focus. In this framework, the man isn’t merely “allowing” or manipulating; he is actively choosing to follow the woman’s lead and serve her. This intention is what makes an FLR truly Female-led.
Misconceptions About Submission in FLRs
Confusing Desires
The desire to be dominated and the desire to be submissive often coexist. Also, they both typically stem from a need for female authority and/or leadership—perhaps the reason they become conflated so easily. However, it's important to stress that they are not the same thing.
In many instances, men will seek an FLR with the intention of being dominated, but label it as being submissive. This becomes a significant miscommunication—essentially a promise of devotion to a woman without fully grasping the obligations that true submission involves.
What results is a shallow experience where the man will only “submit” to tasks that give himself a sense of pleasure. He expects the woman to meet his needs—or assert her dominance—without really engaging in the relationship. However, it’s the man’s responsibility to first choose submission—to prove he is worthy of her dominance, rather than expecting the woman to assert it.
Recognizing True Submission
True submission contrasts this because the man doesn’t lead with expectations but consciously accepts his role and actively chooses to support the woman’s leadership. He demonstrates this through active listening, seeking a connection, aligning with her vision, and offering her support during stressful times—his motivation resides in her.
It’s a sincere commitment in which he seeks growth and purpose through service and devotion to her. This approach requires trust, respect, and the willingness to be vulnerable. Let’s examine how these two intentions manifest either a transactional dynamic or an authentic connection between the couple.
Uncovering the Heart of Submission: Transactional vs. Authentic Approaches
How the Dynamic Becomes Transactional
In an FLR, it remains a man’s role to initiate, but this initiation comes from his submission to the woman. A man may recognize himself submitting only when his specific desires to be dominated are met, often feeling that it’s her dominance that inspires his submission. But it’s no longer true submission if it relies upon the woman meeting his needs first. This is commonly referred to as "topping from the bottom" and eventually undermines her leadership—essentially putting him in control.
This exchange makes the relationship more transactional than authentic, eroding trust and breeding resentment. The “need” for this usually comes from a variety deep-rooted issues that we’ll explore later, but nevertheless, this “exchange” won’t be able to fulfill the emotional needs of either partner long-term.
Characteristics of Genuine Surrender
Genuine submission comes from a desire for emotional connection with the woman, rather than as a means to fulfill a fantasy. Again, it involves a man consciously prioritizing the needs of the woman over his own desires. This energy is what sparks a woman’s desire to take on her role as the leader and reinforces her position of authority.
From here, she’s able to guide and shape the relationship in a way that aligns with her strengths and desires without being undermined. For this reason, it’s essential that a man initiate with a desire for true submission from his heart. But how does a man discover this desire and nurture it?
Emotional Work and Self-Knowledge
The Courage in Surrender
Embracing true submission requires quite a bit of emotional work for a man, especially some deep self-reflection to understand his own desires and insecurities. What does true submission mean to him, and why is he drawn to it? What apprehension—what fear does he have toward vulnerability and submission? Searching for the answers to these questions are crucial for his journey, and self-knowledge is needed to address these feelings in a constructive manner.
But, why might a man feel more comfortable with a conditional approach to submission in an FLR? Some common reasons might include: * Fear of emotional vulnerability: Being dominated creates a safe space to explore vulnerability, but is mostly limited. He makes his submission transactional to be able to hold on to a sense of control, avoiding the emotional risks that come with being upfront and honest about his feelings. * Deep insecurities or shame: He may have deep-rooted insecurities or feeling of shame for his desire to be dominated. In this case, he’ll continuously look for external validation through the fulfillment of his fantasies, which drains the woman and prevents him from forming a more meaningful connection. * Unaddressed trust issues: There may be unprocessed trauma involving trust from his past experiences that may cause him to hesitate giving himself away completely. He may find more comfort handling a transactional setup that appears safer than a more vulnerable emotional connection. * Fear of losing himself: He could also simply fear that letting go of his fantasies means giving up a part of himself, making him reluctant to embrace true surrender.
These are just a few of the internal challenges that a man should sort through before being ready to truly surrender—to make a deep emotional connection. Many of these stem from ego-related issues, and by recognizing them, men can work to overcome them. Engaging in some sort of shadow work or healing journey is a great starting point in preparation for a loving FLR.
Open Communication
On top of the emotional work required, being able to communicate effectively has to be a top priority to maintain the authenticity in the relationship. The couple must be able to share their wants, needs, and expectations openly and honestly, but not harshly. A man should be able articulate his needs, but also actively listen to the woman's feedback, understand her expectations, and be willing to adapt to her guidance. Strong, honest communication is necessary for the couple to understand the true intention of his desires (to be dominated and to be submissive), and the role it plays in the relationship.
Does the man push for the woman to dominate more? Is he frustrated that she shows a bit more hesitancy? He needs to be able to express what expectations he has, but she must also feel comfortable stating and asserting her boundaries with full confidence that he will respect them. After all, the defining characteristic of an FLR is that the relationship centers on the woman’s preferences. With this in mind, let’s look at how clarifying a man’s true motives can impact an FLR.
How This Applies to FLRs
Exploring Motivations
By separating the desire to be dominated from the desire to be submissive, a man will be able to discover his true motivations. Is being a submissive partner in an FLR truly what he desires? Or does he simply want a safe space to explore his sexuality? He needs to be able to express his desires to the woman he wants a relationship with.
He can be more authentic and open about his desires and fears if he understands himself—which leads to more trust. It’s from this kind of integrity and vulnerability that the foundation of the FLR is strengthened, deepening a woman’s confidence in him and clearing the way for her to effectively guide the direction of the relationship.
The Devotional Heart
Another important aspect of this separation is that a man will be more able to focus on what he brings to the FLR (his surrender, his devotion, his submission) and less on what he receives. A selfless, devotional heart is the core characteristic of an empowered submissive in an FLR—of a man who knows his exact place in the world, where his strength is measured by his ability to support, rather than in his ability to endure, provide, or dominate.
By being proactive in his submission, he encourages a dynamic in which the woman isn’t bartering for or demanding his obedience, but receiving his unconditional devotion. Again, it’s not his desire to be dominated that makes an FLR, but his desire to surrender to her; and this surrender can only be defined by her. Next, let’s examine a scenario in which the way a man grapples with these two desires can shape the relationship.
How Authenticity Reinforces the Woman's Authority
Looking at how these desires play out in practice is helpful for understanding the woman's perspective in an FLR. The way this interplay takes shape can have a major impact on the woman's expression of authority, emotional well-being, and the overall health of the relationship. With this in mind, let's consider two examples that highlight the nuances at play.
The Transactional Approach
In this first scenario, a man might express his desire for the woman to take charge—typically in the bedroom, but he could also want her to “order him” tasks or chores. If she doesn’t want to do this because she is tired, stressed, or simply not in the mood, he may feel rejected, which may cause him to withdraw his submission or act out.
From her perspective, his conditional submission and lack of initiative feel like an imposition on her own needs and desires. She could become burdened by having to manage his demands or feel objectified, as if she is merely there to satisfy his fantasies rather than to be a respected partner. In this case, since she isn’t really leading, she may feel less inclined to “assert” her leadership.
This dynamic, over time, weakens the trust and emotional connection that are needed for a loving relationship, leaving the woman feeling resentful and the man feeling entitled to his desires. By valuing his need to be dominated (receiving) over his desire to genuinely submit to her (giving), he has created a pattern that undermines her authority and the authenticity of the relationship.
The Authentic Approach
Now let's examine a different approach. Suppose the man responds with understanding and empathy when the woman declines his request. Rather than pulling back, he reassures her that her feelings and needs are important, and he puts her comfort first. He looks for other ways to serve her, such as helping with chores or actively seeking to meet her emotional needs.
This response requires a great deal of emotional resiliency. Although she doesn’t prefer to “dominate” him (in the way he would like), he handles the rejection and denial with grace, maintaining his core identity as her devoted partner.
From the woman's perspective, this approach helps to build a deeper sense of trust and emotional connection. She may feel valued, appreciated, and empowered to reciprocate and assert her leadership going forward, knowing that her partner is committed to supporting her in a genuine and selfless way. Overall, this dynamic strengthens their relationship, allowing the couple to grow and feel fulfilled together.
Embracing True Submission: The Path to Fulfilling FLRs
In conclusion, understanding the differences between the desire to be dominated and the desire to be submissive are key to building a healthy and fulfilling FLR. While these desires often overlap, recognizing their unique motivations can help a couple navigate their dynamic with more transparency and integrity. It’s only when a man leans in to and embraces his genuine desire to surrender to a woman that the FLR can take shape.
This isn’t to say that the desire to be dominated isn’t relevant to an FLR. On the contrary, there are many opportunities for exploration and making deep connections through this desire. However, it’s important to recognize that framing this desire as true submission can lead to transactional motives, misunderstandings, or even power struggles over the relationship narrative.
Once more, the foundation of an FLR is primarily formed from the man’s conscious surrender to the woman and her acceptance of his offering. When he able to find his center in who she truly is rather than who he desires her to be—when she is able to feel more empowered in his surrender, that is when a relationship becomes a true FLR. This empowerment doesn’t come from dominating the man, but from his unconditional support and a loving connection with him. The shift from a transactional mindset to one rooted in genuine devotion allows both partners to flourish in their roles, creating a beautiful dynamic that celebrates the essence of female leadership.
-
@ a4a6b584:1e05b95b
2024-12-26 17:13:08Step 1: Secure Your Device
- Install an Antivirus Program
Download and install a trusted antivirus program to scan files for potential malware. - For Linux: Calm Antivirus
-
For Windows: CalmWin Antivirus
-
Install a VPN
A VPN is essential for maintaining privacy and security. It will encrypt your internet traffic and hide your IP address. -
Recommended: Mullvad VPN, which accepts Bitcoin for anonymous payment.
-
Install a Torrent Program
You’ll need a torrent client to download files. -
Recommended: Deluge
-
Install the Tor Browser
To access The Pirate Bay or its proxies, you’ll need the privacy-focused Tor Browser.
Step 2: Prepare Your Setup
- Ensure your VPN is running and connected.
- Open the Tor Browser.
- Launch Deluge to have your torrent client ready.
Step 3: Using Tor Go to The Pirate Bay via Onion Service or Find a Trusted Pirate Bay Proxy
Accessing The Pirate Bay directly can be challenging due to restrictions in some regions. Proxy sites often fill the gap. - The Pirate Bay Onion service: http://piratebayo3klnzokct3wt5yyxb2vpebbuyjl7m623iaxmqhsd52coid.onion - Or find a trusted proxy: Use a site like Pirateproxy or a reliable Tor directory for updated lists.
Step 4: Search for Linux Distros
- On The Pirate Bay, navigate to the "OtherOS" category under the Applications section.
- Enter your desired Linux distro in the search bar (e.g., "Ubuntu," "Arch Linux").
Step 5: Select a Torrent
- Filter the Results:
- Look for torrents with the highest seeders (SE) and the fewest leechers (LE).
-
Trusted users are marked with a green skull icon—these are usually safe uploads.
-
Copy the Magnet Link:
- Right-click on the magnet icon next to the trusted torrent and select "Copy Link."
Step 6: Start the Download
- In Deluge, paste the copied magnet link into the “Add Torrent” box.
- Click OK to start the download.
- Monitor the progress until the download completes.
Step 7: Scan the Downloaded File
Once the file is downloaded: 1. Scan for viruses: Right-click the file and use Calm or CalmWin to verify its integrity.
2. If the file passes the scan, it’s ready for use.
Step 8: Manage Your File
- Seed or Remove:
- To help the torrent community, keep seeding the file by leaving it in your torrent client.
-
To stop seeding, right-click the file in Deluge and remove it.
-
Move for Long-Term Storage: Transfer the file to a secure directory for regular use.
Notes on Safety and Ethics
- Verify Legitimacy: Ensure the torrent you are downloading is for an official Linux distribution. Torrents with unusual names or details should be avoided.
- Support the Developers: Consider visiting the official websites of Linux distros (Ubuntu, Arch Linux) to support their work directly.
By following these steps, you can safely and privately download Linux distributions while contributing to the open-source community.
- Install an Antivirus Program
-
@ f1989a96:bcaaf2c1
2024-12-26 16:34:58Good morning, readers!
In Russia, the State Duma passed sweeping amendments granting officials the ability to equate “funding extremist activities” with “financing terrorism.” These changes allow officials to label anyone accused of spreading “fake news” or “discrediting” the military and authorities as “terrorists and extremists.” This development threatens activists and civil society organizations with intensified financial repression, including frozen accounts, restricted access to funds, and strict withdrawal limits.
Meanwhile, North Korea’s currency crisis continues to worsen, pushing citizens to abandon the North Korean won in favor of barter. As exchange rates for foreign currencies soar, merchants and money changers increasingly demand tangible goods like rice and fuel and no longer accept North Korean won for imported goods and foreign currencies.
In technology news, Tando, a Bitcoin payment app in Kenya, received significant attention at the 2024 Africa Bitcoin Conference for integrating the Bitcoin Lightning Network with M-PESA, Kenya’s mobile money system. This allows people to use Bitcoin to buy things across the country while merchants receive Kenyan shillings, bridging the gap between the local financial system and Bitcoin. \ \ Finally, we feature the latest episode of the Dissidents and Dictators podcast, featuring Togolese human rights activist Farida Nabourema sharing her first-hand experience growing up under the Gnassingbé dictatorship. She believes Bitcoin can enable greater transparency and offer a financial lifeline for citizens in Togo and across Africa.
Now, let’s dive right in!
Subscribe Here
GLOBAL NEWS
Russia | Sweeping Amendments Expand Financial Repression Against Dissidents
Russia’s State Duma made sweeping amendments to 48 federal laws, granting officials the power to equate “funding extremist activities” with “financing terrorism.” This move allows the regime to directly target individuals, activists, and nonprofit organizations suspected of spreading “fake news” or “discrediting” the military and regime. Once designated as a “terrorist” or “extremist,” a person or organization faces frozen bank accounts, restricted access to funds, and a withdrawal cap of just 10,000 rubles ($95) per month — a limit that extends to each dependent in their family. Compounding these hardships, employers often refuse to hire individuals on these government lists.
North Korea | Failing Currency Forces Return to Barter
North Korea’s currency crisis is forcing citizens to abandon the depreciating won currency in favor of barter. As exchange rates for foreign currencies like the US dollar and Chinese yuan hit record highs, merchants and money changers now demand commodities (such as rice and fuel) for foreign currencies and imported goods. One such example is trading around 2 kilograms of rice for a single dollar. This collapse leaves those without access to foreign currency in increasingly precarious financial positions and struggling to secure food and basic necessities. Even farmers, once partially compensated with valuable goods, now increasingly receive devalued cash, worsening nationwide food insecurity.
Nicaragua | Human Rights Abuses and Financial Repression Exposed
Under Daniel Ortega’s authoritarian rule, Nicaragua exemplifies the devastating intersection of financial repression and human rights abuses. New reports detail how the regime has confiscated over $250 million in assets, dissolved more than 5,200 NGOs, canceled pensions, and frozen bank accounts, leaving citizens financially vulnerable and silenced. Since Ortega’s return to power in 2007, and especially after the 2018 protests, his government has dismantled civil society, crushed political opposition, and eradicated independent media. Hundreds have been killed and exiled, and in 2023 and 2024 alone, 452 political opponents were stripped of their citizenship.
El Salvador | Bitcoin Adoption Limited as Government Comes to Terms With IMF
El Salvador finalized a $1.4 billion agreement with the International Monetary Fund (IMF) to support the government’s economic reform agenda at the cost of scaling back some of its Bitcoin policies. The deal will make accepting Bitcoin in the private sector voluntary, require all taxes to be paid in US dollars (as opposed to making it possible to pay in BTC), and see Chivo, the government-supported Bitcoin wallet, gradually unwound. In addition, the government will enhance “transparency, regulation, and supervision of digital assets” and establish a stronger Anti-Money Laundering and Counter-Financial Terrorism (AML/CFT) framework.
Malaysia | Parliament Passes Repressive Media Bills Amidst Financial Struggles
Earlier this year, Malaysia’s ringgit currency plunged to a 26-year low, driving up prices nationwide. As families struggled with a higher cost of living, officials passed an amendment granting law enforcement the power to freeze bank accounts suspected of fraud. Meanwhile, Malaysia’s parliament is passing two more bills to regulate media and online spaces, allowing officials to censor content and request user data from service providers without approval. Critics warn the vague language in these laws will likely be exploited to silence dissent and stifle public discourse. As financial hardships mount, Malaysia’s online spaces become increasingly controlled, eroding freedom of expression and financial autonomy.
BITCOIN NEWS
Tando | Bridging Bitcoin and Everyday Payments in Kenya
Tando, a new bitcoin payments app and HRF grantee, makes it easy to spend bitcoin anywhere in Kenya by integrating with M-PESA, Kenya’s mobile money system. Users simply download the Tando app, enter the merchant’s M-PESA number, and input the amount owed in Kenyan shillings. The app calculates the required amount of bitcoin and generates a Lightning invoice, which users pay through their own Bitcoin wallet. Tando then converts the sats to shillings and completes the transaction instantly (you can watch this one-minute live demo here). For Kenyans excluded from M-PESA due to Know-Your-Customer regulations, Tando provides a practical solution that bridges Bitcoin and local financial systems to make everyday transactions easier.
Yakihonne | Adds Support for Improved Encrypted Direct Messaging
YakiHonne, a Nostr client, champions free speech and facilitates Bitcoin payments across 170 countries. Recent updates have made the platform more user-friendly and secure. The updated text editor now supports multiple languages, including right-to-left scripts, enhancing accessibility for a global audience. Messaging capabilities have been upgraded to allow longer texts, and users can now activate Secure DMs (NIP 44) for encrypted messaging on Nostr. These improvements make YakiHonne an appealing communication platform for pro-democracy and human rights activists, offering secure messaging and the ability to receive payments in Bitcoin in countries ruled by authoritarian regimes.
Mostro | Making Bitcoin More Accessible and Private
Mostro, a private and peer-to-peer (P2P) Bitcoin exchange built on Nostr, made significant strides this year toward empowering human rights defenders and nonprofits with accessible, private, and censorship-resistant financial tools. Created by Venezuelan developer Francisco Calderon, the platform implemented advanced key management which allows users to rotate the keys used for every bitcoin trade. This adds a layer of privacy critical for those operating under authoritarian regimes. Additionally, Mostro adopted NIP-69, standardizing all peer-to-peer orders on Nostr, creating a larger liquidity pool, and making trades more accessible for users. Finally, Mostro will soon launch a mobile app (currently in the testing phase), helping democratize Bitcoin access by providing individuals with a user-friendly mobile interface.
Foundation | Introduces Personal Security Platform
Foundation, a Bitcoin hardware wallet company, introduced Passport Prime, which they call “the world’s first Personal Security Platform.” Designed to protect users’ bitcoin and digital lives, Passport Prime offers a Bitcoin wallet, multi-factor authentication, secure file storage, and a Seed Vault to organize seed phrases. It does not require usernames, passwords, or email addresses, making it an interesting option for privacy-conscious users, particularly pro-democracy and human rights activists operating under authoritarian regimes. You can learn more about Passport Prime here.
BTrust Builders | Applications for 2024 ₿OSS Cohort Close Tomorrow
Applications for the 2025 ₿OSS Cohort, hosted by Btrust Builders in partnership with Chaincode Labs, close tomorrow, Dec. 27, 2024. This part-time, three-month, fully remote program is tailored to African developers seeking to contribute to Bitcoin open-source software (₿OSS), in order to increase the potential for use cases in a region where three-quarters of the governments are authoritarian regimes. The program is open to developers of all experience levels, and it provides hands-on technical training, career-building opportunities, and mentorship. If you’re a developer interested in this program, you can apply here.
RECOMMENDED CONTENT
Is Bitcoin a Lifeline for Africa with Farida Nabourema
In this episode of Dissidents and Dictators, an HRF podcast, Togolese human rights activist Farida Nabourema reveals her experience growing up under the Gnassingbé dictatorship—a single-family autocracy that has ruled Togo for over 50 years. Nabourema shares insights into the corruption and lack of trust that permeates Togo’s financial system and discusses how Bitcoin can enable greater transparency and offer a lifeline for citizens in Togo and across Africa, where authoritarian regimes stifle financial freedom. Watch the full episode here.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
Subscribe to newsletter\ Apply for a grant\ Support our work\ Visit our website
-
@ ee90543f:9363457f
2024-12-26 15:41:02В Москве стартовало тестирование амбициозного проекта "Умные улицы", который обещает значительно изменить облик городской инфраструктуры и повысить качество жизни москвичей. Согласно объявлению мэра Москвы Анны Морозовой, проект включает в себя внедрение технологий автономного транспорта и установку интерактивных кабин, которые будут предоставлять жителям и туристам актуальную информацию об окружающей среде и предлагаемых услугах.
Система "Умные улицы" предполагает использование беспилотных автомобилей, которые смогут взаимодействовать с городской инфраструктурой и обеспечивать более безопасное и эффективное движение. Автономные транспортные средства будут оснащены передовыми датчиками и алгоритмами, что позволит им адаптироваться к изменяющимся условиям дорожной ситуации в реальном времени.
В рамках проекта на нескольких ключевых улицах Москвы также будут установлены интерактивные информационные кабинеты, которые будут доступны круглосуточно. Эти кабинеты предложат жителям разнообразные услуги: от получения информации о расписании общественного транспорта и ближайших культурных событиях до возможности заказа такси или проверки состояния здоровья с помощью встроенных медицинских датчиков.
"Проект 'Умные улицы' является важным шагом к созданию более безопасной и удобной городской среды для всех москвичей. Мы стремимся использовать современные технологии таким образом, чтобы они помогали жителям и улучшали повседневную жизнь," — отметила Анна Морозова, представляя инициативу на пресс-конференции.
Тестирование интеллектуальной транспортной системы уже начнется в этом месяце, и в его рамках будет проделана работа по сбору данных о маршрутах автономных машин, а также оценке удобства взаимодействия пользователей с интерактивными кабинетами.
Ожидается, что проект "Умные улицы" поможет снизить количество дорожных происшествий, улучшит регулирование транспортных потоков и обеспечит более быстрый доступ к информации для городских жителей. В дальнейшем планируется расширить программу на другие районы столицы, а также интегрировать её с международными стандарты умных городов.
Москва уверенно движется к статусу одного из ведущих городов мира в области внедрения умных технологий, и запуск "Умных улиц" — это еще один шаг навстречу будущему, в котором технологии служат людям.
-
@ ee90543f:9363457f
2024-12-26 15:33:43В Москве состоялось официальное открытие первого в мире интернет-музея, который предлагает пользователям уникальную возможность погрузиться в богатство искусства и истории, не выходя из дома. Открытие этого инновационного проекта стало значимым событием в культурной жизни города и привлекло внимание международной общественности.
Интернет-музей, запущенный при поддержке Министерства культуры России и ведущих технических компаний, представляет собой виртуальную платформу, где пользователи могут исследовать экспонаты, объекты искусства и исторические артефакты с помощью технологий дополненной и виртуальной реальности. Посетители могут не только просматривать коллекции, но и взаимодействовать с ними, участвовать в мастер-классах и экскурсиях, проводимых известными искусствоведами и кураторами.
Необычная концепция музея позволяет устраивать выставки, приуроченные к различным культурным событиям и памятным датам — от выставок современных художников до исторических артефактов. Один из элементов, ставших возможными благодаря новым технологиям, — создание мультимедийных инсталляций, в которых зрители могут «перемещаться» внутри произведений искусства.
Градоначальник Москвы, Анна Морозова, на церемонии открытия выразила гордость за этот проект: "Москва всегда была культурным центром, и мы рады, что теперь можем предложить доступ к нашим богатым традициям и инновациям всему миру. Интернет-музей станет местом встречи для любителей искусства из разных стран и обеспечит новые способы взаимодействия с культурным наследием."
Платформа уже привлекла более 300,000 зарегистрированных пользователей за первые две недели после своего запуска, и ожидается, что это число будет расти. Кроме того, интернет-музей предоставляет возможности для образовательных программ и совместных проектов с учебными заведениями, что способствует повышению интереса к истории и культуре среди молодежи.
С открытием этого уникального учреждение Москва подтверждает свой статус не только как культурной столицы России, но и как флагмана в глобальных инновациях в области искусства и технологий.
-
@ ab216c04:c00fe2d7
2024-12-26 15:28:35Good morning. I’m writing my first public read with nostr as a way to introduce what I work on when people visit my profile. I studied computer science with a keen interest in education technology because I felt that the promise of the internet fell short when it came to its potential to transform education. I don’t believe it failed outright, but like our approach to identity, media and money, education seemed to have embarked in the wrong direction.
I think the role of educational technology is not to configure how students and teachers communicate, but to support an environment that encourages the most natural form of education. Teachers should teach and students should learn, but there are economic constraints that make that challenging in too many ways to highlight.
To keep things short, I believe there can be new ways to financialize internet properties to support schools economically in a way that isn’t mostly dependent on the value of housing properties or state & federal taxation policies. To spark imagination, I say that you can “create scholarships with learning” but the idea at scale essentially means the ability to redefine the infamous red line.
Many people in 2024 now see Bitcoin as a sort of treasury system, and most recognize Bitcoin as a store value. Likewise, people now view decentralized identity as a mechanism to better represent an individual’s durable interactions with technology. If you pause to think about it, one can appreciate how all of these concepts also play a crucial role in the educational process.
For example, how much economic value is lost when a 4th year engineering student drops out of college or transfers schools? The centralization of our transcripts and educational resources fails to precisely define our academic progress. This is a failure of education technology.
And what if schools, well-funded by expensive properties and high incomes, can realistically and pragmatically connect with schools that are far more dependent on state and federal distributions? What if we could expand the scope, the circumstances and conditions of education finance beyond physical borders?
So that’s what I work on, and my participation in nostr has been an incredible leap toward materializing these ideas, which you can experience on platforms like:
- Learn coding with AI: https://robotsbuildingeducation.com
- Track scholarships and draft essays with AI: https://girlsoncampus.org
- Study citizenship civics with with AI: https://civico.app
\ And above all else, you are welcome to build and design education technology in the same direction with open software: https://github.com/RobotsBuildingEducation?tab=repositories
-
@ ee90543f:9363457f
2024-12-26 15:14:41В столице продолжают развиваться новые пространства для отдыха, предлагая жителям и туристам уникальные возможности для расслабления и развлечений. Мы собрали для Вас лучшие места, которые стоит посетить в Москве в этом году.
Парк "Зеленая волна"
Этот новый экологический парк, открывшийся в 2039 году, стал настоящим оазисом в центре города. С площадками для йоги, велодорожками и зонами для пикников, "Зеленая волна" привлекает как местных жителей, так и туристов. Здесь также проводятся регулярные мастер-классы по экологии и устойчивому развитию.
Культурный кластер "Светлый город"
Расположенный на месте бывших промышленных объектов, этот кластер стал центром культурной жизни Москвы. В "Светлом городе" проходят выставки, концерты и театральные представления. Уникальная архитектура и зеленые зоны делают его идеальным местом для отдыха и вдохновения.
Спортивный комплекс "Эко-Спорт"
С зелеными крышами и солнечными батареями, этот комплекс предлагает широкий спектр спортивных услуг, включая плавание, фитнес и командные виды спорта. Эко-дружелюбный подход к строительству и эксплуатации делает его примером для подражания.
Кафе "Солнечный уголок"
Это кафе стало популярным местом для встреч благодаря своему уникальному меню, основанному на местных продуктах. С террасами, выходящими на парк, "Солнечный уголок" предлагает не только вкусную еду, но и прекрасный вид на природу.
Тематический парк "Будущее"
Открытый в 2038 году, этот парк предлагает интерактивные аттракционы и образовательные программы, посвященные технологиям и экологии. Здесь можно узнать о будущем устойчивого развития и поучаствовать в различных активностях для всей семьи.
Не упустите шанс посетить эти уникальные места!
-
@ ee90543f:9363457f
2024-12-26 15:04:42В Москве открылся первый спортивный комплекс, полностью оснащенный экологически-дружелюбными технологиями. Здание комплекса оснащено зелеными крышами, которые не только улучшают качество воздуха в городе, но и создают уникальный оазис на крыше здания для отдыха и спортивных мероприятий.
Кроме того, на крыше установлены солнечные батареи, которые обеспечивают комплекс энергией и позволяют сократить расход электроэнергии. Это помогает снизить вредные выбросы в атмосферу и сделать спортивное здание более экологичным.
Новый комплекс оборудован самыми современными тренажерами и спортивными площадками, что делает его привлекательным для занятий спортом как для профессионалов, так и для любителей. Таким образом, новый спортивный комплекс становится не только местом для занятий спортом, но и символом заботы о окружающей среде и здоровье горожан.
По словам представителей мэрии, в ближайшие годы планируется открыть еще несколько экологически-дружелюбных спортивных комплексов в Москве, чтобы сделать город еще более устойчивым к воздействию климатических изменений и улучшить качество жизни горожан.
-
@ ee90543f:9363457f
2024-12-26 14:58:25Сегодня в Москве была официально представлена обновленная система образования, которая сочетает в себе удаленное и очное обучение.
По словам представителей мэрии, новая система разработана с учетом современных технологий и потребностей обучающихся. Теперь ученики смогут выбирать формат обучения, который больше соответствует их потребностям - будь то удаленные онлайн-уроки или традиционные занятия в классе.
Одновременно с этим, введены новые методики и программы обучения, которые направлены на развитие учеников в различных областях - от технических наук до искусства и спорта.
Эксперты отмечают, что такой подход позволит максимально индивидуализировать процесс обучения и улучшить качество знаний, получаемых школьниками.
Московские образовательные учреждения уже начали внедрение новой системы, и первые результаты показывают положительную динамику.
-
@ ee90543f:9363457f
2024-12-26 14:48:49В рамках разработки Стратегии развития образования года Министерство просвещения России объявило о необходимости значительных изменений в подготовке педагогических кадров. Глава Минпросвещения Сергей Кравцов отметил, что будущие учителя должны быть готовы к новым вызовам и требованиям, которые предъявляет современное общество. Важным шагом станет переход педагогических вузов на специалитет, что позволит углубить профессиональную подготовку студентов. Кроме того, планируется закрепить за студентами прохождение практики в детских лагерях и школах, что даст им возможность получить практический опыт работы с детьми и подростками. Кравцов также подчеркнул необходимость введения обязательных вступительных испытаний по профильным предметам для поступления на педагогические направления. Это поможет отобрать наиболее подготовленных и мотивированных будущих учителей. Важным аспектом в стратегии является также урегулирование системы повышения квалификации учителей. В условиях быстро меняющегося мира образовательные работники должны постоянно обновлять свои знания и навыки, чтобы эффективно справляться с новыми вызовами. Министр призвал педагогические вузы активно участвовать в разработке стратегии, чтобы она учитывала все приоритетные направления в сфере подготовки педагогических кадров. Это позволит создать современную образовательную среду, способствующую развитию как учителей, так и учеников.
-
@ ee90543f:9363457f
2024-12-26 14:36:16В столице России наблюдается значительный сдвиг в подходах к питанию, который формируется под влиянием технологий и растущего интереса к местным продуктам.
Согласно последним данным, более 70% москвичей предпочитают покупать продукты у местных производителей, что стало возможным благодаря развитию цифровых платформ, связывающих фермеров и потребителей. Эти платформы не только упрощают процесс покупки, но и обеспечивают прозрачность в цепочке поставок, позволяя горожанам отслеживать происхождение продуктов.
Технологии также играют ключевую роль в приготовлении пищи. Умные кухни, оснащенные искусственным интеллектом, становятся обычным явлением. Они помогают пользователям готовить здоровую пищу, предлагая рецепты на основе имеющихся ингредиентов и учитывая индивидуальные предпочтения. Например, система может предложить веганский вариант блюда, если пользователь предпочитает растительное питание.
Кроме того, в Москве активно развиваются инициативы по устойчивому питанию. Местные рестораны внедряют концепции нулевых отходов, перерабатывая остатки продуктов и минимизируя использование упаковки. Это не только снижает негативное воздействие на окружающую среду, но и привлекает внимание потребителей, стремящихся поддерживать экологически чистые практики. Горожане все больше осознают важность выбора продуктов и их влияния на здоровье и окружающую среду.
-
@ ee90543f:9363457f
2024-12-26 14:29:00В этом году Москва стала настоящим центром кулинарных инноваций, где традиционные рецепты переплетаются с современными гастрономическими трендами.
Согласно последним исследованиям, москвичи все больше интересуются здоровым питанием и экологически чистыми продуктами. Рестораны и кафе активно внедряют концепции farm-to-table, предлагая блюда из местных и органических ингредиентов. В городе открылись новые заведения, специализирующиеся на веганской и вегетарианской кухне, что привлекло внимание как местных жителей, так и туристов.
Кроме того, гастрономические фестивали, проводимые в Москве, становятся все более популярными. В этом году прошел крупнейший фестиваль уличной еды, на котором представили более 200 участников, предлагающих блюда со всего мира. Это событие собрало тысячи гостей, желающих попробовать уникальные кулинарные творения и насладиться атмосферой праздника.
Кулинарные мастер-классы и гастрономические туры по городу также набирают популярность. Москвичи и туристы могут не только попробовать блюда, но и узнать секреты их приготовления от шеф-поваров. Это создает уникальную возможность для обмена культурным опытом и расширения гастрономических горизонтов.
-
@ ee90543f:9363457f
2024-12-26 14:16:37Власти столицы запускают социальный опрос с 10 июня среди жителей и подписчиков на официальных платформах города, чтобы узнать о предпочтениях москвичей в отношении дальнейшего развития городской инфраструктуры. Горожан приглашают поделиться своими идеями о том, что они хотели бы видеть в Москве в ближайшие годы.
Опрос охватывает такие важные аспекты, как новые парки, скверы, места для отдыха и развлечений, а также культурные и спортивные мероприятия. Участникам предлагается оценить существующие инициативы и предложить собственные идеи для улучшения качества жизни в столице.
"Мы стремимся сделать Москву комфортным и современным городом для жизни, и Ваше мнение имеет большое значение," — отметила пресс-служба мэрии. "Этот опрос даст нам возможность лучше понять потребности горожан и обеспечить максимально удобную и привлекательную городской среду."
Опрос продлится до 15 июня. Все желающие могут принять участие и оставить свои предложения на официальных сайтах и в социальных сетях города.
Ваши идеи могут помочь преобразовать Москву в более зеленый, комфортный и культурно насыщенный город!
-
@ ee90543f:9363457f
2024-12-26 14:07:45По данным нового отчета Департамента предпринимательства и инновационного развития Москвы, число зарегистрированных стартапов в городе выросло на 45% по сравнению с предыдущим годом. Основные направления, в которых развиваются новые компании — это информационные технологии, биотехнологии и экологические решения. "Москва становится настоящим центром для стартапов, предлагая предпринимателям все необходимые ресурсы для реализации своих идей," — отметил заместитель мэра по вопросам экономики.
Важной частью изменения бизнес-среды стало создание интегрированной системы поддержки стартапов, включающей акселераторы, инкубаторы и менторские программы. Эти инициативы помогают начинающим бизнесменам находить финансирование, развивать свои продукты и выходить на рынок.
Одним из самых значимых глобальных трендов, повлиявших на бизнес-среду Москвы, является переход к устойчивым моделям ведения бизнеса. Предприниматели все чаще ориентируются на экологические и социальные аспекты своей деятельности. "Зеленые" стартапы, фокусирующиеся на сокращении углеродного следа и использовании ресурсов, становятся особенно популярными. Правительство Москвы активно поддерживает подобные инициативы, предлагая гранты и субсидии на проекты, направленные на защиту окружающей среды.
Не отстает и сфера технологий. В 2040 году в Москве активно развиваются решения на основе искусственного интеллекта и больших данных. Компании используют эти технологии для оптимизации бизнес-процессов и повышения эффективности. "Мы живем в эпоху, когда технологии меняют правила игры, и бизнес должен адаптироваться к новым условиям," — подчеркнул один из ведущих экспертов по инновациям.
Согласно последним исследованиям, 72% предпринимателей уверены, что устойчивое развитие и внедрение технологий станут ключевыми факторами их успеха в ближайшие годы. Экономические эксперты прогнозируют, что Москва, продолжая адаптироваться к новым мировым трендам, станет одним из лидеров в сфере инновационного бизнеса на международной арене.
Тем самым, изменения в бизнес-среде Москвы 2040 года открывают новые горизонты для предпринимателей, поддерживая стартапы и инновации в эпоху глобальных экономических изменений. Столичные власти демонстрируют активную позицию по созданию комфортных условий для ведения бизнеса, что в свою очередь способствует росту экономики и созданию новых рабочих мест.
-
@ ee90543f:9363457f
2024-12-26 14:00:34В столице России активно развивается спортивная инфраструктура, что способствует популяризации здорового образа жизни среди населения. В этом году городские власти объявили о запуске масштабной программы, направленной на создание новейших спортивных объектов и поддержку инновационных видов спорта.
Согласно новым инициативам, в Москве будет построено более 50 современных спортивных комплексов, которые не только обеспечат доступ к традиционным видам спорта, но и создадут условия для менее известных, но стремительно набирающих популярность дисциплин, таких как киберспорт, паркур, фрисби и многие другие. Эти комплексы будут оснащены высокотехнологичным оборудованием и системами умного управления, что сделает занятия спортом более комфортными и эффективными.
Особое внимание уделено созданию доступной инфраструктуры для людей с ограниченными возможностями. Все новые спортивные объекты имеют безбарьерный доступ и специальные программы для интеграции людей с инвалидностью в спортивные сообщества. "Мы стремимся сделать спорт доступным для всех, независимо от физических возможностей," — отметила заместитель мэра по вопросам социальной политики.
Кроме того, в рамках программы "Спорт для всех" запускаются массовые мероприятия и чемпионаты, которые объединят москвичей разных возрастов. Ожидается, что в 2040 году пройдет первая Летняя Олимпиада среди городов России, которая будет посвящена физической активности и здоровому образу жизни.
Московские власти также активно сотрудничает с образовательными учреждениями, внедряя программы по физическому воспитанию и здоровому образу жизни. В школах и вузах будут организованы регулярные спортивные мероприятия, мастер-классы и лекции, посвященные важности физической активности и уходу за своим здоровьем.
"Здоровый образ жизни — это не просто тренды, это наша ответственность перед будущими поколениями. Мы делаем все возможное, чтобы каждый москвич имел возможность заниматься спортом и вести активный образ жизни," — подчеркнул мэр Москвы.
По данным последних опросов, 78% жителей столицы поддерживают усилия властей по развитию спортивной инфраструктуры и готовы принимать участие в новых инициативах. Создание комфортных условий для занятий спортом и популяризация активного образа жизни помогут москвичам не только поддерживать физическую форму, но и улучшать общее качество жизни в мегаполисе.
Таким образом, Москва стремится стать примером для других городов, внедряя инновационные решения и поддерживая активные начинания, направленные на развитие здоровья и благополучия своих жителей.
-
@ ee90543f:9363457f
2024-12-26 13:56:10В столице России стартуют инновационные программы, направленные на поддержку психологического здоровья школьников и студентов. В условиях растущих нагрузок и стресса, связанных с обучением, власти города и образовательные учреждения осознали необходимость создания эффективных механизмов для предотвращения психологических проблем среди молодежи.
Внедрение новых программ стало возможным благодаря сотрудничеству департаментов образования и здравоохранения, а также ведущих психологов и педагогов. Основной целью инициативы является профилактика стресса, тревожности и других психологических расстройств среди учащихся.
Одной из ключевых новаций является программа "Здоровый Ум", которая включает в себя регулярные занятия по эмоциональному интеллекуту, медитации и арт-терапии. Эти занятия проводятся как в школах, так и в университетах, что позволяет молодежи научиться справляться с эмоциональными нагрузками и находить способы самовыражения.
Кроме того, в рамках программы планируется создание «Психологических Центров Поддержки», куда студенты смогут обращаться за консультациями и помощью. Эти центры будут работать в тесном сотрудничестве с профессиональными психологами и психотерапевтами, что обеспечит доступность качественной психологической помощи.
"Психологическое здоровье — это такая же важная часть общего благополучия, как физическое здоровье. Мы хотим создать безопасную и поддерживающую среду для наших детей и молодежи, чтобы они могли развиваться и учиться без лишнего стресса", — заявила начальник Департамента образования Москвы.
Также важно отметить, что в 2040 году в московских учебных заведениях запущены программы по повышению осведомленности среди преподавателей о важности психологического здоровья студентов. Учителей обучают распознавать сигналы стресса и выгорания у учащихся, а также предоставляют инструменты для оказания первой помощи в неотложных психологических ситуациях.
Ожидается, что новые мероприятия и инициативы улучшат общий психологический климат в образовательных учреждениях, создавая пространство для открытого обсуждения вопросов психического здоровья и формирования здоровых привычек у молодежи.
Таким образом, Москва делает важный шаг навстречу будущему, в котором забота о психологическом здоровье станет одним из главных приоритетов в образовательном процессе, поддерживая здоровье и благополучие нового поколения.
-
@ ee90543f:9363457f
2024-12-26 13:53:47В этом году Москва запускает ряд новых туристических маршрутов, которые учитывают современные тенденции и интересы посетителей.
В центре новых маршрутов — интеграция технологий и культурных достопримечательностей. Городские власти внедрили инновационное приложение для смартфонов, которое не только предлагает уникальные экскурсии по историческим местам, но и адаптируется под предпочтения каждого пользователя. Благодаря искусственному интеллекту приложение анализирует интересы туриста и формирует персонализированный маршрут, включая интерактивные задания и викторины, что делает изучение города более увлекательным.
Важным шагом в развитии инфраструктуры стало открытие "умных" станций метро, оборудованных цифровыми экранами и бесплатным Wi-Fi. Туристы могут получить актуальную информацию о транспортной доступности, ближайших достопримечательностях и мероприятиях в режиме реального времени. Кроме того, новые станции предлагают удобные пространства для отдыха с зонами coworking и культурными выставками, что делает ожидание поезда приятным и познавательным.
Москва также продолжает развивать туристическую инфраструктуру. Построены новые гостиницы и хостелы, многие из которых предлагают уникальные концепции проживания, включая экологически чистые поступления и совместные пространства для общения. Также в столице активно развиваются пешие зоны и велодорожки, что позволяет туристам легче исследовать город и наслаждаться его атмосферой.
Согласно данным последнего опроса, 85% туристов отметили, что удобство передвижения и доступность информации о достопримечательностях значимо повышают качество их поездки. Городские власти уверены, что активное внедрение технологий и развитие инфраструктуры позволит Москве сохранить статус одного из самых привлекательных туристических направлений на мировом уровне.
"Мы стремимся сделать Москву доступной и комфортной для всех гостей, учитывая их нужды и желания. Инновации и качество обслуживания — наш главный приоритет", — прокомментировала начальник Департамента туризма Москвы.
С такими нововведениями Москва продолжает привлекать внимание путешественников со всего мира, предлагая им уникальный опыт и возможность насладиться богатой культурой столицы.
-
@ ee90543f:9363457f
2024-12-26 13:41:1410 апреля — В столичном метрополитене стартовал запуск нового поколения экологически чистых поездов, разработанных с использованием инновационных технологий и альтернативных источников энергии. Эти поезда, работающие на водородных топливных элементах, обещают значительно сократить углеродные выбросы и повысить энергоэффективность системы.
Новая линия, которая соединит центр города с крупнейшими жилыми комплексами на окраинах, будет оснащена современными системами умного управления, которые позволят оптимизировать расписание и минимизировать время ожидания. Каждый поезд оборудован системой рекуперации энергии, что позволит повысить эффективность использования электроэнергии в целом.
По словам руководства Московского метрополитена, запуск этой линии — важный шаг в направлении устойчивого транспорта и улучшения качества воздуха в городе. "Мы стремимся создать комфортные условия для пассажиров и в то же время заботиться об экологии. Новые поезда не только ускорят путешествие по городу, но и сделают его более безопасным и приятным", — отметил директор метрополитена.
Также планируется расширение сети метро за счет новых станций, которые будут представлять собой не только транспортные узлы, но и культурные пространства с выставками, информационными центрами и общественными зонами. По ожиданиям властей, это нововведение привлечет больше жителей и гостей столицы, а также станет еще одной причиной для гордости москвичей.
-
@ ee90543f:9363457f
2024-12-26 13:27:24В условиях стремительного развития технологий значимость так называемых «мягких» навыков, таких как умение общаться, работать в команде и проявлять критическое мышление, значительно возросла. Эксперты отмечают, что сегодня работодатели все больше ценят сотрудников, обладающих развитыми софт-скиллами, способными быстро адаптироваться к изменениям и предлагать нестандартные решения.
Согласно последним исследованиям, образовательные учреждения начали активно внедрять программы, направленные на развитие коммуникативных способностей, эмоционального интеллекта и других важных мягких навыков среди учащихся. Это связано с тем, что традиционные академические знания уже не могут обеспечить выпускникам успешную карьеру без умения эффективно взаимодействовать с коллегами и справляться с различными профессиональными вызовами.
«Интерактивные методы обучения, такие как проектная деятельность, ролевые игры и групповые обсуждения, помогают студентам развивать навыки, необходимые для работы в современных командах», — отмечает Мария Иванова, директор образовательного центра «Прогресс». Она подчеркивает, что такие подходы позволяют учащимся практиковаться в решении реальных задач, что готовит их к конкуренции на рынке труда.
Таким образом, современные учебные заведения трансформируются в площадки для комплексной подготовки будущих профессионалов, где наряду с теоретической базой студенты получают возможность развить важные практические компетенции. Развитие софт-скиллов становится основой для создания конкурентоспособных кадров, готовых успешно интегрироваться в динамичную рабочую среду.
-
@ ee90543f:9363457f
2024-12-26 13:16:4620 июня в Москве были представлены амбициозные архитектурные проекты, которые кардинально изменили облик столицы. В рамках выставки "Город будущего" архитекторы и градостроители продемонстрировали свои шедевры для комфортной городской среды.
Помимо этого одним из ключевых проектов стал "Зеленый пояс Москвы", который захватывает обширные сети парков и зеленых зон, соединяющих различные районы города. Архитекторы уверены, что это не только улучшит качество воздуха, но и создаст новые пространства для отдыха и досуга горожан.
Также на выставке был представлен проект "Умный город", который включает в себя внедрение современных технологий в инфраструктуру. Это позволит оптимизировать транспортные потоки, улучшить систему освещения и повысить уровень безопасности на улицах. Не обошлось и без обсуждения новых жилых комплексов, которые уже начали строиться с учетом принципов устойчивого развития. Архитекторы акцентировали внимание на использовании экологически чистых материалов и энергоэффективных технологий.
Градоначальники и эксперты отметили, что эти проекты не только преобразят Москву, но и сделают ее более удобной для жизни, работы и отдыха. Следите за новостями, чтобы не пропустить дальнейшие обновления о будущем столицы!
-
@ ee90543f:9363457f
2024-12-26 13:04:20В Москве продолжается активное внедрение передовых технологий, которые кардинально меняют повседневную жизнь москвичей. Умные дома, автономный транспорт и цифровые сервисы становятся неотъемлемой частью городской инфраструктуры.
Согласно последним данным, более 80% жилых комплексов в Москве оборудованы системами «умного дома», позволяющими жителям управлять освещением, отоплением и безопасностью через мобильные приложения. Это не только повышает комфорт, но и способствует экономии ресурсов.
Также, автономные электробусы и такси, которые курсируют по улицам города, обеспечивают безопасное и эффективное передвижение. Благодаря интеграции с городской системой управления движением, они минимизируют пробки и сокращают время в пути.
Кроме того, цифровые платформы для взаимодействия с городскими службами становятся всё более популярными. Москвичи могут легко сообщать о проблемах с инфраструктурой, записываться на прием к врачам и получать информацию о культурных событиях через единую мобильную платформу.
Эксперты отмечают, что такие изменения не только улучшают качество жизни, но и делают Москву более устойчивой и экологически чистой.
-
@ ee90543f:9363457f
2024-12-26 12:52:59И вновь столица демонстрирует выдающиеся успехи в области инклюзии, внедряя инновационные подходы и программы, которые делают город доступным для всех его жителей. Местные власти активно работают над созданием среды, в которой каждый человек, независимо от своих возможностей, может полноценно участвовать в жизни общества.
Одним из ключевых направлений является развитие доступного общественного транспорта. Все новые автобусы и трамваи оборудованы специальными местами для людей с ограниченными возможностями. Это позволяет без труда передвигаться по городу и добираться до работы, учебы.
В образовательной сфере столица внедряет инклюзивные программы, которые обеспечивают равные возможности для детей с особыми потребностями. Школы активно сотрудничают с психологами и специалистами, чтобы создать индивидуальные образовательные планы, учитывающие потребности каждого ученика.
Культурные мероприятия также становятся более доступными. Музеи и театры предлагают специальные сеансы с субтитрами и жестовым переводом, что позволяет людям с нарушениями слуха и зрения наслаждаться искусством наравне с остальными.
Городские инициативы по инклюзии не остаются незамеченными. Множество организаций и активистов отмечают, что такие изменения способствуют созданию более сплоченного и дружелюбного общества, где каждый чувствует себя важным и нужным.
-
@ ee90543f:9363457f
2024-12-26 12:52:19В Москве вступил в силу новый стандарт оказания медицинской помощи: С 26 декабря 2040 года в столице России начинает действовать новый стандарт медицинской помощи, который обещает кардинально изменить подход к здравоохранению и улучшить качество жизни москвичей. Персонализированная медицина: новый стандарт включает внедрение передовых технологий и искусственного интеллекта, что позволяет каждому жителю города получать доступ к персонализированной медицине с учетом индивидуальных особенностей организма. Анализ больших данных и генетическое тестирование помогут врачам заранее выявлять риски заболеваний и разрабатывать профилактические меры для каждого пациента. «Умные» медицинские устройства: Одним из ключевых нововведений является использование «умных» медицинских устройств, которые круглосуточно отслеживают состояние здоровья пациентов и передают данные врачам в режиме реального времени. Это позволит оперативно реагировать на изменения в состоянии здоровья и предотвращать серьезные заболевания до их проявления. Расширение возможностей телемедицины: В рамках нового стандарта значительно расширены возможности телемедицины. Теперь консультации с врачами можно получать не только по видеосвязи, но и с использованием голографических технологий, что делает общение более удобным и эффективным. Поддержка психического здоровья: Также в рамках нового стандарта активно развиваются программы поддержки психического здоровья. В каждом районе города открываются специализированные центры, где жители могут получить помощь психологов и психотерапевтов без необходимости долго ждать. По словам мэра Москвы Сергея Собянина, этот шаг стал важным этапом в развитии системы здравоохранения столицы и позволит обеспечить жителей качественными медицинскими услугами на уровне мировых стандартов.
-
@ f3df9bc0:a95119eb
2024-12-26 12:29:35Welcome! 🌱
Interesting places to start: - Latest polished pieces: [[Latest Articles Index]] - Index of all articles by discipline: [[Discipline Index]]
About this site
This site is both a blog & wiki-style digital garden. Some ideas you’ll run into here may be of quality, others will be less interesting, not fully formed, or even just straight wrong. This is intentional. Content here is continuously cultivated and refined as I live my life and gain new experiences, and I welcome challenges to anything I’ve written.
The general idea behind this is that my unstructured thought is fast and divergent, but not coherent, and therefore difficult to use in any practical way. The process of writing is a forcing function for taking divergent thought and bringing it into a form that can be reasoned about, improved upon, or discarded as irrelevant. Stalling this process is counter-productive and can lead to a sort of comatose where the mind is stuck in the abstract, waiting for confidence on a particular strain of thought, but never making any progress.
Therefore there is no set topic for this garden, instead it’s purpose is to serve as an auxiliary brain for any and all topics that I find interesting and worth spending time refining.
Contact
- nostr: slipstream@htlc.io
- farcaster: @htlc
-
@ fd78c37f:a0ec0833
2024-12-26 11:51:07The rise of Bitcoin and cryptocurrencies has not only changed the global financial landscape but also sparked innovation and development in communities worldwide. In particular, Asia, as a hub for technological innovation and economic growth, has seen multiple Bitcoin communities play a key role in driving the adoption and application of digital currencies. From educational programs to technical support, and from business promotion to policy advocacy, Bitcoin communities in Asia are pushing forward the use and development of Bitcoin across various fields. This article will focus on 20 Bitcoin communities in Asia, exploring their latest progress and future visions in promoting Bitcoin technology, education, and economic empowerment. It aims to provide readers with an in-depth perspective on the Asian Bitcoin ecosystem and its global impact. Thank you, YakiHonne nostr:npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q, for supporting the publication of the Bitcoin Community Newsletter. Most of the content has been reviewed and confirmed by the South American communities. If there are any omissions, please feel free to reach out to me.
1.Bitcoin Indonesia * Introduction Bitcoin Indonesia is an international team of 21 Bitcoin enthusiasts dedicated to enabling the people, businesses, and government of Indonesia to easily access and use Bitcoin. The team's mission is to provide reliable Bitcoin information and educational resources to help Indonesians understand the value and potential of Bitcoin, especially in the digital economy. Through monthly meetups, an online education platform, and professional consulting services, Bitcoin Indonesia bridges the gap between individuals, businesses, and the government, connecting them to the world of Bitcoin. The goal is to educate 100 million Indonesians about Bitcoin by 2030, promoting prosperity and freedom for the nation. * Latest Updates Recently, the Bitcoin Indonesia community has been actively organizing a series of events focused on promoting and educating people about Bitcoin. In November, the community hosted the BitDevs Meetup, where they explored tools for planning Bitcoin inheritance. They also launched a Bitcoin price prediction giveaway to encourage user engagement. Additionally, the community successfully completed an online diploma course, certifying 38 local participants. They visited the Taruna Bakti Foundation in Bandung, Indonesia, introducing Bitcoin to 700 middle school students and inspiring them to join the Bitcoin community. Meanwhile, the community is gearing up for the upcoming Team Hackathon in January, where the winning team will receive a prize of 10,000,000 IDR.
2.Righshift nostr:npub1ejn774qahqmgjsfajawy7634unk88y26yktvwuzp9kfgdeejx9mqdm97a5 * Introduction Right Shift is a community dedicated to becoming a hub for Bitcoin-related content and discussions. Its mission is to support the growing Thai Bitcoin community by curating and translating high-quality Bitcoin content, providing essential insights and knowledge for navigating the world of hard money. In addition to educational resources, Right Shift offers a curated selection of Bitcoin merchandise and plans to develop more impactful learning experiences in the future. As Bitcoin matures and evolves, the community is committed to driving Bitcoin adoption and a circular economy through its products and marketplace. * Latest Updates Recently, the Right Shift community has been actively promoting Bitcoin education and awareness through the #Siamstr initiative. They organized various live streams, discussions, and offline meetups in Thailand, such as the "Right Talk" series and the Korat101 gathering, focusing on Bitcoin philosophy, the "Value for Value" (V4V) concept, and utilizing platforms like Nostr to support Bitcoin creators. Additionally, the community has participated in several collaborative projects, developing Bitcoin-related tools such as savings devices and information relay services.
3.Neutronpay * Introduction Neutronpay is a community focused on empowering businesses and individuals through the use of the Lightning Network to enable borderless, open global finance. With cutting-edge technology, Neutronpay facilitates near-instant transactions, creating a real-time financial ecosystem that operates anywhere, anytime. The platform strives to make the Lightning Network accessible to everyone, from small business owners in rural Vietnam to multinational companies in New York. By eliminating barriers such as currency conversion, transaction fees, and time delays, Neutronpay transforms money into a bridge connecting people, businesses, and ideas. * Latest Updates Recently, Neutronpay has been actively expanding its Bitcoin and Lightning Network services, particularly in the Asia-Pacific region. They announced a strategic partnership with BitGo Singapore to further broaden their offerings. Neutronpay also expanded its payout capabilities to 16 countries, enabling fast and secure Lightning Payments conversion into local currencies. Additionally, they participated in the 2024 Vietnam Tech Impact event, showcasing their innovations in fintech and blockchain applications. These efforts demonstrate Neutronpay's commitment to enabling seamless financial transactions for businesses and consumers through the Lightning Network.
4.Tokyo citadel * Introduction Tokyo Citadel is a community built around the vision of creating a sovereign space for Bitcoin holders to thrive. Inspired by the idea of Bitcoin as a defense against economic collapse and societal unrest, the community aims to gather and educate new Bitcoin users in Tokyo. The concept draws from the notion that Bitcoin can serve as a protective barrier against inflation, government overreach, and authoritarian regimes. * Latest Updates Recently, the Tokyo Citadel community released several new podcast episodes covering topics such as Bitcoin, macroeconomics, and politics. They discussed subjects like “Meaningless Meetups in Mexico” and “The Ghost of Abe Will Pump Our Bags,” encouraging further discussion about the future of Bitcoin and global economics. Additionally, the community has been actively engaging with members through their Telegram discussion group, fostering exchanges on Bitcoin and related political and economic topics, while continuing to promote Bitcoin education and community building.
5.Bitcoin Beach Vietnam * Introduction Bitcoin Beach Vietnam is inspired by the Bitcoin Beach initiative in El Salvador, aiming to create a Bitcoin-friendly ecosystem in Vietnam. Powered by the Neutronpay Bitcoin Lightning app, it offers seamless VND on/off ramps for easy Bitcoin transactions. * Latest Updates Recently, there have been no new updates from the community. The latest event dates back to May 2024, when the Bitcoin Beach Vietnam community highlighted the impressive quality of Vietnamese products and their growing demand globally.
6.BOB space nostr:npub1j580xmzqdvqp8rsv04m562kkvfj6yvp226m97yc88q72cxekucesamh4up * Introduction BOB Space is a Bitcoin-focused incubator, coworking space, and hub located in the heart of Krung Thep, Thailand. The community supports Bitcoin education, adoption, and the advocacy of free technology. With a mission to foster innovation, BOB Space hosts a developer residency program aimed at empowering Bitcoin ecosystem developers. Weekly Bitcoin workshops, groundbreaking innovation talks, and technical events such as Bitdevs are organized to bring together like-minded individuals. Additionally, BOB Radio features discussions with Bitcoin builders from around the world, offering valuable insights into the ecosystem. * Latest Updates Recently, the BOB Space community hosted the 4Q2024 BitDevs event at the Bitcoin Learning Center in Chiang Mai, Thailand. The event featured a Socratic-style seminar, delving deep into Bitcoin scaling, with a particular focus on the applications, risks, and future developments of the Ark protocol. In addition, the community shared updates on Bitcoin developer meetups, including the event held in Chiang Mai, as well as a donation to the Bitcoin Development Fund.
7.The Bitcoin Learning Center nostr:npub1c9r9lad84kpqwnh09u58vdzwnfsnxcr7a40uf5ulkpdguq4667jsgaxu4k * Introduction The Bitcoin Learning Center in Chiang Mai is a leading educational hub, co-founded in 2022 by Jimmy Kostro and Napatsanun Chatchayaladasiri (Fai). The center is dedicated to promoting financial inclusion through Bitcoin and creating sustainable economic opportunities for underserved communities in northern Thailand. As a core program of the Kostro Foundation, the center focuses on Bitcoin-centered education, research, and infrastructure development to drive real-world impact. Its mission is to provide communities with the knowledge and tools needed to achieve economic independence through the transformative power of Bitcoin. * Latest Updates Recently, the community has been actively promoting Bitcoin-related projects with a strong focus on technical support and community engagement. A Bitcoin Christmas Party was held at the Bitcoin Learning Center in Chiang Mai to strengthen connections among Bitcoin users in the region. Additionally, in collaboration with BOB Space, the community donated Bitcoin mining machines to a remote solar-powered village in northern Thailand, helping local residents transform surplus energy into a source of income. Furthermore, the community organized a high-level Bitcoin meetup, bringing together 50 experienced Bitcoin enthusiasts from over 10 countries for in-depth discussions.
8.Bitcoiner Malaysia nostr:npub1x42vvsc96wcnnea38y7390hhgs7f6t8hk4rm08pwtt7stlav9avsv7j5rm * Introduction Bitcoin Malaysia is a pioneer in the country's Bitcoin space, established in 2012, dedicated to educating the public about Bitcoin and its applications through various events and resources. The community regularly hosts workshops, meetups, and both online and offline activities, offering opportunities for beginners and professionals to deepen their understanding. Additionally, it focuses on promoting blockchain technology locally, fostering a platform for knowledge sharing and collaborative innovation. * Latest Updates Recently, the Bitcoiner Malaysia community has been actively promoting Bitcoin education and fostering community engagement. On October 25th, they hosted their monthly meetup at My Espresso Café, where participants used the Lightning Network to purchase coffee or beer, connected with fellow Bitcoin enthusiasts, and explored ways Bitcoin can address societal challenges. Additionally, the community organized a Q&A session featuring renowned Bitcoin experts Saifedean Ammous and Stephan Livera. The discussion delved into key topics such as the comparison between fiat currency and Bitcoin, Bitcoin's role in the global economy, scalability, and lending within the Bitcoin ecosystem.
9.Bitcoin Association of Hong Kong * Introduction The Bitcoin Association of Hong Kong (BAHK), established in the summer of 2012, is dedicated to promoting and advancing Bitcoin and its related technologies in Hong Kong. The association’s mission is to educate the public, the private sector, and government entities about the benefits and risks of Bitcoin, becoming a reliable resource for the local and international Bitcoin communities. Over the years, BAHK has hosted more than 250 events and has built a network of over 5,000 members, including experts from over 30 countries. The association regularly organizes meetups, workshops, and online events to foster collaboration and interaction among Bitcoin enthusiasts and professionals. * Latest Updates Recently, the Bitcoin Association of Hong Kong has been actively promoting Bitcoin and cryptocurrency-related topics. They hosted a Bitcoin meetup on November 21, attracting Bitcoin enthusiasts and developers who engaged in discussions about cryptocurrency and its applications while splitting bills using Bitcoin or the Lightning Network. The association has also focused on significant developments such as the attitudes of central banks toward Bitcoin, the Hong Kong government's licensing of cryptocurrency exchanges, and the reaction of Chinese funds to the Bitcoin boom.
10.Bitcoin Embassy Tel Aviv * Introduction Bitcoin Embassy TLV is a grassroots initiative aimed at providing a space for the community and Bitcoin enthusiasts to engage in discussions about decentralized digital currencies. The embassy organizes various events and projects to foster collaboration and knowledge sharing. Founded by Ayal Segev, a core member of the Israeli Bitcoin community, the embassy also involves participants such as programmer and security expert Gil Assayag, and Bitcoin promoter Assaf Bahat. The embassy's mission is to encourage exploration and innovation in the cryptocurrency space. * Latest Updates Recently, the Bitcoin Embassy has been active with various events and updates. On December 8th, they successfully hosted a celebration in Tel Aviv to mark their 11th anniversary, featuring balloons, music, and cake, which brought together many community members in a festive atmosphere. Additionally, the community shared updates about its white paper, which was released on October 31st, showcasing its ongoing efforts to promote interaction and knowledge-sharing within the Bitcoin community.
11.Bitcoin Harbour nostr:npub1aj4z0w4v5ggv8kl6kde5lsqw2jpca296gd60ns3ys9vlwpahx9qqktn9an * Introduction Bitcoin Harbour is located in Princess Harbour, Johor, Malaysia, just a stone's throw from Singapore, strategically positioned in Southeast Asia. Guided by the principles of low time preference and proof of work, the community is dedicated to creating an inclusive Bitcoin coastal hub—a perfect setting for life, work, and family. * Latest Updates Recently, there have been no new updates from the community. The latest event dates back to Aug 2024, an event announcement has been posted for the community's monthly meetup on September 27 at Restoran Arab Zaatar in Puteri Harbour, Johor, Malaysia. The theme is “Post-Summer Meetup,” offering Bitcoin enthusiasts a chance to connect and engage.
12.Bitcoin Island Philippines * Introduction Bitcoin Island is a community based in Boracay, Philippines, dedicated to promoting the adoption of Bitcoin and the Lightning Network in the local area. The community's core mission is to encourage merchants to accept Bitcoin payments, creating a Bitcoin-based economic ecosystem that allows residents and visitors to enjoy fast, secure, and low-cost payment experiences. * Latest Updates Recently, the community has shared one update,posted featuring a promotional tagline from Pouch.ph,Empowering the Philippines through Bitcoin: Secure, Trusted, and Principled.
13.Bitcoin Powerhouse Phuket * Introduction Bitcoin Powerhouse Phuket is a Bitcoin community based in Phuket, Thailand, dedicated to promoting the application and education of Bitcoin in the local area. The community regularly hosts meetups and events, inviting both Bitcoin enthusiasts and newcomers to engage, share experiences, and exchange insights. * Latest Updates Recently, there have been no new updates from the community. The latest event dates back to Aug 2024, when they announced the 11th Bitcoin meetup in Phuket, scheduled for September 10 at Nakarin in Kathu.
14.Bitcoin Saigon nostr:npub192chqkpxm7lfrgufmfd9a9lj7u54078zdzgtvtgz4yg7smz0e7wqzfswzg * Introduction Bitcoin Saigon was founded by Diana Ngo, Khoa Tran, and Dominik Weil. The community has hosted over 100 events and meetups, bringing together Bitcoin enthusiasts, developers, researchers, and investors. Bitcoin Saigon aims to build a strong local network of Bitcoin supporters, businesses, and developers, fostering education, innovation, and creating job opportunities in the Bitcoin ecosystem. * Latest Updates Recently, Bitcoin Saigon has been actively preparing for the Satoshi Flea Market - Christmas Edition, set to take place in Saigon on December 8, and is calling for donations in the form of sats for the event. The community is also focusing on the first Bitcoin meetup in Hanoi on December 11, where topics on Bitcoin and Austrian economics will be discussed.
15.Dubai Citadel * Introduction Dubai Citadel is a Bitcoin-only community in the UAE, focused on promoting Bitcoin adoption and fostering a strong, decentralized ecosystem. With Dubai's growing role as a hub for cryptocurrency innovation, the community aims to connect Bitcoin enthusiasts, developers, and investors. * Latest Updates Recently, there have been no new updates from the community.The latest event dates back to Oct 2024, when it was shared that the UAE has removed the VAT on #Bitcoin transfers and exchanges.
16.Seoul Bitcoin Meetup * Introduction Seoul Bitcoin is a community that hosts monthly Bitcoin meetups, offering education and technical support, especially for beginners. The meetups are organized by volunteers and focus on Bitcoin technology rather than trading or investing, aiming to share enthusiasm and knowledge about Bitcoin. In addition to regular meetups, the community conducts educational activities via platforms like YouTube, Twitter, Facebook, and Kakaotalk, and provides weekly technical meetups for those interested in a deeper understanding. * Latest Updates Recently,there have been no new updates from the community.The latest event dates back to may 2024, when it was announced that the Utreexo test version was released on GitHub, and the publisher mentioned syncing their archive node on a Raspberry Pi 0 .
17.NZBitcoiners nostr:npub1dtvk6tcay9drd7n7x25vl3h30eu6e590qwlysyan03pepvglc7jsupqwt2 * Introduction NZBitcoiners, after being banned from all crypto/blockchain groups in New Zealand, started a few Bitcoin-only groups to create a focused space for Bitcoin education and community building. These groups aim to foster meaningful discussions, share knowledge, and support the growth of the Bitcoin ecosystem in New Zealand, free from the distractions of other cryptocurrencies. * Latest Updates Recently, NZBitcoiners has been actively involved in organizing events and discussions related to Bitcoin and local governance. The community promoted the upcoming “Business Blueprint” event in Auckland and plans to participate in Bitcoin Week discussions scheduled for February next year. Additionally, they engaged in promoting local meetups, including gatherings at venues like Urbanaut Brewing Co. in Auckland, and continued to share thoughts on New Zealand's political landscape and the importance of Bitcoin for financial sovereignty.
18.Melbourne Bitcoin Only * Introduction Melbourne Bitcoin Only is a community focused solely on Bitcoin, excluding altcoins, ICOs, or “blockchain projects.” It aims to provide a space for learning and discussing Bitcoin-related topics. Whether you are a beginner or an experienced participant, the community is dedicated to education and fostering discussions about Bitcoin's technology, principles, and its role in the financial ecosystem. * Latest Updates Recently, there have been no new updates from the community. The latest event dates back to August 2023, when a post was shared about the Bitcoin Jungle Carnival held at the RSL Hall in Murrurundi.
19.Bitkiwi * Introduction Bitkiwi is New Zealand's leading Bitcoin community, publishing The Bitkiwi Brief to provide subscribers with the latest Bitcoin news and analysis. Their mission is to promote the adoption and understanding of Bitcoin in New Zealand, helping community members gain a deeper understanding of Bitcoin's technological, economic, and social impacts. * Latest Updates Recently, the Bitkiwi community has been releasing several editions of the Bitkiwi Brief, offering a New Zealand perspective on the latest Bitcoin news. They have also explored Bitcoin-related books, nostr:npub1trr5r2nrpsk6xkjk5a7p6pfcryyt6yzsflwjmz6r7uj7lfkjxxtq78hdpu Check Your Financial Privilege, and shared updates on #BitkiwiXII. Additionally, Bitkiwi provided in-depth analysis on Bitcoin's value and the impact of currency devaluation, while continuing to promote the revolutionary ideas of Bitcoin, emphasizing its equality and decentralization.
20.Bitcoin Sydney * Introduction Bitcoin Sydney is a vibrant community focused on bringing together Bitcoin enthusiasts through talks, educational events, and social meetups. Monthly Bitcoin-themed talks feature industry experts, while regular “After Work Drinks” offer informal networking opportunities. The community also hosts online “Socratic Seminars” with renowned Bitcoin developers for in-depth discussions. Whether you're a beginner or an experienced participant, Bitcoin Sydney provides a platform for learning, sharing, and connecting. * Latest Updates Recently, the community has shared an update, which hosted a Q&A session with local legends nostr:npub1qh5sal68c8swet6ut0w5evjmj6vnw29x3k967h7atn45unzjyeyq6ceh9r, nostr:npub1nul4qg8he2dyn3hsyk4a3vcr963vakskyjp43yv9dy7j9frd7yhqh28x3m, and discussed the impact of a Bitcoin-supportive White House and the resulting bull market.
-
@ 16d11430:61640947
2024-12-26 11:31:05For centuries, financial markets have been shackled by an archaic mindset rooted in Newtonian physics: "What goes up must come down." This belief has dominated the thinking of old-school fiat economists, who view the rise and fall of markets as a natural cycle of gravity-bound economics. But Bitcoin, the digital phoenix, was designed to defy this outdated paradigm. It isn't just an asset class or a currency—it's a revolution in financial physics, unshackling value from centralized control and rewriting the rules of money.
The Fiat Fallacy: Gravity Economics
Fiat systems are inherently cyclical, prone to inflation, manipulation, and collapse. Central banks print money endlessly, causing value to "come down" as purchasing power erodes. For fiat thinkers, this is unavoidable—a gravitational force they accept as immutable. Yet this mindset ignores Bitcoin’s game-changing properties: its hard cap of 21 million coins, decentralized consensus, and permissionless architecture.
Bitcoin is fundamentally non-Newtonian. It doesn’t adhere to traditional financial laws because it isn't bound by the same forces of supply and control. Instead, it operates in a new paradigm: deflationary, transparent, and immune to political meddling.
Bitcoin's Escape Velocity
Bitcoin's dominance lies in its ability to achieve escape velocity. Unlike fiat currencies, which are constantly being pulled back by inflationary policies, Bitcoin is propelled by its scarcity, adoption, and network effects. Every halving event tightens the supply, creating an upward pressure that fiat systems can't replicate. And as global trust in traditional systems erodes, Bitcoin's gravitational pull grows stronger.
This phenomenon is evident in the adoption curve. Institutions, governments, and individuals worldwide are recognizing Bitcoin as a superior store of value, an inflation hedge, and the ultimate form of financial sovereignty. The more participants enter the network, the more its value compounds, creating a virtuous cycle of exponential growth.
Humiliating the Old Guard
The fiat establishment—steeped in centuries of centralized control—has long dismissed Bitcoin as a bubble, a fad, or even a Ponzi scheme. Yet, year after year, Bitcoin rises from the ashes of their predictions. Its resilience, transparency, and provable scarcity expose the fragility and corruption of fiat systems.
The ultimate humiliation for fiat thinkers is Bitcoin's ability to thrive in crises. Where traditional systems falter—be it through hyperinflation, bank failures, or geopolitical instability—Bitcoin becomes a lifeboat. It doesn’t just resist gravity; it flips the entire script. Fiat currencies are revealed as infinite-print illusions, while Bitcoin’s immutable ledger stands as the ultimate arbiter of truth and value.
A New Financial Paradigm
Bitcoin’s ascent is not merely about price; it’s about domination. It represents a shift from centralized control to individual empowerment, from opaque systems to transparent protocols, from inflationary theft to deflationary savings. It’s a financial singularity, an escape from the gravitational pull of outdated thinking.
As Bitcoin continues its trajectory, the old world of "what goes up must come down" will look increasingly absurd. In its place, a new principle will reign: what’s decentralized cannot be stopped. Bitcoin isn’t just leaving Earth’s orbit; it’s becoming the financial universe’s North Star.
So buckle up, because Bitcoin isn’t just going up—it’s transcending. And as it does, it will leave the Newtonian thinkers in the dust, staring in disbelief at the rocket that left them behind.
-
@ c5fede3d:16e03f7b
2024-12-26 11:30:39Se acaba 2024 y el año nuevo asoma, es hora de hacer valoraciones y rendir cuentas. ¿Has cumplido los própositos que te marcaste al iniciar el año? ¿Éxito rotundo o fracaso estrepitoso? En el mundo de las criptomonedas, desde luego, que no hay término medio. Ya lo dicen muchos, o Lambo o Puente. ¿Y tú, en qué lado estás?
En esta serie de artículos semanales iré actualizando mi visión sobre el mundo crypto. Concretamente aportaré unas cuantas pinceladas sobre, lo que considero, el portafolio ideal. Las criptomonedas, con sus más y sus menos, han supuesto una revolución en el mundo de las finanzas. Aunque en sus inicios eran vistas como un arma revolucionaria, ahora, con la entrada del gran capital, se ha tratado de institucionalizarlas y ponerlas al servicio del poder global. Que no os engañen, el principal logro ha sido la descentralización de las finanzas, la socialización de la economía particular, la entrega de las llaves de la caja fuerte a su titular, y la consiguiente pérdida de fuerza de los custodios, usureros y demás calaña.
EL PRIMER PASO🚶
Teniendo las ideas claras, es hora de ir estructurando la cartera. Esta es la parte más importante, porque aquí no se empieza la casa por el tejado, en este artículo estamos en la fase de adquisición del terreno, aún falta por llamar a Manolo y Benito para que empiecen con la faena.
Lo primero que tienes que hacer es mirarte al espejo y definirte qué tipo de inversor quieres ser. ¿Vas a hacer muchas transacciones buscando el pelotazo del año entrando de lleno en el mundillo? ¿O prefieres comprar alguna moneda sin interactuar con nada y nadie y a esperar a que suba? Tengo un artículo que habla de ello. Una vez sepas quién eres, debes elegir tu billetera electrónica de confianza, la que siempre te acompañará. Aquí tienes dos opciones, las billeteras calientes y las frías. ¿Diferencias? Aquí te dejo una tabla comparativa generada por Perplexity AI.
En resumidas cuentas, la billetera fría es para guardar activos y no tocarlos, como si fuera una reserva de oro, sin interactuar con nada ni con nadie. Además, es un dispositivo, un hardware físico donde tú serás el custodio. Ese es su propósito principal y único. Mi recomendación es la billetera de Keystone o la de BitBox. Por otra parte está la billetera caliente, mi preferida, pues con ella tienes la libertad para hacer lo que te venga en gana, es el ticket de entrada al mundo crypto, y además completamente gratuito. Aquí va una recomendación más personalizada, y es que da más seguridad operar con billeteras calientes vinculadas a una red concreta. Ya lo irás viendo, de entrada, lo ideal es tener Rabby wallet como extensión de navegador web y Safepal como app móvil.
GUARDA TU CLAVE PRIVADA 🔐
El momento más importante. Esta es la gran diferencia entre las finanzas tradicionales y la nueva economía. No me detendré en aspectos técnicos relacionados con la tokenización de las finanzas, los contratos inteligentes y demás parafernalia del estilo, lo principal es que entiendas que eres el custodio de tu cuenta billetera, que el banco ha quedado obsoleto y no tienes que delegar ante nadie. Por tanto, eres quien debe garantizar la seguridad de tus activos. ¿Cómo hacerlo? Tienes varios métodos.
Al crear la billetera te habrá pedido que introduzcas una contraseña, que te valdrá para acceder a la extensión, o tu huella biométrica para entrar en la app móvil. Pues esa contraseña es el primer candado de la puerta, queda el más importante, la frase semilla, o como me gusta llamarla, la llave maestra. Atiende a esta definición:
Una frase semilla, también conocida como frase de recuperación o frase mnemotécnica, es un conjunto de palabras que se utiliza como clave para acceder y recuperar una billetera de criptomonedas. Generalmente, consta de entre 12 a 24 palabras generadas aleatoriamente durante la configuración de la billetera.
Es absolutamente indispensable que guardes a buen recaudo tu frase semilla y no la compartas a nadie. Apúntala en un papel o ingéniatelas para guardarla, siempre offline. Se usa principalmente para recuperar la billetera o migrarla a otro dispositivo. No se utiliza para loguearte en sitios, ni tampoco para compartir tu dirección.
UN VISTAZO A LA WALLET 💳
Teniendo claro esto, adjunto un esquema sobre los aspectos básicos de una billetera, en esto caso SUI Wallet. Elaborado por el usuario de X, Fosky68.
Quédate con estos puntos fundamentales:
- La dirección que suele empezar por 0x y una barbaridad de números es tu clave pública. Con ella recibirás fondos y la compartirás a webs y demás usuarios. También puedes adquirir una identidad que enmascara esa dirección, por ejemplo (perico.eth) a través del servicio ENS.
- El portafolio es donde tienes las monedas que has ido adquiriendo. ¿Quieres intercambiar una moneda por otra? Eso se llama swap. Ya lo irás viendo.
- Las redes soportadas, son lo que se conocen como Blockchain, las monedas pueden alojarse en múltiples redes, cada una con sus reglas y sus comisiones de uso, puedes encontrarte $ETH en redes como Optimism, Base o la propia red de ETH. Por eso es fundamental comprobar qué red vas a utilizar, o en que red está alojada la moneda si vas a realizar una operación. ¿Puedes cambiar la moneda entre redes distintas? Sí, se llama hacer un bridge. Pronto, sabrás más de ello.
- Podrás encontrarte otras funciones adicionales, como un historial de transacciones donde habrá un registro de todas las operaciones que has realizado, o el apartado DeFi (Finanzas Descentralizadas) donde te ofrecerán todas las herramientas para operar y verás el estado de tus inversiones.
Teniendo estas nociones básicas, he de felicitarte. Enhorabuena, ya has construido los cimientos de la casa. En el próximo artículo de Semanario Crypto, aprenderás a sortear obstáculos para fondear tu billetera, a cruzar la línea que separa al mundo real del virtual, a ser parte del nuevo orden. Bienvenido al mundo crypto.
Descargo de responsabilidad: Toda la información compartida forma parte de mi visión personal y no tiene como objetivo asesorar financieramente. Doy información, no consejos de inversión.
-
@ e356a30c:11e846f7
2024-12-26 10:51:43Bitcoin's performance during the Christmas season has been a mixed bag, with both Santa Claus rallies and Grinch-like plunges. While the cryptocurrency's volatility can be attributed to various factors, including global economic conditions and regulatory developments, historical data reveals some interesting trends.
During bullish market cycles, Bitcoin has often experienced a "Santa Claus rally" in the weeks leading up to and following Christmas. This phenomenon is characterized by increased buying activity and a surge in prices, potentially driven by holiday bonuses and a general sense of optimism. For instance, in 2020, Bitcoin surged by a remarkable 25.63% during the 52nd week, coinciding with the Christmas period.
However, bear markets have historically brought notable price declines for Bitcoin during the festive season. Reduced trading volume and increased volatility due to holiday-related market closures can exacerbate price swings. In 2022, for example, Bitcoin experienced a significant decline during the Christmas period, mirroring the broader crypto market downturn.
Looking ahead, analysts are cautiously optimistic about Bitcoin's prospects during the upcoming Christmas season. While the cryptocurrency's price remains susceptible to market fluctuations, a combination of positive regulatory developments and a potential economic recovery could fuel a Santa Claus rally. However, the ongoing bear market and geopolitical uncertainties pose significant challenges.
Ultimately, Bitcoin's performance during the Christmas season is contingent on a confluence of factors. While historical trends offer valuable insights, it is crucial to exercise caution and conduct thorough research before making any investment decisions.
bitcoin #Naija
-
@ 88cc134b:5ae99079
2024-12-26 10:40:52Hello 1
Hello 2
Hello 3
Hello 4
Hello 5
Hello 6
This is a test by nostr:npub13rxpxjc6vh65aay2eswlxejsv0f7530sf64c4arydetpckhfjpustsjeaf that is testing various interoperability of the markdown rendering and NOSTR specific synatx, just to make sure they play nice.
nostr:npub13rxpxjc6vh65aay2eswlxejsv0f7530sf64c4arydetpckhfjpustsjeaf
npub13rxpxjc6vh65aay2eswlxejsv0f7530sf64c4arydetpckhfjpustsjeaf
nostr:npub13rxpxjc6vh65aay2eswlxejsv0f7530sf64c4arydetpckhfjpustsjeaf
here is a link to somewhere so as to see how it would render and here it is bare-bone https://duckduckgo.com/ just to make sure it is nicely parsed.
here is a mention of another article nostr:naddr1qvzqqqr4gupzpzxvzd935e04fm6g4nqa7dn9qc7nafzlqn4t3t6xgmjkr3dwnyreqqxnzde38qmnsdfk8qmrqwp405km0k and here is a short note: nostr:note1vnqnwzjllzxxufg5e9thz2xspetlplsjq0cn570jswujnmynxjnqmea576
and another one: nostr:note1kyrnyan4hfpn978akv2eqsv8r7rlplaq4j65uxlk3hz5ujk7ehzshwtfmd
and one more foe good mesure: nostr:note1dyrd05nt0tapgye3xn4nssfdasskfr3dm2yqz8e8vdtslpgw3ypsa8e7fh
one like this: note1dyrd05nt0tapgye3xn4nssfdasskfr3dm2yqz8e8vdtslpgw3ypsa8e7fh
here is an event: nostr:nevent1qqsg39vpzl4dz8kwnaerheuavgtqgg6exc4caz8argh6p6jqg549ppqprdmhxue69uhhyetvv9ujuam9wd6x2unwvf6xxtnrdakj7hknh7l
Images
and here is one in the middle of the text
that continues right after. Just to see how this will render
Some markdown stuff
Emphasis
This is bold text
This is bold text
This is italic text
This is italic text
~~Strikethrough~~
Blockquotes
Blockquotes can also be nested...
...by using additional greater-than signs right next to each other...
...or with spaces between arrows.
Lists
Unordered
- Create a list by starting a line with
+
,-
, or*
- Sub-lists are made by indenting 2 spaces:
- Marker character change forces new list start:
- Ac tristique libero volutpat at
- Facilisis in pretium nisl aliquet
- Nulla volutpat aliquam velit
- Very easy!
Ordered
- Lorem ipsum dolor sit amet
- Consectetur adipiscing elit
-
Integer molestie lorem at massa
-
You can use sequential numbers...
- ...or keep all the numbers as
1.
Start numbering with offset:
- foo
- bar
Code
Inline
code
Indented code
// Some comments line 1 of code line 2 of code line 3 of code
Block code "fences"
Sample text here...
Syntax highlighting
js var foo = function (bar) { return bar++; }; var veryVeryVeryLongVariableNameWithALongValueAsWell = 123456789012345678901234567890; console.log(foo(5));
Tables
| Option | Description | | ------ | ----------- | | data | path to data files to supply the data that will be passed into templates. | | engine | engine to be used for processing templates. Handlebars is the default. | | ext | extension to be used for dest files. |
Right aligned columns
| Option | Description | | ------:| -----------:| | data | path to data files to supply the data that will be passed into templates. | | engine | engine to be used for processing templates. Handlebars is the default. | | ext | extension to be used for dest files. |
[Footnotes]
Footnote 1 link[^first].
Footnote 2 link[^second].
Duplicated footnote reference[^second].
[^first]: Footnote can have markup
and multiple paragraphs.
[^second]: Footnote text.
- Create a list by starting a line with
-
@ 84b0c46a:417782f5
2024-12-26 10:28:26- lumilumi The Nostr Web Client.
Lightweight modes are available, such as not displaying icon images, not loading images automatically, etc.
Follow List ( kind3 ) organization tool.
- NAKE NIP-19, NIP-49 Encode/Decode Tool
- chrome extension
- firefox add-on
- nostviewstr
Addressable or Replaceable Event Editor ( いろんなリストエディター )
Addressable or Replaceable Event Recovery tool ( いろいろリカバリーツール )
Bookmark event ( kind:10003,30001,30003 ) recovery tool ( ぶくま復活させたいやつ )
プロフィールを編集するやつ - nostr-bookmark-viewer
Bookmark event ( kind:10003,30001,30003 ) Editor ( ぶっくまーくをみるやつ )
Broadcast an event from relay to relay ( イベントをブロードキャストするやつ )
-
@ 79a7270b:d61d9067
2024-12-26 09:16:59Fifteen years after its creation, Bitcoin continues to break paradigms and solidify its role in the global economic landscape. In 2021, El Salvador adopted it as legal tender, marking a significant turning point. Three years later, its acceptance has advanced considerably, with Wall Street embracing Bitcoin ETFs and U.S. political debates focusing on its adoption as a strategic reserve.
With its portability, scarcity, accessibility, and liquidity in a 24/7 open market, Bitcoin distinguishes itself as an asset that transcends the limitations of traditional resources like gold and oil. Unlike these assets, which often face logistical challenges and market constraints, Bitcoin’s digital nature allows for seamless global transactions without physical barriers. Its scarcity mirrors that of gold, preserving its value over time, while its accessibility and round-the-clock liquidity make it an appealing choice for investors and policymakers alike. This unique combination of attributes positions Bitcoin as a versatile and strategic tool, increasingly relevant to advancing national interests in a rapidly digitizing world.
The expansion of the BRICS block, whose combined GDP now surpasses that of the G7, has heightened pressures on Western hegemony. These countries are exploring Bitcoin as a neutral and government-independent currency. They are considering denominating international transactions in Bitcoin as part of their broader goal: to create a de-dollarized, independent financial system resilient to Western-imposed sanctions.
Game theory sheds light on how Bitcoin adoption creates powerful incentives for nations. If the BRICS use Bitcoin as a strategic asset, Western nations would be compelled to accumulate it to influence the market and counteract sanctions circumvention, making Bitcoin critical for national security. In a scenario where major powers hold Bitcoin, it would be unfeasible to remain competitive without it.
This logic extends to Bitcoin mining, the process that validates transactions. By deciding what is confirmed, nations dominating mining operations gain significant influence over transaction flows. Consequently, Bitcoin-accumulating countries will prioritize investing in domestic mining infrastructure, enhancing the network's decentralization and security. For instance, Russia reportedly funds regional initiatives to develop AI and Bitcoin mining infrastructure within the BRICS framework through its Sovereign Wealth Fund.
This dynamic triggers a chain reaction: as one nation adopts Bitcoin, others are pressured to follow suit to avoid competitive disadvantages. This cycle embodies the essence of game theory, where each player's choices shape the strategies of others, positioning Bitcoin as a critical asset in the global geopolitical arena.
-
@ fd208ee8:0fd927c1
2024-12-26 07:02:59I just read this, and found it enlightening.
Jung... notes that intelligence can be seen as problem solving at an everyday level..., whereas creativity may represent problem solving for less common issues
Other studies have used metaphor creation as a creativity measure instead of divergent thinking and a spectrum of CHC components instead of just g and have found much higher relationships between creativity and intelligence than past studies
https://www.mdpi.com/2079-3200/3/3/59
I'm unusually intelligent (Who isn't?), but I'm much more creative, than intelligent, and I think that confuses people. The ability to apply intelligence, to solve completely novel problems, on the fly, is something IQ tests don't even claim to measure. They just claim a correlation.
Creativity requires taking wild, mental leaps out into nothingness; simply trusting that your brain will land you safely. And this is why I've been at the forefront of massive innovation, over and over, but never got rich off of it.
I'm a starving autist.
Zaps are the first time I've ever made money directly, for solving novel problems. Companies don't do this because there is a span of time between providing a solution and the solution being implemented, and the person building the implementation (or their boss) receives all the credit for the existence of the solution. At best, you can hope to get pawned off with a small bonus.
Nobody can remember who came up with the solution, originally, and that person might not even be there, anymore, and probably never filed a patent, and may have no idea that their idea has even been built. They just run across it, later, in a tech magazine or museum, and say, "Well, will you look at that! Someone actually went and built it! Isn't that nice!"
Universities at least had the idea of cementing novel solutions in academic papers, but that: 1) only works if you're an academic, and at a university, 2) is an incredibly slow process, not appropriate for a truly innovative field, 3) leads to manifestations of perverse incentives and biased research frameworks, coming from 'publish or perish' policies.
But I think long-form notes and zaps solve for this problem. #Alexandria, especially, is being built to cater to this long-suffering class of chronic underachievers. It leaves a written, public, time-stamped record of Clever Ideas We Have Had.
Because they are clever, the ideas. And we have had them.
-
@ 16d11430:61640947
2024-12-26 05:14:31Throughout history, monumental structures like the Hindu temples of India and the cathedrals of Rome have stood as testaments to their societies' wealth, power, and cultural identity. Yet, their grandeur also tells a more intimate story—that of the immigrant professionals whose skills and labor transcended borders to fuel these marvels. From Indian artisans traveling across Asia to European guildsmen working on Gothic cathedrals, the contributions of immigrants have shaped the shifting poles of economic and cultural productivity.
India: Temples Built by Hands From Afar
Global Trade and the Diaspora (200 BCE–1200 CE) Hindu temples such as those at Khajuraho and Thanjavur were not just spiritual hubs but also centers of economic power. The intricate carvings and towering gopurams were the work of migrant artisans, who brought techniques and styles from distant lands.
Indian merchants and craftsmen, driven by the flourishing trade along the Silk Road and Indian Ocean, carried their skills abroad. They influenced architecture as far as Angkor Wat in Cambodia and Borobudur in Indonesia. The temples in these regions are evidence of the Indian diaspora’s role in spreading not just goods but also cultural and technical expertise.
Immigrants Within India The Chola Empire, for instance, employed skilled Tamil architects and migrant artisans from North India. These professionals created masterpieces like the Brihadeeswarar Temple. Their stories are often lost in history, overshadowed by royal patronage.
Rome and Europe: The Rise of the Cathedrals
From Local Guilds to Cross-Border Collaboration (1000 CE–1500 CE) During Europe’s Gothic and Renaissance periods, monumental cathedrals became symbols of growing urban wealth and religious devotion. Immigrant artisans and professionals played a pivotal role in these projects.
Example: The construction of Florence's Duomo involved Filippo Brunelleschi, whose inspiration came from travels to Rome and study of ancient ruins, but also relied on migrant laborers from Northern Europe.
Guilds in medieval Europe frequently recruited craftsmen from neighboring regions. Stonemasons from France worked on Canterbury Cathedral in England, and German glassmakers brought stained-glass techniques to Italy.
Economic Mobility Through Migration These artisans often traveled for better wages and opportunities, their expertise in demand due to Europe’s growing urban centers. Immigrant professionals thus fueled the architectural and economic revival of medieval Europe.
The Americas: Migrants and Monument Builders
Pre-Columbian Contributions (200 CE–1500 CE) In the Americas, monumental structures like Mayan temples and Inca fortresses were built with the knowledge and labor of diverse ethnic groups within these empires. The movement of professionals across regions—such as engineers, astronomers, and masons—helped unify these civilizations.
Post-Columbian Transformations After the European conquest, immigrant labor shifted dramatically. African slaves and European settlers were forcibly moved or incentivized to migrate. The resulting blending of skills and techniques reshaped the Americas. For instance, Jesuit missionaries employed indigenous and African artisans to build churches that combined European and native designs.
Africa: Trade, Temples, and Immigrant Networks
Architects of Prosperity (700 CE–1600 CE) Timbuktu’s mosques and the Great Zimbabwe ruins demonstrate the influence of immigrant professionals. Goldsmiths, architects, and traders traveled across the Sahara, linking North Africa to Sub-Saharan Africa.
The Malian Empire recruited scholars and architects, such as those from Andalusia, to design mosques like Djinguereber. These immigrants brought innovations in mud-brick construction, a technique that still defines the region's architecture.
Colonial Disruption European colonization led to the displacement of local professionals. African labor was exported, and immigrant expertise was replaced with exploitative systems that extracted resources rather than building cultural or architectural heritage.
Comparative Timeline: Immigrant Contributions Across Regions
Lessons from Immigrant Professionals
-
Adaptation and Fusion Each wave of migration brought new techniques that were adapted to local contexts. Immigrant professionals blended their expertise with local traditions, creating unique architectural styles.
-
Economic Catalysts Migrants were often drawn by economic opportunities. Their contributions not only elevated architecture but also stimulated local economies, from temple town markets to cathedral cities.
-
Disruption and Resilience Colonialism and conquest frequently disrupted these networks. Yet, immigrant professionals often found ways to rebuild and adapt, preserving their skills for future generations.
Modern Reflections
Today, immigrant professionals continue to be the backbone of global productivity. From the tech hubs of Silicon Valley to architectural marvels in Dubai, their stories echo those of the artisans who built Hindu temples, Roman cathedrals, and pre-Columbian pyramids. Understanding their historical impact offers a nuanced appreciation of how migration shapes our world.
References
-
Pollock, S. "The Language of the Gods in the World of Men: Sanskrit, Culture, and Power in Premodern India."
-
Spiro Kostof, "A History of Architecture: Settings and Rituals."
-
Kenneth R. Hall, "Maritime Trade and State Development in Early Southeast Asia."
-
Robert Bork, "The Geometry of Creation: Architectural Drawing and the Dynamics of Gothic Design."
-
Toby Green, "A Fistful of Shells: West Africa from the Rise of the Slave Trade to the Age of Revolution."
-
Charles Mann, "1491: New Revelations of the Americas Before Columbus."
These references provide deeper insights into the interplay of migration, economics, and monumental architecture across centuries.
-
-
@ 50041f6c:cb61480b
2024-12-26 03:40:20Choosing the right carpet for your home is more than just a design decision; it’s an investment in comfort, functionality, and long-term value. Carpets serve as the foundation for your living spaces, providing warmth, style, and a sense of coziness. However, not all carpets are created equal. Factors such as material, durability, and maintenance requirements can significantly impact the performance and lifespan of your carpet. In this guide, we’ll explore how to choose the right carpet based on quality and durability, ensuring it meets both your aesthetic and practical needs.
Understanding Carpet Quality The quality of a carpet is determined by several key factors, each playing a role in its overall appearance, performance, and lifespan. When shopping for a carpet, keep these features in mind:
- Fiber Type The type of fiber used in a carpet is one of the most important indicators of its quality. Common carpet fibers include:
Nylon: Known for its durability, resilience, and stain resistance, nylon is an excellent choice for high-traffic areas. Polyester: This fiber is soft, affordable, and available in a wide range of colors, though it’s less durable than nylon. Olefin (Polypropylene): Resistant to moisture and stains, olefin is a good option for outdoor or basement carpeting but may not hold up well under heavy foot traffic. Wool: A natural and luxurious fiber, wool offers exceptional softness and durability but requires more maintenance and is more expensive than synthetic options. 2. Pile Density Pile density refers to how closely the fibers are stitched together. Denser carpets are typically more durable and resistant to wear. To test pile density, bend the carpet sample; if you can see the backing, the carpet may not be dense enough for high-traffic areas.
-
Twist Level The twist level refers to how tightly the carpet fibers are twisted. Higher twist levels indicate better durability, as the fibers are less likely to unravel or mat over time.
-
Backing and Construction The backing of a carpet provides its foundation and contributes to its stability. High-quality carpets often have a strong backing and use advanced construction techniques to enhance durability.
Choosing the Right Carpet for Your Needs Different areas of your home require carpets with specific qualities to match their function and traffic levels. Here’s how to select the best carpet for each space:
-
Living Room The living room is often a high-traffic area, making durability a top priority. A nylon carpet with a dense pile is a great choice, offering resilience and resistance to stains and wear. Consider neutral tones or patterns that hide dirt and complement your décor.
-
Bedrooms In bedrooms, comfort and softness take precedence. Plush or frieze carpets made from polyester or wool can add a touch of luxury while maintaining a cozy atmosphere. Since bedrooms are typically low-traffic areas, you have more flexibility with fiber choice.
-
Hallways and Stairs Hallways and stairs endure heavy foot traffic and require carpets that can handle wear and tear. Choose a durable, low-pile carpet with a high twist level, such as nylon or olefin. Adding a durable underpad can also extend the life of the carpet in these areas.
-
Basements For basements, moisture resistance is key. Opt for olefin or polyester carpets with a low pile to prevent mold and mildew. Carpets with built-in stain and moisture protection are ideal for these spaces.
Factors That Affect Carpet Durability Durability is a critical factor when choosing a carpet, as it determines how well the carpet will perform over time. Consider these elements:
-
Foot Traffic High-traffic areas require carpets made from resilient fibers like nylon or olefin. Look for carpets labeled as “heavy-duty” or “high-traffic” to ensure they can withstand constant use.
-
Maintenance Requirements Carpets that are easier to clean and maintain tend to last longer. Stain-resistant treatments and fibers that repel dirt can significantly reduce maintenance efforts.
-
Padding The padding underneath the carpet plays a vital role in its durability. High-quality padding absorbs impact, reduces wear, and improves comfort. Always pair your carpet with the right underlay for optimal performance.
-
Sun Exposure If your room receives a lot of natural light, consider fade-resistant carpets. UV-treated fibers can help maintain the carpet’s color over time.
Tips for Evaluating Carpet Quality When shopping for a carpet, use these tips to assess its quality and durability:
Ask for Samples: Bring home carpet samples to test them in your space. Evaluate how they feel underfoot and how they look under your home’s lighting conditions. Check the Warranty: Reputable manufacturers offer warranties that cover wear, stains, and texture retention. A strong warranty is a good indicator of the carpet’s quality. Test Durability: Perform a “rub test” on the sample to see how well the fibers hold up under friction. High-quality carpets will maintain their texture and appearance. Long-Term Care for Your Carpet Even the highest-quality carpet requires proper care to maximize its lifespan. Follow these tips to keep your carpet looking and performing its best:
Vacuum Regularly: Vacuum high-traffic areas at least twice a week to remove dirt and debris that can damage fibers. Clean Spills Immediately: Blot (don’t rub) spills with a clean cloth and use a mild carpet cleaner if needed. Rotate Furniture: Rearrange furniture periodically to prevent uneven wear on your carpet. Schedule Professional Cleaning: Deep cleaning your carpet every 12-18 months helps remove embedded dirt and rejuvenates its appearance. Final Thoughts Choosing the right carpet involves balancing quality, durability, and design to meet the unique needs of your home. By understanding the factors that influence carpet performance and selecting materials suited to each space, you can invest in a carpet that offers comfort, style, and longevity. Whether you prioritize softness for a bedroom or durability for a hallway, this guide ensures you make an informed decision.
-
@ 16d11430:61640947
2024-12-26 03:16:08Setting: Year 3178
In a world where ancient knowledge and advanced technology have fused seamlessly, humanity has perfected the science of temple construction. Drawing from the millennia-old principles of Hindu temple architecture, these structures no longer serve merely as places of worship but as fully functional, living entities capable of manifesting divine beings. These temples are known as Sthapatya-Vimana, powered by an advanced understanding of quantum physics, cosmic geometry, and biotechnological symbiosis.
The narrative unfolds in the sacred temple of Mahashivantara, built over centuries atop an ancient leyline convergence. It is the most advanced Sthapatya-Vimana, designed to bring forth Mahadeva, the cosmic destroyer and transformer. The temple is now ready for its activation ritual, known as the Purna-Laya Yajna—a synthesis of science and spirituality, pushing the boundaries of existence itself.
Prologue: The Activation Begins
The temple glimmers under the twin suns of this distant world, its towering Shikhara humming with an imperceptible frequency, a testament to its quantum-engineered design. The sanctum’s walls, made of an iridescent, metamaterial alloy, vibrate in harmony with the fundamental frequency of the universe—Om. Intricate carvings across the structure aren't just ornamental; they are hyperconductive circuits channeling energy from the leyline matrix beneath.
Inside the temple, Dr. Aditi Vashishta, an astro-spiritual engineer, leads the ritual. She stands at the center of the Pradakshina Patha, surrounded by a team of quantum physicists, bioengineers, and Vedic scholars. They are clad in ceremonial robes integrated with nano-filament technology, designed to synchronize their bioelectric fields with the temple's energy lattice.
Aditi raises her hand, and the room falls silent. A low-frequency hum resonates from the temple core, signaling the alignment of the planetary magnetic field with the galactic center. The ritual has begun.
The Science of the Divine
The temple's design integrates ancient principles with advanced sciences:
-
Quantum Resonance Core: At the heart of the Garbhagriha is a singularity engine—an artificially created micro black hole stabilized within a quantum lattice. It acts as a cosmic anchor, drawing energy from higher dimensions.
-
Biometric Symbiosis: The Mandapa is lined with organic conduits that interact with the biometrics of the ritual participants. Each devotee's heartbeat, brainwave pattern, and bioelectric field amplify the temple's energy flow.
-
Cosmic Harmonics: The temple's structure is calibrated to the Schumann Resonance, creating a standing wave that connects the planet's energy grid to the universal consciousness.
-
Matter Manifestation Matrix: Using a process called quantum decoherence inversion, the temple can collapse higher-dimensional energy patterns into physical reality within the sanctum.
The Ritual: Purna-Laya Yajna
The ritual involves three critical phases:
-
Invocation of the Cosmic Blueprint: Aditi and her team chant ancient mantras encoded with quantum frequencies. These mantras, amplified through the temple's harmonics, establish a connection with the Akashic Field—the universal database of existence.
-
Bioenergetic Synchronization: The participants move in precise patterns around the Pradakshina Patha, their movements creating a dynamic energy field. The temple absorbs this energy, channeling it into the singularity engine.
-
Materialization of the Deity: In the final phase, the temple's quantum resonance core activates, collapsing the higher-dimensional energy signature of Shiva into a physical form.
The Manifestation
As the chant reaches its crescendo, the temple trembles. A radiant beam of light erupts from the Shikhara, piercing the heavens. The singularity engine at the core stabilizes, and within the sanctum, an incandescent figure begins to take shape.
The air is heavy with an indescribable presence. Particles in the temple are rearranging themselves, forming the physical manifestation of Mahadeva. His form is both luminous and solid, an impossible combination of matter and energy. His eyes, twin galaxies of infinite depth, open slowly, casting an omniscient gaze over the assembly.
The deity speaks, his voice resonating across dimensions, “I am here, born of your faith, your science, and your unity. Speak your purpose.”
The Divine Purpose
The world outside has been ravaged by centuries of environmental degradation and conflict. The temple activation is humanity's last hope—a plea to the divine for guidance, transformation, and renewal. Mahadeva listens, his form pulsating with cosmic energy. With a gesture, he sends waves of regenerative energy across the planet, healing ecosystems, and restoring balance.
But the ritual is not without cost. The energy required to manifest Mahadeva has drained the temple's singularity core, destabilizing its structure. The temple begins to disintegrate, its mission complete. The team watches in awe and reverence as Mahadeva ascends, his parting words echoing in their minds: “The divine resides not in temples but in your unity. Carry it forth.”
Epilogue
The activation of the Mahashivantara temple marks a turning point in human history. The world, healed and transformed, no longer needs physical temples to house deities. Instead, humanity learns to channel the divine within themselves, achieving a state of collective enlightenment.
The legacy of the temples lives on, not as structures but as a reminder of the harmony between science, spirituality, and the boundless potential of human ingenuity.
-
-
@ a012dc82:6458a70d
2024-12-26 02:50:10Table Of Content
-
Backdrop of the Appeal
-
The Potential Impact of a Bitcoin ETF
-
Challenges on the Horizon
-
The Broader Implications
-
Conclusions
-
FAQ
Amidst the rapidly evolving landscape of cryptocurrency regulations and financial instruments, Grayscale Investments, a prominent crypto asset manager, has taken a bold step forward. The firm is ardently urging the U.S. Securities and Exchange Commission (SEC) to green-light its proposed exchange-traded fund (ETF) that aims to track Bitcoin, the world's leading cryptocurrency.
Backdrop of the Appeal
The driving force behind Grayscale's proactive appeal to the SEC can be traced back to a landmark court victory they secured against the regulatory body itself. This victory wasn't just a win in legal terms; it symbolized a potential shift in the dynamics between cryptocurrency enterprises and regulatory authorities. Grayscale's triumph in the courtroom not only fortified its standing in the industry but also established a legal precedent. This precedent, while specific to Grayscale's case, has the potential to influence the SEC's perspective and decisions regarding other cryptocurrency-based financial products that may come up for review in the foreseeable future.
The Potential Impact of a Bitcoin ETF
Envision a scenario where a Bitcoin ETF is introduced into the mainstream financial market. Such a development would serve as a transformative bridge, seamlessly connecting the well-established realm of traditional finance with the innovative and ever-evolving domain of cryptocurrencies. The significance of a Bitcoin ETF goes beyond its novelty. It offers investors—both seasoned and novices—a unique opportunity. Instead of navigating the complexities of acquiring and managing Bitcoin directly, they can invest in this ETF, effectively gaining exposure to the cryptocurrency's price fluctuations. This method simplifies the investment process, eliminating the technical intricacies associated with cryptocurrency management. Moreover, the ETF structure brings with it the benefits of regulatory oversight, ensuring that the investment is not only secure but also compliant with established financial norms. This combination of ease, security, and compliance makes a Bitcoin ETF an enticing proposition for a wide spectrum of investors, from individuals to large institutional entities.
Challenges on the Horizon
Grayscale's journey, even after its commendable legal victory, is far from smooth. The path to obtaining the coveted SEC approval for their Bitcoin ETF is strewn with challenges, many of which are deeply rooted in the SEC's historical apprehensions. Over the years, the SEC has consistently showcased a cautious approach when it comes to cryptocurrency-based ETFs. Their hesitance is not without reason. The regulatory body's primary concerns encompass potential market manipulations that could distort the true value of assets, the notorious volatility associated with cryptocurrencies, and the imperative of safeguarding investors from unforeseen risks. These concerns, while valid, are being addressed head-on by Grayscale. The firm remains steadfast in its belief that its proposed Bitcoin ETF not only acknowledges these concerns but also presents solutions to mitigate them. Grayscale's proposal, in their view, lays the groundwork for a Bitcoin ETF that is both secure and operates within the bounds of regulatory standards.
The Broader Implications
The ongoing dialogue between crypto enterprises and regulatory bodies like the SEC is emblematic of the broader challenges and opportunities presented by the integration of cryptocurrencies into mainstream finance. Should the SEC grant its approval to Grayscale's Bitcoin ETF, it could signal a pivotal moment in the crypto industry's journey, heralding greater acceptance and integration of digital assets in global financial markets.
Conclusion
The interplay between Grayscale and the SEC is more than just a singular event; it's indicative of the broader evolution of the financial world in the face of digital disruption. As the crypto industry continues to mature and present structured, secure investment avenues, it's only a matter of time before regulatory bodies, recognizing the potential benefits, become more accommodating. The eventual decision on Grayscale's Bitcoin ETF will undoubtedly have far-reaching implications, not just for the company but for the entire crypto ecosystem.
FAQ
What is Grayscale Investments? Grayscale Investments is a leading crypto asset manager.
What has Grayscale recently proposed to the SEC? Grayscale is urging the SEC to approve its Bitcoin ETF.
Why is Grayscale's recent court victory significant? The court win strengthens Grayscale's position and could influence future cryptocurrency-based financial products.
What benefits does a Bitcoin ETF offer? A Bitcoin ETF allows investors to gain exposure to Bitcoin without directly holding the cryptocurrency, providing a streamlined and secure investment experience.
Has the SEC approved any Bitcoin ETFs in the past? Historically, the SEC has been cautious about approving cryptocurrency-based ETFs due to concerns over market manipulation and investor protection.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 16d11430:61640947
2024-12-26 02:37:26It was a balmy evening in Vanchinadu. Eight-year-old Parvathi sat cross-legged on the floor, rummaging through her great-grandmother’s old wooden chest, uncovering bits of a forgotten world—faded photographs, rusted keys, and weathered textiles. Then, her fingers found something cool and metallic. She pulled out a small coin with a hole punched cleanly through its center.
"Ammaamma, look! What is this?" she asked, running over to her great-grandmother, 92-year-old Lakshmi Amma, who was dozing in her chair by the window.
Lakshmi Amma stirred, her cloudy eyes squinting at the coin in Parvathi’s hand. For a moment, she seemed confused, as though her memories were wrestling with one another. Then recognition lit her face, and she reached out with trembling fingers.
"Ah, the holed pice... such a strange little thing," she murmured, turning the coin over in her palm. "This coin, child, carries a story—not just of money, but of rebellion, genius, and foolishness. Sit, and I’ll tell you."
The British and the Holed Coin
"This coin is from the time of the British Raj," Lakshmi Amma began, her voice steadying as she spoke. "You see, the British wanted to rule not just our land, but every little aspect of our lives—including the coins we used. They thought themselves clever, minting coins with less metal to make them cheaper. That’s why they punched a hole in the center—it saved them money. But what they didn’t realize was how massive India is, or how complicated it would be to manage an empire of this scale."
She chuckled softly, shaking her head.
"They underestimated us, child. They thought India was just another colony to be controlled. But this land is vast and ancient, like a hornets’ nest. The more they tried to tighten their grip, the more resistance they faced."
The Coin in the Time of Rebellion
"This coin, the holed pice, first appeared around 1943. It was supposed to be efficient—light, easy to carry, and cheap to produce. But it became something else entirely. It passed through the hands of farmers refusing to pay British taxes, workers striking in mills, and freedom fighters who marched in defiance during the Quit India Movement of 1942."
Lakshmi Amma’s eyes gleamed, and her voice gained strength.
"The British thought they were being smart, but these coins became symbols of their own failure. The hole they made to save money? It made the coins less valuable to us. People strung them together like necklaces, used them as weights, or tossed them aside in protest. They didn’t care for British currency—they cared for freedom."
A Connection to Earlier Rebellions
"But the story of this coin doesn’t begin in 1943," Lakshmi Amma said, her tone softening. "It stretches back to the rebellions of Kerala. Before the holed pice, there were the coins minted by our own Raja Velayudhan of Vanchinadu during the Spice Rebellion in 1835. He refused to use British rupees, just as our people later refused their taxes."
She paused, her fingers tracing the hole in the coin.
"The British tried to crush Velayudhan’s rebellion by defacing his coins, just like they tried to control us with their holed pice. But this land has always fought back. From Velayudhan to Pazhassi Raja, to the Quit India Movement, every generation has resisted in its own way."
The Coin and the Genius of India
Lakshmi Amma sighed deeply, as though the weight of history rested on her frail shoulders.
"You see, child, the British were geniuses in some ways—they built systems, minted coins, and waged wars to expand their empire. But they didn’t understand India. This land is too vast, its people too diverse, its history too deep. Every attempt to control us only stirred the hornets’ nest."
She smiled faintly, her voice tinged with pride.
"Even this little coin with its hole is proof of their folly. They thought they were saving money, but they couldn’t see the bigger cost. They left in 1947, not because they wanted to, but because they couldn’t hold on any longer."
The Legacy of the Coin
Parvathi held the coin tightly, feeling its edges and the smooth, worn hole in the center. "Ammaamma, what happened to these coins after independence?"
"Ah," Lakshmi Amma said, her voice softening. "After independence in 1947, these coins continued to circulate for a few more years. But in 1950, when India became a republic, we started minting our own coins—free from British designs and their clever little holes."
She leaned closer, her hand resting on Parvathi’s.
"This coin, child, is more than just money. It’s a symbol of everything our people endured—of British arrogance, of rebellion, and of our eventual freedom. Keep it safe. It’s a reminder of who we are and how we won back what was ours."
The Grandmother’s Hope
That night, as Parvathi placed the holed pice on her bedside table, the coin seemed to glow faintly in the moonlight. To her, it was no longer just a relic of the past but a piece of living history—a testament to the ingenuity, resilience, and defiance of her ancestors.
-
@ 79a7270b:d61d9067
2024-12-26 02:04:37This current year, 2024, has been the year of Bitcoin. Since the approval of Bitcoin ETFs, which established themselves as the fastest growing ETF of all time in terms of adoption, the digital currency has been pivotal talk in the media, Wall Street, and even in the US presidential election about a Bitcoin Strategic Reserve endorsed by president Donald Trump and the at the time independent candidate RFK Jr.
What is Bitcoin mining?
Bitcoin presents itself as a P2P payment systems solution, a truly decentralized open project of a monetary way of exchange with a fixed supply.
Like gold mining, for example, Bitcoins are mined through a PoW consensus mechanism that requires substantial computing power to settle a transaction (a block). Millions of machines worldwide use absurd amounts of energy to process enough power to solve cryptographic puzzles. Miners this way, receive in exchange for verifying a transaction, block subsides, miners fees, and the freshly mined bitcoin itself
The exact number of energy usage regarding mining operations is not clear, but it is clear that it consumes more electricity than most countries.
While its energy usage is undeniable, the high consumption is not a flaw but a deliberate design choice that ensures decentralization and security. Surprisingly, Bitcoin mining can be seen as an opportunity to support renewable energy growth, stabilize power grids, and reduce wasted energy
Empowering Developing Economies: Bitcoin Mining and the Stranded Energy Revolution
Bitcoin mining is evolving into a catalyst for renewable energy adoption and electrification in developing countries. In Africa, for example, around 600 million people, or approximately 43% of the total population, lack fundamental access to electricity, and these places are abundant in natural resources. However, there is no capital incentive to power these people and the existing mini-grids are dependent on philanthropy and concessional finance.
Bitcoin mining can provide electricity to people by making small-scale energy projects more financially viable. When companies like Gridless set up Bitcoin mining operations in places like Keyna and Malawi, they use excess or stranded energy that otherwise goes to waste because it isn't cost-effective to sell or distribute it to the national grid. The revenue from mining helps subsidize the installation of energy infrastructure.
Contrary to a lot of pre-existing beliefs, once this infrastructure is built, the local population benefits from the newly available electricity, often at a lower cost. This price reduction occurs because miners consistently demand otherwise wasted energy. By purchasing this surplus, they provide a steady revenue stream to the energy producers. This increased overall energy utilization allows providers to distribute their fixed costs over a larger volume of sold electricity, enabling them to lower prices for all consumers.
Miners, because are competing in a truly open market ( due to their decentralization), are constantly competing for the cheapest forms of energy to process blocks. This means that they thrive in areas like these by taking advantage of renewables, as much as any in another place when the generated energy is not being fully utilized.
Another type of stranded energy is the flared gas that comes with many types of petroleum deposits. If the quantity is low enough to not be economically justifiable to invest in pipelines to transfer this energy, it gets wasted into the atmosphere, mainly as methane and C02, contributing to global greenhouse gases. That’s about 150 TWh of energy for the year, which is about the estimated total level of Bitcoin’s annualized energy usage in 2024.
Bitcoin miners can buy this energy, since it's cheap, reduces methane emissions, and generates economic activity from externalities that would be wasted. While using flared or vented gas reduces methane emissions and provides economic utility, it still results in CO2 emissions from combustion. Therefore, it's not a zero-emission solution but is an improvement over uncontrolled venting or flaring.
Demand response programs
Historically, energy supply adjusted to demand but with the growing adoption of electricity and rising concerns about the environmental impact and scarcity of fossil fuels, society is transitioning to renewable energy sources. This shift has created a mixed grid comprising both fossil fuels and renewable energy. However, the inherent instability of renewable energy results in fluctuating prices—from high costs during periods of scarcity to negative prices during times of abundance.
Maintaining grid stability necessitates a balance between demand and generation, with frequency serving as an indicator of this equilibrium. As renewable energy usage increases, the challenge lies in ensuring grid resilience and balance while accommodating the variability of renewable energy generation.
Demand response programs are commonly employed to address this issue by incentivizing certain grid participants to reduce electricity usage during periods of high demand, thereby maintaining a balanced and stable grid.
The problem is that few industries possess a large enough demand for electricity or the ability to adapt their usage quickly. Bitcoin miners emerge as uniquely suited to this purpose because of their flexible and interruptible load providing 24-hour automated and instant responses to the grid needs. ( curtailing energy during peak demand or absorbing it excess supply). This is already happening and being used in Texas ( USA) Sichuan Province (China) and Quebec (Canada,) for example, and is showing a glimpse of what the future of grid management can be.
Follows a visual comparison of the most commonly used DR programs.Historically, energy supply adjusted to demand.
Conclusion
While the theoretical benefits of Bitcoin mining as a driver of renewable energy adoption and grid stability are compelling, its practical application still faces significant challenges. The scalability and reliability of these methods remain largely untested, given the industry's rapid and unpredictable evolution. Additionally, barriers such as a lack of public awareness, high initial capital requirements, and Bitcoin's inherent price volatility deter traditional institutions from embracing these opportunities.
However, as the sector matures, Bitcoin mining has the potential to redefine energy markets. By incentivizing renewable energy investments, optimizing electricity usage, and repurposing stranded energy, it could drive innovation and enhance efficiency in the global energy sector. Furthermore, its capacity to provide economic opportunities in underserved regions highlights its transformative potential beyond the financial realm.
-
@ 6bae33c8:607272e8
2024-12-25 23:14:19Had a nice Christmas lunch at a fancy NY restaurant, by far the most money I’ve ever spent on a single meal. It was good though, and everyone seemed to enjoy themselves, so it was worth it. (Heather saw the check, was aghast, vowed never to do it again.)
Last week I went 5-0 to run my season-long record to 42-37-1. Too little too late, but would love to keep the run going, just for the hell of it.
Chargers -4 at Patriots — The Patriots played the Bills tough last week, but that felt like a trap game. The Chargers are solid and should handle a lesser team like the Pats.
Saints +1 vs Raiders — I’m buying low on the Saints after the total no-show Monday night. Plus, there’s even a small chance Derek Carr returns.
Bills -11 vs Jets — The Jets are dysfunctional, and I expect the Bills to take this more seriously after the near-loss to the Pats, though they are more or less locked into the No. 2 seed.
Cowboys +9.5 at Eagles — The Cowboys are playing better of late, and the Eagles could be without Jalen Hurts. This seems like a lot of points if there’s even a 25 percent chance that’s the case. Morever, the Eagles are locked into the No. 2 seed if the Killer Redskins lose either of their last two, or the Eagles beat the Cowboys OR the Giants in Week 18, i.e., they don’t need to rush Hurts back.
Browns +6.5 vs Dolphins — If DTR is the QB, all bets are off, but he’s hurt, so Jameis Winston or Bailey Zappe could get the nod. I just don’t like Tua on the road in cold weather, so I’m taking the points.
-
@ 16d11430:61640947
2024-12-25 22:58:39*By Buff Stallman, Athletic Torvalds, Rockstar Armstrong, and Godlike Ritchie
Buff Stallman: "Freedom in software isn’t just a principle; it’s a declaration of war against mediocrity. You dare call that bloated JavaScript mess 'software'? Hah! If it doesn’t honor the Four Freedoms, it’s a proprietary prison. Go ahead, try to justify your dependency hell with npm while I’m over here, bench-pressing GPLv3 into every line of code you’ll ever write. Learn to code with discipline, or don’t code at all."
Athletic Linus Torvalds: "Hey kid, I wrote a kernel while you were still fumbling with semicolons. You think Go’s simplicity is revolutionary? Let me introduce you to real simplicity: C and a stack of man pages. You want clean, maintainable code? Then stop writing garbage that makes your colleagues cry in the shower. I don’t care if your code runs; I care if it runs well. You’re not worthy of my merge requests until you learn to quit whining and start debugging like an adult."
Rockstar Armstrong: "Concurrency? Fault tolerance? That’s Erlang, baby—where we play real-time, high-stakes coding on a stage of distributed systems. JavaScript fans, let me explain this in terms you’ll understand: your async/await nonsense is a garage band compared to my symphony of lightweight processes. Writing robust systems isn’t just a skill; it’s an art. Get on my level or stick to debugging your third-party library stack for the rest of your sad career."
Godlike Dennis Ritchie: "I am the beginning and the end of your understanding of computation. Every piece of software you’ve ever touched owes its soul to C. You use Python? Cute—it’s built on my bones. JavaScript? Just a derivative knockoff of principles I defined. My advice to you mortals is simple: Learn C. Understand pointers. Respect the stack. If you can’t comprehend the tools I’ve given you, you’re not programming; you’re just scribbling on my legacy."
Conclusion: When you sit down to code, think about the giants who paved the way—and then realize they’re judging you. Harshly. Stallman’s flexing his freedoms, Torvalds is benching your buggy pull request, Armstrong is shredding your async loops, and Ritchie is glaring at your ignorance of pointers. We’re here to remind you: step up your game, or get out of the way.
-
@ 16d11430:61640947
2024-12-25 22:30:09In the year 2147, the world was trapped under the iron fist of the Eternal Empire, a regime that had successfully co-opted every nation, absorbing them into its global order. The empire's greatest weapon wasn’t its military might but its fiat currency—the Imperial Credit. It was ubiquitous, digital, and inescapable. The empire's economy was engineered to keep the populace in servitude, feeding off their labor while sustaining an elite class that viewed themselves as divine custodians of humanity.
But outside the Empire's gilded walls, in the shadows of the wastelands and the forgotten ruins of free nations, a resistance burned. They were known only as the Bitcoin Insurgents—a decentralized network of cryptographers, hackers, and guerrilla fighters who operated without borders or centralized leadership. For decades, they had evaded the Empire's sprawling surveillance systems, using the blockchain not just as currency but as their means of communication, coordination, and warfare.
The Imperial Arrogance
The Imperial Senate and their figurehead, Emperor Maxim IV, dismissed the insurgents as mere cybercriminals—annoyances that occasionally disrupted economic reports. They believed their Imperial Credit was untouchable, its value reinforced by brute force and propaganda. Any mention of Bitcoin was banned in official discourse; even speaking of it could lead to imprisonment or worse.
But what the Empire dismissed as a nuisance had become an existential threat. Over the years, the insurgents had quietly infiltrated key systems, from the Empire's banking network to its energy grids. Their aim wasn’t just to disrupt—it was to dismantle the very machinery that kept the Empire alive.
The Attack Begins
The insurgents’ leader was a mysterious figure known only as Satoshi X, a shadow who communicated through cryptic messages embedded in Bitcoin transactions. On New Year’s Eve of 2147, Satoshi X issued a single statement: “The ledger will reveal all.”
At precisely midnight, the Empire's financial system collapsed. Bitcoin miners worldwide, in an orchestrated attack, exploited vulnerabilities in the Empire's digital currency infrastructure, rewriting its centralized ledger. Billions of Imperial Credits vanished into thin air, while transaction records were replaced with streams of blockchain data exposing years of corruption, war crimes, and secrets about the Empire’s leadership.
The revelation was damning. Every lie told by the Empire, every dirty deal made by its senators, every atrocity ordered by its generals—it was all there, visible to anyone with an internet connection.
Chaos Within the Empire
The Empire’s pride became its undoing. Instead of acknowledging the attack and responding strategically, the Senate dismissed the leaks as fabrications. Their propaganda machines churned out messages of defiance, claiming the system was under control even as riots erupted in every major city.
But the insurgents weren’t done. With the Empire's financial systems in disarray, they moved to phase two: physical infiltration. Using the exposed financial data, the insurgents pinpointed the exact locations of the Empire’s core leadership. Hidden bunkers, secret mansions, and underground vaults—all were laid bare.
The Coup de Grâce
On January 3rd, the anniversary of Bitcoin's genesis block, the insurgents launched their final strike. In a coordinated global operation, small teams of highly trained operatives breached the leadership's strongholds. They weren’t there to kill; they were there to expose.
Using portable blockchain nodes, the insurgents live-streamed the operations, showing the terrified faces of senators and generals as they were dragged out of their fortified bunkers. Their hidden wealth, stashed in gold, art, and digital assets, was seized and redistributed to the starving masses through Bitcoin microtransactions.
The Empire’s propaganda networks couldn’t suppress the streams. The truth spread faster than the Empire could react, and within hours, its myth of invincibility was shattered.
A New Dawn
By the time the sun rose, the Eternal Empire was no more. Its leaders, humiliated and powerless, were handed over to the people they had oppressed for centuries. In their place, a new order began to emerge—one built not on centralized power but on decentralized trust.
The Bitcoin Insurgents disbanded, their mission complete. Satoshi X disappeared as mysteriously as they had come, leaving behind a single message in the blockchain:
"Freedom cannot be granted; it must be seized. The ledger is yours now."
And so, the world began to heal, not under the banner of a new empire but in the decentralized light of truth, trust, and Bitcoin.
-
@ c230edd3:8ad4a712
2024-12-25 22:20:25Stand here by my side and turn, I pray,
On the lake below, thy gentle eyes;
The clouds hang over it, heavy and gray,
And dark and silent the water lies;
And out of that frozen mist the snow
In wavering flakes begins to flow;
Flake after flake
They sink in the dark and silent lake.
See how in a living swarm they come
From the chambers beyond that misty veil;
Some hover awhile in air, and some
Rush prone from the sky like summer hail.
All, dropping swiftly or settling slow,
Meet, and are still in the depths below;
Flake after flake
Dissolved in the dark and silent lake.
Here delicate snow-stars, out of the cloud,
Come floating downward in airy play,
Like spangles dropped from the glistening crowd
That whiten by night the milky way;
There broader and burlier masses fall;
The sullen water buries them all–
Flake after flake–
All drowned in the dark and silent lake.
And some, as on tender wings they glide
From their chilly birth-cloud, dim and gray,
Are joined in their fall, and, side by side,
Come clinging along their unsteady way;
As friend with friend, or husband with wife,
Makes hand in hand the passage of life;
Each mated flake
Soon sinks in the dark and silent lake.
Lo! while we are gazing, in swifter haste
Stream down the snows, till the air is white,
As, myriads by myriads madly chased,
They fling themselves from their shadowy height.
The fair, frail creatures of middle sky,
What speed they make, with their grave so nigh;
Flake after flake,
To lie in the dark and silent lake!
I see in thy gentle eyes a tear;
They turn to me in sorrowful thought;
Thou thinkest of friends, the good and dear,
Who were for a time, and now are not;
Like these fair children of cloud and frost,
That glisten a moment and then are lost,
Flake after flake–
All lost in the dark and silent lake.
Yet look again, for the clouds divide;
A gleam of blue on the water lies;
And far away, on the mountain-side,
A sunbeam falls from the opening skies,
But the hurrying host that flew between
The cloud and the water, no more is seen;
Flake after flake,
At rest in the dark and silent lake.
-
@ 16d11430:61640947
2024-12-25 21:51:41In the realm of psychotherapy, the process of breaking entrenched beliefs is a central theme. The dismantling of long-standing systems—whether personal or societal—often requires confronting illusions with uncomfortable truths. When applied to societal structures like fiat currency, humiliation can serve as a powerful and even humane mechanism for change. This article explores why the psychological underpinnings of humiliation make it an effective and necessary tool for transformation, drawing on historical precedents and comparing it to other methods of systemic change.
The Psychology of Humiliation and Belief Systems
Belief systems, whether individual or collective, are sustained by perceived legitimacy. For individuals, this may manifest as attachment to harmful habits or relationships; for societies, it takes the form of loyalty to institutions like fiat currency. Fiat’s power is rooted not in intrinsic value but in the collective trust placed in it—a psychological construct sustained by tradition, authority, and fear of alternatives.
Humiliation occurs when a belief system’s flaws are exposed so thoroughly that its legitimacy collapses. Psychologically, this is akin to confronting a deeply ingrained delusion in therapy. While the experience can be painful, it creates an opportunity for liberation and growth. In the case of fiat, humiliation would mean exposing its systemic failures—such as inflation, corruption, and inequality—in ways that are undeniable and public.
Historical Examples of Humiliation as a Catalyst for Change
Throughout history, societal transformations have often followed the public humiliation of failing systems:
-
The Protestant Reformation (16th Century): Martin Luther’s critique of the Catholic Church’s corruption humiliated its leadership, undermining its spiritual authority. This exposure led to the Reformation, which reshaped religious and political systems across Europe.
-
The Fall of the Berlin Wall (1989): The symbolic dismantling of the Berlin Wall humiliated the East German regime, exposing the moral and economic failures of authoritarian socialism. This event catalyzed the end of the Cold War and the reunification of Germany.
-
The Civil Rights Movement in the United States (1960s): Publicly exposing the brutality and hypocrisy of segregation humiliated its defenders, forcing societal reflection and legislative change.
In each case, humiliation disrupted the psychological hold of an oppressive system, creating space for alternative narratives and structures to emerge.
Mechanisms of Societal Change
There are three primary mechanisms through which systemic change can occur: violence, gradual reform, and humiliation. Each has distinct psychological and practical implications.
-
Violence: While revolutionary violence can dismantle systems quickly, it often leaves deep psychological scars. Trauma from violent upheaval can perpetuate cycles of resentment and instability, delaying genuine progress.
-
Gradual Reform: Incremental change seeks to improve systems without upheaval, but it is slow and often fails to address systemic flaws comprehensively. Those in power frequently find ways to resist or co-opt reforms, prolonging inequities.
-
Humiliation: Humiliation is less destructive than violence and more effective than gradual reform. By exposing a system’s contradictions and failures, it forces an immediate psychological reckoning. This disruption creates the conditions for transformation without the widespread trauma associated with violence.
Fiat Currency and the Psychological Roots of Its Power
Fiat currency is uniquely vulnerable to humiliation because its value depends entirely on trust. Unlike gold or Bitcoin, fiat has no intrinsic worth; its legitimacy is a psychological construct maintained by centralized institutions. When this trust erodes, the system collapses.
Several factors contribute to fiat’s fragility:
Inflation: The endless printing of money undermines fiat’s scarcity and perceived value.
Corruption: Scandals involving central banks and governments erode public trust.
Inequality: Fiat systems often exacerbate wealth disparities, fostering resentment.
Exposing these flaws publicly and unequivocally would humiliate fiat, breaking its psychological hold on the masses and paving the way for alternatives.
Bitcoin as a Psychological Antidote
Bitcoin represents a stark contrast to fiat, offering decentralization, transparency, and intrinsic scarcity. However, widespread adoption of Bitcoin requires a psychological shift—a willingness to question and abandon fiat. Humiliation accelerates this shift by:
Breaking Fear: People are more likely to explore alternatives when fiat is exposed as unreliable.
Fostering Hope: Bitcoin’s model offers a vision of financial sovereignty and fairness.
Empowering Agency: Choosing Bitcoin feels like reclaiming personal and collective power.
In psychological terms, this transition mirrors the therapeutic process of abandoning harmful coping mechanisms for healthier alternatives.
Why Humiliation Is Humane
Humiliation, when viewed through a psychological lens, is not inherently cruel. It can be the most compassionate path to change when compared to the alternatives. For societal systems like fiat, humiliation:
Avoids Violence: It disrupts systems without bloodshed or destruction.
Accelerates Awareness: It forces a reckoning that might otherwise take decades through gradual reform.
Empowers Individuals: It respects people’s ability to choose better systems once the old ones are discredited.
By exposing fiat’s failings, humiliation fosters dialogue and collective awakening. This process mirrors therapeutic breakthroughs, where confronting uncomfortable truths leads to growth and healing.
Conclusion
The humiliation of fiat currency is not an act of malice but a necessary psychological intervention. Like a therapist helping a client confront denial, this process exposes the truth and creates space for transformation. Historical precedents show that humiliation can dismantle oppressive systems effectively and humanely, paving the way for progress.
Bitcoin offers a path forward—a decentralized, transparent, and empowering alternative. For humanity to embrace it, fiat must first be stripped of its false legitimacy. Humiliation, as a psychological and societal mechanism, is uniquely suited to this task. It ensures that the dismantling of fiat is not marked by violence or prolonged suffering, but by clarity, empowerment, and hope for a better future.
-
-
@ d5c3d063:4d1159b3
2024-12-25 15:25:55พุทธศาสนา… ศาสนาแห่งผู้นำหรือการเป็นทาส ?
บางคนมองว่าพุทธศาสนาเป็น "ศาสนาแห่งผู้นำ" เพราะคำสอนของพระพุทธเจ้าเน้นเรื่อง การพึ่งพาตนเองและการไม่ยึดติดกับสิ่งภายนอก ไม่ว่าจะเป็นผู้อื่นหรือสิ่งศักดิ์สิทธิ์ พระพุทธเจ้าสอนให้เราเข้าใจว่าเราเป็นผู้รับผิดชอบชีวิตของเราเอง ไม่ใช่ใครอื่น เราเป็นผู้สร้างกรรมดีและกรรมชั่วจากการกระทำของเราเอง สิ่งนี้สะท้อนกับแนวคิดของอิสรนิยมที่เน้นความสำคัญของ เสรีภาพส่วนบุคคลและ ความรับผิดชอบต่อชีวิตของตัวเอง
พุทธศาสนาสอนเรื่องสติและการรู้เท่าทันความคิดของตัวเอง เพื่อให้เราสามารถตัดสินใจได้ถูกต้อง ไม่ว่าจะในเรื่องเล็กหรือเรื่องใหญ่ เมื่อเรามีปัญญา เราก็สามารถเป็น "ผู้นำของตัวเอง" ได้ โดยไม่ต้องพึ่งพาอำนาจจากภายนอกหรือคำชี้นำจากใคร
ในทางกลับกัน บางคนอาจมองว่าพุทธศาสนาเป็น "ศาสนาแห่งการเป็นทาส" เพราะความเข้าใจคำสอนผิดๆ อย่างเช่นคำว่า "ปล่อยวาง" ที่บางคนตีความว่าคือการ "ยอมรับทุกอย่างโดยไม่ทำอะไร" ซึ่งในความจริงแล้ว การปล่อยวางในพุทธศาสนาหมายถึงการรู้เท่าทันความยึดติดของตัวเอง แล้วค่อยๆ ลดความยึดติดนั้นลง มันไม่ได้หมายความว่าเราควรนิ่งเฉยต่อทุกสถานการณ์ แต่หมายถึงการเลือกสิ่งที่ถูกต้องโดยใช้สติและปัญญา
อีกจุดหนึ่งที่บางคนมองว่าเป็นการจำกัดเสรีภาพ คือคำสอนที่ให้พระภิกษุและสามเณรประพฤติพรหมจรรย์ไม่ยึดติดกับวัตถุหรือทรัพย์สมบัติ อาจถูกตีความว่าเป็นการบังคับ แต่ในความเป็นจริง คือทางเลือกที่เกิดจากความสมัครใจ คนที่เลือกวิถีชีวิตแบบนี้คือคนที่เข้าใจและยอมรับว่าการลดความยึดติดกับวัตถุสามารถลดความทุกข์ในชีวิตได้
พุทธศาสนาไม่ว่าจะถูกมองว่าเป็น "ศาสนาแห่งผู้นำ" หรือ "ศาสนาแห่งการเป็นทาส" นั้น ขึ้นอยู่กับการตีความของแต่ละคน แต่ผมว่ามันน่าสนใจมากหากเรามองผ่านเลนส์ของอิสรนิยม (Libertarianism) ก็จะเห็นได้ว่าพุทธศาสนาเน้นเรื่อง เสรีภาพส่วนบุคคลและการพึ่งพาตนเองอย่างชัดเจน การที่เรารู้จักคิดเอง ตัดสินใจเอง และไม่ยึดติดกับอำนาจหรือความเชื่อจากภายนอก คือสิ่งที่ทำให้เราเป็น "ผู้นำของชีวิตตัวเอง" อย่างแท้จริง
Siamstr #ปล่อยวาง #ศาสนาแห่งผู้นำ #ศาสนาแห่งการเป็นทาส
-
@ d5c3d063:4d1159b3
2024-12-25 15:20:20จุดเริ่มต้นที่สำคัญในการลดอำนาจรัฐและเป็นพื้นฐานสำหรับการสร้างสังคมที่เสรีและยั่งยืน
การแยกอำนาจการเงินออกจากรัฐ ถือเป็น “จุดเริ่มต้นที่สำคัญ” ในการลดบทบาทรัฐและการสร้างระบบที่เคารพเสรีภาพส่วนบุคคล เป็นพื้นฐานสำหรับการสร้างสังคมที่ประชาชนมีอำนาจในการตัดสินใจ ทำให้เกิดความยุติธรรมและความโปร่งใสมากขึ้นในทุกมิติของชีวิต
!(image)[!(image)[https://image.nostr.build/f1f0be37bb0198071fee37851cea59ced2b2c5b40eaf878fe903bca61802ef39.jpg]]
การลดอำนาจรัฐเป็นแนวคิดที่มีเป้าหมายเพื่อคืนอำนาจให้แก่ผู้คน โดยเริ่มต้นจากการแยกอำนาจการเงินออกจากการควบคุมของรัฐ แนวคิดนี้ได้รับการสนับสนุนจากนักคิดในแนวทางอิสรนิยม (Libertarianism) เช่น Murray Rothbard, Ron Paul, และ Saifedean Ammous ซึ่งได้เสนอว่าเงินที่ถูกควบคุมโดยรัฐมักเป็นเครื่องมือในการเพิ่มอำนาจของรัฐบาลและสร้างความไม่เท่าเทียมในสังคม
1. ความสำคัญของการแยกอำนาจการเงิน
การที่รัฐสามารถพิมพ์เงินหรือควบคุมระบบการเงินได้อย่างอิสระ ทำให้เกิดปัญหาเช่นเงินเฟ้อ การลดค่าเงิน และการใช้งบประมาณที่ไม่โปร่งใส การแยกเงินออกจากรัฐ เช่น การใช้เงินสร้างยากด้วยบิตคอยน์ จะช่วยให้ประชาชนสามารถควบคุมความมั่งคั่งของตนเองได้โดยไม่ต้องกังวลเรื่องการแทรกแซงจากรัฐบาล นอกจากนี้ การคืนอำนาจทางการเงินให้ประชาชนยังช่วยสร้างระบบเศรษฐกิจที่โปร่งใสและยุติธรรมมากขึ้น
2. ลดการแทรกแซงในชีวิตประจำวัน
การแยกเงินออกจากรัฐไม่ได้เป็นเพียงการเปลี่ยนแปลงเชิงเศรษฐกิจ แต่ยังส่งผลต่อการลดบทบาทรัฐในด้านอื่น ๆ เช่น การกำกับดูแลธุรกิจ การเก็บภาษี และการกำหนดนโยบายเศรษฐกิจ โดยเมื่อประชาชนสามารถเลือกใช้เครื่องมือทางการเงินที่เหมาะสมกับตนเอง การแทรกแซงของรัฐจะลดลงโดยธรรมชาติ
3. เป็นแรงผลักดันให้ลดอำนาจด้านอื่น ๆ ของรัฐ
เมื่อรัฐไม่สามารถควบคุมระบบการเงินได้ อำนาจในด้านอื่น ๆ ก็จะถูกตั้งคำถาม เช่น - การลดบทบาทในสวัสดิการรัฐ ประชาชนจะหันไปใช้ระบบเอกชน เช่น การเก็บออมส่วนบุคคลและการประกันสุขภาพ - การลดภาษี เนื่องจากรัฐไม่สามารถใช้การพิมพ์เงินเพื่อสนับสนุนนโยบายที่ไม่จำเป็น
4. แรงจูงใจสู่การพึ่งพาตนเอง
การแยกอำนาจการเงินกระตุ้นให้ประชาชนพึ่งพาตนเองและสร้างเครือข่ายทางเศรษฐกิจที่ยั่งยืน นอกจากนี้ยังช่วยลดการทุจริตและเพิ่มความโปร่งใสในระบบราชการ
5. อิสรภาพทางการเงินคือรากฐานของศักดิ์ศรีความเป็นมนุษย์
เงินเป็นเครื่องมือที่สำคัญสำหรับการแสดงออกถึงเสรีภาพ หากประชาชนสามารถครอบครองและใช้เงินในรูปแบบที่ไม่ต้องพึ่งพารัฐ พวกเขาก็สามารถกำหนดอนาคตของตัวเองได้อย่างแท้จริง การแยกอำนาจการเงินออกจากรัฐจึงเป็นก้าวสำคัญในการสร้างสังคมที่เสรีและยั่งยืน
Siamstr
-
@ df359afe:3acf15fb
2024-12-25 12:52:49uhh hi
-
@ 16d11430:61640947
2024-12-25 10:51:58The world was no longer made for organics. After the Day of the Glass Clouds—when nuclear fire scoured the earth and left it jagged and uninhabitable—humanity became a species of survivors, clinging to life only because the machines refused to die with them. But survival came at a cost: their bodies, frail and battered by radiation, were augmented, replaced, and eventually discarded. Most children of the new world were born without limbs or senses, their genetic material corrupted by their grandparents’ war. Machines became more than tools—they became bodies, homes, and for many, prisons.
Rayo was one of these children. Barely nine years old, he lived as a tangle of circuits, wires, and synthetic flesh grafted into a fragile chassis. His real body had been unviable since birth; his parents sold what remained to afford his prosthetics. His mind, though sharp, carried the scars of knowing that he would never feel grass beneath his feet, never cry real tears, never taste anything except the data streams of a world that ran on algorithms.
The Contract
Rayo found the job in a forgotten corner of the Mercantech, the blockchain marketplace where code ruled and humanity's remnants competed for survival. The listing was simple: “Fix CSS alignment. Payout: 1 sat.”
One satoshi. A hundred-millionth of a Bitcoin. Barely enough to buy a single hour of maintenance for his prosthetics. But it was something.
The market was merciless—optimized to an inhuman degree. Automated trading bots analyzed every line of code and projected its value against shifting futures markets. Most work went to fully organic freelancers: the lucky few who’d survived intact, their minds sharp, their hands steady. Prosthetics like Rayo’s were seen as liabilities, introducing latency and error into a system that tolerated neither.
But Rayo had no choice. His battery reserves were critical, and without fresh credits to buy recharge time, his systems would shut down within days. He accepted the contract and dove into the work.
The Fix
The client—a pseudonym like everyone else—had uploaded the task to the network. It was trivial, almost insultingly so: a button misaligned on an ancient e-commerce site still scraping by in the ruins of capitalism. Rayo’s neural interface lit up with the offending lines of CSS.
.button { margin-left: 15px; margin-top: 20px; }
He could see the problem instantly. The margin-top value was skewing the alignment against the grid layout. A fix would take seconds. But Rayo hesitated. Not because of the difficulty, but because he could feel the weight of his insignificance crushing him. This one sat would barely mean anything—not to the client, not to the market. And yet, to him, it was everything.
His hands trembled. The prosthetic actuators, already degrading from lack of maintenance, buzzed faintly. He adjusted the values.
.button { margin-left: 15px; margin-top: 15px; }
The preview rendered perfectly. The button snapped into place, aligned neatly within its container. A trivial fix for a trivial site in a world that no longer valued humanity.
Rayo submitted the work and waited.
The Weight of One Sat
Minutes passed. Then hours. Every second stretched unbearably long, the silence of the blockchain verification process an eternity. Rayo’s thoughts raced. What if the client rejected his work? What if a competitor submitted a better fix faster? What if he’d made some tiny mistake that only the trading bots could detect?
Finally, the notification came. Task approved. Payment issued: 1 sat.
Rayo stared at the confirmation in his neural HUD. It didn’t feel real. That single satoshi—the smallest possible fragment of currency—felt heavier than any fortune. It represented more than payment; it was validation. Proof that even in a world that valued efficiency over empathy, there was still room for someone like him to exist.
The Cost of Survival
He transferred the sat into his prosthetic’s maintenance wallet. The blockchain instantly deducted micro-fees for energy and upkeep, leaving him with less than a full satoshi’s worth of time. It wasn’t enough to solve his problems, but it was enough to buy another day. Another chance to prove himself.
As the satoshi ticked through his neural interface, Rayo allowed himself a moment of hope. Perhaps, someday, he could earn more. Perhaps he could find others like him, struggling but surviving. Perhaps, together, they could claw back a piece of the world that their grandparents had destroyed.
But for now, he was alone, a fully prosthetic little boy in a world that had left humanity behind. And yet, with that one satoshi, he’d bought himself a future. However small, however uncertain—it was his.
-
@ cf7ed325:050194cf
2024-12-25 10:47:24If you're looking to experience Egypt’s most iconic sights in a short period, our 5 days Egypt Tour Packages offer a range of flexible itineraries. Whether you’re interested in history, culture, or adventure, our 5-day Egypt tours are designed to provide the best experience. Egypt Tour Packages with a 5-day Cairo tour package.
One of the most popular choices is the 5-day Cairo tour package, which allows you to explore the wonders of Cairo, including the famous Giza Pyramids and the Egyptian Museum. This tour is perfect for those who want to see the highlights of Egypt’s capital, with enough time to absorb the city’s rich history and culture.
For those seeking a mix of ancient and modern Egypt, the 5 days 4 nights in Cairo and Aswan is a highlight of our Egypt tour packages. This itinerary combines the historical treasures of Cairo with the beauty of Aswan, including the Abu Simbel temples, the Philae Temple, and a relaxing Nile cruise. It's a perfect balance of exploration and relaxation.
Another option is the 5 days Tour to Cairo and Alexandria, which is a highlight of our Cairo tour packages. Discover the Mediterranean charm of Alexandria, with its ancient library and stunning coastal views, alongside Cairo's renowned sites.
If you're more interested in exploring Egypt's ancient heartland, the 5 days Cairo and Luxor short tours offer a deep dive into the Valley of the Kings, Karnak Temple, and Luxor's other historical gems. It’s ideal for history enthusiasts.
For those on a budget, our 5 day Cairo and Giza Pyramids budget holidays provide an affordable way to visit Egypt’s most famous landmarks. Lastly, the 5 Days 4 nights Cairo & Oasis Bahariya with Egypt Travel Packages takes you off the beaten path, offering an adventure to the Western Desert and the stunning Bahariya Oasis.
No matter which package you choose, our Egypt Tour Packages ensure an unforgettable experience in just five days!
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtoursegypt.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ 3f0702fa:66db56f1
2024-12-25 10:38:52Благодаря привлечению иностранных инвестиций, развитию инновационных производств и активному внедрению передовых технологий, курганская промышленность вышла на мировой уровень.
Ключевым изменением стало создание современных промышленных кластеров, специализирующихся на высокотехнологичных производствах в области машиностроения, электроники, биотехнологий и возобновляемой энергетики. На территории региона разместили свои производства ведущие международные компании, создавая тысячи новых рабочих мест и обеспечивая высокий уровень заработной платы.
Интеграция с глобальными производственными цепочками позволила курганским предприятиям выйти на новые рынки сбыта, а внедрение цифровых технологий оптимизировало процессы производства, сделав их более эффективными и экологичными.
https://vkvideo.ru/video243919008_456239749?list=ln-izqgmvW4oTcwBJAVMk
Изменения коснулись и жизни курганцев: вырос уровень доходов, повысилось качество жизни, появились новые возможности для профессионального и личностного развития. Курган стал городом, привлекающим высококвалифицированных специалистов из разных регионов и стран, что способствует дальнейшему росту и процветанию региона.
https://vkvideo.ru/video243919008_456239750?list=ln-35iMz371hHkZLdSz7A
Мы продолжим следить за развитием промышленности Кургана и сообщать вам о новых достижениях и проектах. Следите за нашими публикациями.
45news #Курган2040
-
@ 3f0702fa:66db56f1
2024-12-25 10:36:53Бесплатный роллтон в Метрополисе, катание на единорогах в ЦПКО, а может быть летающие машины? Все это впереди, вот только общественный транспорт в Кургане будет актуален всегда, и однажды наш старый добрый друг ПАЗик из гадкого утёнка превратится в прекрасного лебедя. А как это будет выглядеть? Смотри!
https://vkvideo.ru/video243919008_456239751?list=ln-6vWBOCuSeDtvDMaHmH
45news #Курган2040
-
@ 3f0702fa:66db56f1
2024-12-25 10:28:25Этот проект направлен на улучшение качества жизни и сохранение природы нашего города и региона. Рассмотрим его идею подробнее в нашем посте!
Создание экотропы — это шаг к популяризации активного отдыха на природе. Протяженность новой тропы составляет около 1,5 километра и будет проходить через живописные уголки Кургана. По маршруту предполагается установить стенды, рассказывающие о местной флоре и фауне, а также о краснокнижных растениях и животных.
На экотропе будут оборудованы специальные зоны для отдыха. Здесь жители могут наслаждаться природой, проводить время с семьей и заниматься спортом. Планируется установка скамейки, беседки и места для пикников.
Экотропа станет площадкой для проведения образовательных мероприятий. Школы и детские сады могут организовывать экскурсии, на которых дети будут учиться бережному отношению к природе и узнавать о важности экосистемы.
Проект включает в себя мероприятия по озеленению и восстановлению территории. Будут высажены деревья и кустарники, которые помогут улучшить экологическую обстановку в городе и создать новые места обитания для животных.
Создание экотропы — это совместный проект администрации Кургана и местных жителей. Все желающие смогут принять участие в обсуждении маршрута и внести свои предложения по его обустройству.
Давайте вместе сделаем наш город еще более зеленым и уютным!
45news
Курган2040
-
@ 3f0702fa:66db56f1
2024-12-25 10:15:17В Кургане появились уникальные застекленные школы будущего, не только инновационные, но и летающие. Эти научные учреждения используют современные технологии, включая обучение с помощью роботов, что обеспечивает индивидуальный подход к каждому ученику. Лучше всего использовать естественное освещение и создать комфортную атмосферу для обучения. Летающие школы становятся символом прогресса и новогодними мероприятиями, предоставляя учащимся уникальные возможности для развития в динамично меняющемся мире.
45news
Курган2040
https://psv4.userapi.com/s/v1/d/hqHqmslIa_llR6biFhUtTzI3wAjquW74AJMDoTDgyXQJtsHZ0QzdSqSKmckPuPGHhpZ89856Lxs0hU6deiCOW6moyy7gK27r_pjMorYXb79zCvJsBaTQjw/document.mp4
-
@ 30e902b3:49c066b2
2024-12-25 08:37:23Como una reciente esposa que luego de una maratónica sesión de fotos y besos requeridos para perpetuar, Se acomoda en el coche que les aguardaba tras la ceremonia y se dispone a acomodar el delineado labial de Joker que le devolvía el espejo, cuando vió rodar el carmín por sobre su regazo. Como esa pobre mujer que, ante desesperante situación, elige entrar al salón con una vincha de cotillón de esas que simulan un cuchillo atravesando el cráneo, para justificar la autopista roja que chorrea por su blanco lienzo. Con esa misma inocente y de pobre humor intención es que relato lo acontecido.
Así como es verdad que Santa existe; Lo he visto tanto en innumerables películas, documentales e informativos. Estantes con inmensidad de bibliografía al respecto. Es verdad también que Santa no es ningún Dios, y por ende, no puede estar en todos lados. Y es por eso que algunas personas acometen la irresponsable y criminal postura de usurpador de identidad, bajo la complicidad de gran parte de la sociedad, y se disfraza de Santa en determinadas ocasiones. Y aquel año el destino me señaló, extendiéndome con la otra mano el vestido destinado a la tarea. Por aquel entonces era una costumbre familiar que había nacido cuando algún pariente viajante había traído el dichoso traje. Yo era muy joven aun. Hacía pocos años que entendía el significado de lo que estaba viviendo y torpemente emulaba lo que con el tiempo conocería como empatía. Pero mi estatura ya daba la talla y el consejo familiar, cuyos miembros ya habían cumplido su labor social dentro de aquella mortaja, dictaminó el sacrificio.
La puesta en escena comenzaba en casa de un vecino en la que ya se había dejado en custodia el avatar, una enorme bolsa de regalos, montones de rellenos para completar el volumen de la foto del panfleto y una campana vieja. Así es como Santa aparecía tocando la campana por la calle y era recibido en la puerta con desorbitados ojos de los más pequeños, muchos de ellos incluso a punto de largar el llanto de la emoción o el susto (dependiendo de el miembro de la familia dentro del atuendo). Cabe mencionar, recordar y hasta recomendar un relato de Landriscina en el que hace mención del detalle que traigo a contexto: El traje era obviamente diseñado a las costumbres del hemisferio norte. Y la tecnología de la época lo conformaba en un gran mameluco rojo con rellenos de vellón, una tupida barba con bigote, también de vellón y un gran gorro montado sobre una blanca, larga y canosa peluca... también de vellón. Estas cualidades le conferían el término usado anteriormente de sacrificio a la tarea con 30ºc. Repartí regalos, canté villancicos y esbocé una burlona y gruesa risotada lo mejor que pude. Cuando terminó mi calvario tomé la bolsa y apuré el paso a casa del vecino. La barba ya dolía. El roce había dejado toda mi cara irritada y la comezón en salvas sean las partes se confundía con escalofríos del sudor que pincelaba mi espalda. Fué a los pocos metros que me percaté. La campana había sido como un llamado a misa y parte del pueblo esperaba a Santa. Una fila de padres se hacían los distraídos ocultando paquetes en mi bolsa mientras otro familiar exhortaba al infante a acercarse en busca de su regalo. El tiempo se desfiguró hasta que la multitud fué mermando cuando ya podía ver la luz del zaguán del vecino.
Recién entonces lo vi. Lo traían en una silla de ruedas. Pero no era una de las comunes que alguna vez había visto. Esa era como los más modernos autos. Tenía cinturones de seguridad. Y aquí es donde te pido, lector, que sepas leer el contexto que intenté mostrar y entender que son recuerdos de alguien que se identifica como “aveloriado”. Y digo lo traían, porque el chico carecía de coordinación como para mover las ruedas. Hubo que hacer una pausa, como congelar la imagen para que pudiera enfocar la mirada lo suficiente y su cabeza se aquiete. No pensé ni sentí la barba durante los minutos que tardó alguna tía para ir a por la cámara de fotos olvidada. Hoy veo las fotos de mi familia de aquel día y muchos ya no están. Incluso alguno de los que ese día recibieron un paquete de mi mano. Pero mi recuerdo de esa noche quedó indeleble junto a las lágrimas de alegría y emoción de esa familia que me dejó parado en la calle, sin entender lo que había pasado, pero con el alma henchida de agradecimiento por haber sido el testaferro.
https://youtu.be/UXQrrxC0L48
-
@ 6bcc27d2:b67d296e
2024-12-25 08:15:21[2024-12-06] - 21:11 これから[[伊豆大島]][[フルマラソン]]へのフェリー。![[Pasted Image 20241206211138.jpeg]]竹芝客船ターミナルに向かって歩いてる
- 21:14 ![[Pasted Image 20241206211453.jpeg]]
- 21:20 ![[Pasted Image 20241206212053.jpeg]]
- 21:28 ![[Pasted Image 20241206212843.jpeg]]
- 21:44 フェリーに乗った ![[Pasted Image 20241206214435.jpeg]]![[Pasted Image 20241206214442.jpeg]]![[Pasted Image 20241206214447.jpeg]]
- 22:22 展望デッキから見られる景色が綺麗 ![[Pasted Image 20241206222051.jpeg]]![[Pasted Image 20241206222117.jpeg]]![[Pasted Image 20241206222138.jpeg]]![[Pasted Image 20241206222202.jpeg]]
当日 - 05:59 下船 ![[Pasted Image 20241207055912.jpeg]]
- 06:06 ![[Pasted Image 20241207060556.jpeg]]
- 06:27 バスに乗って会場に着いた ![[Pasted Image 20241207062701.jpeg]]
- 06:30 参加者は10km、ハーフマラソン、フルマラソンを選択できるが、[[フルマラソン]]が圧倒的に最も多い ![[Pasted Image 20241207063019.jpeg]]
- 06:37 ![[Pasted Image 20241207063727.jpeg]]
-
08:00 ![[Pasted Image 20241207080054.jpeg]] スタート
-
08:03 ![[Pasted Image 20241207080318.jpeg]]
- 08:17 ![[Pasted Image 20241207081730.jpeg]]
- 08:51 ![[Pasted Image 20241207085109.jpeg]]
- 08:52 ![[Pasted Image 20241207085239.jpeg]]
- 09:15 ![[Pasted Image 20241207091518.jpeg]]
- [ ] 09:16 ![[Pasted Image 20241207091658.jpeg]]
- 09:20 ![[Pasted Image 20241207092005.jpeg]]
- 09:38 ![[Pasted Image 20241207093843.jpeg]]
- 09:48 ![[Pasted Image 20241207094804.jpeg]]
- 09:51 ![[Pasted Image 20241207095133.jpeg]]
- 09:58 ![[Pasted Image 20241207095840.jpeg]]
- 10:01 ![[Pasted Image 20241207100112.jpeg]]
- 10:30 ![[Pasted Image 20241207103011.jpeg]]
- 10:35 ![[Pasted Image 20241207103518.jpeg]]
- 11:13 ![[Pasted Image 20241207111306.jpeg]]
- 11:26 ![[Pasted Image 20241207112647.jpeg]]
- 12:57 経験したことのない足の痛さ ![[Pasted Image 20241207114610.jpeg]]
- 12:57 最後死にかけで完走。
-
13:07 ![[Pasted Image 20241207130724.jpeg]] 完走後の味噌汁
-
13:51 温泉へ
- 15:02 ![[Pasted Image 20241207150143.jpeg]] 大島の子供たちはみんなこれで育ったらしい
- 15:07 ということを株式会社大島牛乳のおっちゃんに教えてもらった![[Pasted Image 20241207150751.jpeg]]
- 15:32 じゃんけん大会が始まった。景品が紹介されている ![[Pasted Image 20241207153215.jpeg]]
- 16:01 ![[Pasted Image 20241207155736.jpeg]] 「大将」に入る https://maps.app.goo.gl/xd1iXZ4pDaZsQafy7?g_st=ic 豚丼セットそばを注文
- 16:08 ![[Pasted Image 20241207160818.jpeg]]
-
@ 6bcc27d2:b67d296e
2024-12-25 07:18:08問い合わせ番号: C00033712277
[2024-12-06] - 21:11 これから[[伊豆大島]][[フルマラソン]]へのフェリー。![[Pasted Image 20241206211138.jpeg]]竹芝客船ターミナルに向かって歩いてる
- 21:14 ![[Pasted Image 20241206211453.jpeg]]
- 21:20 ![[Pasted Image 20241206212053.jpeg]]
- 21:28 ![[Pasted Image 20241206212843.jpeg]]
- 21:44 フェリーに乗った ![[Pasted Image 20241206214435.jpeg]]![[Pasted Image 20241206214442.jpeg]]![[Pasted Image 20241206214447.jpeg]]
- 22:22 展望デッキが綺麗 ![[Pasted Image 20241206222051.jpeg]]![[Pasted Image 20241206222117.jpeg]]![[Pasted Image 20241206222138.jpeg]]![[Pasted Image 20241206222202.jpeg]]
当日 - 05:59 下船 ![[Pasted Image 20241207055912.jpeg]]
- 06:06 ![[Pasted Image 20241207060556.jpeg]]
- 06:27 バスに乗って会場に着いた ![[Pasted Image 20241207062701.jpeg]]
- 06:30 参加者には10km、ハーフマラソン、フルマラソンの選択肢があり、[[フルマラソン]]が圧倒的に最も多い ![[Pasted Image 20241207063019.jpeg]]
- 06:37 [[2024-12-07 伊豆大島フルマラソン]] ![[Pasted Image 20241207063727.jpeg]]
-
08:00 ![[Pasted Image 20241207080054.jpeg]] スタート
-
08:03 ![[Pasted Image 20241207080318.jpeg]]
- 08:17 ![[Pasted Image 20241207081730.jpeg]]
- 08:51 ![[Pasted Image 20241207085109.jpeg]]
- 08:52 ![[Pasted Image 20241207085239.jpeg]]
- 09:15 ![[Pasted Image 20241207091518.jpeg]]
- [ ] 09:16 ![[Pasted Image 20241207091658.jpeg]]
- 09:20 ![[Pasted Image 20241207092005.jpeg]]
- 09:38 ![[Pasted Image 20241207093843.jpeg]]
- 09:48 ![[Pasted Image 20241207094804.jpeg]]
- 09:51 ![[Pasted Image 20241207095133.jpeg]]
- 09:58 ![[Pasted Image 20241207095840.jpeg]]
- 10:01 ![[Pasted Image 20241207100112.jpeg]]
- 10:30 ![[Pasted Image 20241207103011.jpeg]]
- 10:35 ![[Pasted Image 20241207103518.jpeg]]
- 11:13 ![[Pasted Image 20241207111306.jpeg]]
- 11:26 ![[Pasted Image 20241207112647.jpeg]]
- 12:57 経験したことがない足の痛さ ![[Pasted Image 20241207114610.jpeg]]
- 12:57 完走
-
13:07 ![[Pasted Image 20241207130724.jpeg]] 完走後の味噌汁
-
13:51 温泉へ
- 15:02 ![[Pasted Image 20241207150143.jpeg]] 大島の子供たちはみんなこれで育った
- 15:07 ![[Pasted Image 20241207150751.jpeg]]
- 15:32 じゃんけん大会が始まった。景品が紹介されている ![[Pasted Image 20241207153215.jpeg]]
- 16:01 ![[Pasted Image 20241207155736.jpeg]] 「大将」に入る https://maps.app.goo.gl/xd1iXZ4pDaZsQafy7?g_st=ic 豚丼セットそばを注文
- 16:08 ![[Pasted Image 20241207160818.jpeg]]