-
@ 681ec9c0:fe78b4e7
2024-07-22 12:09:04A refugee from Twitter said they lost 10,000 followers
My first thought was, did they die?
If they didn't follow you here then they weren't your followers
But on that platform did you manage to talk with anyone
Did you get an impression of them as a living feeling human being
Did you connect with them
And if you did will they find you here or will they be a fleeting moment
Life is like that sometimes
Pay no heed to the slot machine numbers
Cherish the fleeting moments
-
@ 681ec9c0:fe78b4e7
2024-07-20 17:09:50I was puzzled when Mike Masnick claimed that Bluesky is everything Jack wished for in a decentralized social network, being as it is highly centralized
I think the discrepancy comes down to different views of the role of decentralization encapsulated in this term, enshittification
"Even if most of the users of a decentralized system don’t know or care about the fact that it’s decentralized, the fact that the underlying protocol is that way and is set up such that others can build and provide services (algorithms, moderation services, interfaces, etc.) means that Bluesky itself has strong, built-in incentives to not enshittify the service.
In some ways, Bluesky is building in the natural antidote to the activist investors that so vexed Jack at Twitter. Bluesky can simply point out that going down the enshittification path of greater and greater user extraction/worsening service just opens up someone else to step in and provide a better competing service on the same protocol. Having it be on the same protocol removes the switching costs that centralized enshittified services rely on to keep users from leaving, allowing them to enshittify. The underlying protocol that Bluesky is built on is a kind of commitment device. The company (and, in large part, its CEO Jay) is going to face tremendous pressures to make Bluesky worse.
But by committing to an open protocol they’re building, it creates a world that makes it much harder to force the company down that path. That doesn’t mean there won’t still be difficult to impossible choices to make. Because there will be. But the protocol is still there."
https://www.techdirt.com/2024/05/13/bluesky-is-building-the-decentralized-social-media-jack-dorsey-wants-even-if-he-doesnt-realize-it/
And echoed by Bluesky CEO Jay Graber
"There will always be free options, and we can't enshittify the network with ads. This is where federation comes in. The fact that anyone can self-host and anyone can build on the software means that we'll never be able to degrade the user experience in a way where people want to leave."
https://web.archive.org/web/20240209161307/https://www.wired.com/story/bluesky-ceo-jay-graber-wont-enshittify-ads/
It all comes down to this
"the protocol is still there"
In this view of decentralization, being there is sufficient
Decentralization is this thing that can happen if needed
It's a safety valve operated by market forces
And where I think Jack and most of nostr would disagree is that market forces do not cater to the rights of individuals
Because one person being deplatformed is not a market demand
Especially for ATProto where decentralization is relatively expensive
To service deplatformed users would require building four servers, each one capable of ingesting the entire network: a Relay, a Labeller, an AppView and a Feed Generator
Decentralization by default is necessary for censorship resistance
Jack talked about censorship in the interview that formed the basis for Mike's article
"I know it's early, and Nostr is weird and hard to use, but if you truly believe in censorship resistance and free speech, you have to use the technologies that actually enable that, and defend your rights."
https://www.piratewires.com/p/interview-with-jack-dorsey-mike-solana
Mike's concerns over enshittification are highly valid
I would like to see Mike address Jack's concern for censorship resistance
I think that would help understanding
-
@ 681ec9c0:fe78b4e7
2024-07-05 06:32:39"I work for a Government I despise for ends I think criminal"
John Maynard Keynes
Politicians are assholes
That hasn't changed in 5,000 years
It's objectively true that Julian Assange was persecuted by multiple democratic governments
https://thedissenter.org/inside-the-assange-plea-deal-why-the-us-government-abruptly-ended-the-case/
The difference between democracy and not democracy is tens of thousands of Julian Assanges (Iran) and hundreds of thousands of Julian Assanges (Syria, North Korea)
The difference is a full stop
nostr:nevent1qqs857j7ge4daqk4frsy5md3l0e7qnxlx3fu2zld2gxacs999fp5tkspz9mhxue69uhkummnw3ezuamfdejj7q3qcpazafytvafazxkjn43zjfwtfzatfz508r54f6z6a3rf2ws8223qxpqqqqqqzxsdxpy
Someone challenged a human rights activist and former Venezuelan political prisoner to support freedom over shilling for democracy
Placing democracy and freedom in opposition can make perfect sense to someone who is living in a liberal democracy
It does not make any sense for someone who is living in Iran, Venezuela or North Korea
At this moment in time there are several hundred thousand people being forced to work in online scam centres generating tens of $ billions of revenue for organized crime
To gain freedom they must risk their lives to escape or their families pay a ransom
They are tortured if they don't meet targets
These centres are mainly located in Cambodia and Myanmar
They are in Cambodia because Cambodia is a one-party state
The Cambodian police, judiciary and government have been bought
And they are in Myanmar where regional military fiefdoms are financed by organized crime
https://bangkok.ohchr.org/wp-content/uploads/2023/08/ONLINE-SCAM-OPERATIONS-2582023.pdf
https://www.nytimes.com/interactive/2023/12/17/world/asia/myanmar-cyber-scam.html
Spreading liberal democracy reduces human trafficking
Spreading liberal democracy increases freedom of speech
In as far as human rights activists work with objective facts and the most oppressed peoples in the world, they will work to spread democracy
Expecting anything else is unrealistic
Presenting it as a choice will only go one way
But it needn't be a choice as we're all on the same side
It's in the interest of governments to split people into sides and get them to fight on Twitter
The self-sovereign tech movement is interesting as it cuts across all political contexts
It helps people in the most oppressed parts of the world as well as the freest
It's an escape hatch and a home for some of the nicest people on the planet
It has the shape of the future
But it didn't free Julian Assange
And it doesn't solve the problem of the thousands of Julian Assanges in Iran
It didn't transition Taiwan from the white terror to an open society
nostr:nevent1qqsqfc8qgsqd7gxcmw5zw3udg56utkcj0qnp9jxemj6eht9p4e2z8vgpz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhsygqn3qlypmqmr9q2v406wa4dt5ehv44xsanedpvc8zq53wthu4j4pupsgqqqqqqsffxa78
Although it may help in all those things
Human progress toward freedom is slow and faltering
It is also inexorable
That is our history
The tide will wash away the "Supreme Leaders" and the slavers and their mad dreams
And ultimately all governments
"Many forms of Government have been tried, and will be tried in this world of sin and woe. No one pretends that democracy is perfect or all-wise. Indeed it has been said that democracy is the worst form of Government except for all those other forms that have been tried from time to time..."
Winston Churchill
-
@ e771af0b:8e8ed66f
2024-04-19 22:29:43Have you ever seen a relay and out of curiosity visited the https canonical of a relay by swapping out the
wss
withhttps
? I sure have, and I believe others have too. When I ranhttps://nostr.sandwich.farm
in late 2022/2023, I had thousands of hits to my relay's https canonical. Since then, I've dreamed of improving the look and feel of these generic default landing pages.With the release of myrelay.page v0.2, relays can now host their own customizable micro-client at their https canonical.
Transform your relay's landing page from this:
or this:
to something like this:
I say "something like this" because each page is customizable at runtime via the page itself.
In a nutshell
myrelay.page is a self-configuring, Client-Side Rendered (CSR) micro-client specifically built to be hosted at relay canonicals, customizable at runtime via NIP-78. Check out a live example.
Features:
- Dark or light theme
- Join relay
- Relay operator profile and feed
- Zap relay operator
- See people you follow who are on the relay
- Customizable by the relay operator
- Enable/disable blocks
- Sort blocks
- Add HTML blocks
- Add image blocks
- Add markdown blocks
- Add feed blocks, with two layouts (grid/list) and customizable filters.
You can find a full list of features complete and todo here
Why I created myrelay.page
For several different reasons.
Firstly, the default, bland relay pages always seemed like a missed opportunity. I jotted down an idea to build a relay micro-client in early January 2023, but never had the time to start it.
Next, I've been ramping up the refactor of nostr.watch and first need to catch up on client-side technologies and validate a few of my ideas. To do this, I have been conducting short research & development projects to prepare and validate ideas before integrating them into an app I intend to support long-term. One of those R&D projects is myrelay.page.
Additionally, I wanted to explore NIP-78 a bit more, a NIP that came into fruition after a conversation I had with @fiatjaf on February 23rd, 2023. It stemmed from the desire to store application-specific data for app customization. I have seen clients use NIP-78, but from what I've seen, their implementations are limited and do not demonstrate the full potential of NIP-78. There's more on NIP-78 towards the end of this article
The convergence of these needs and ideas, in addition to having an itch I needed to scratch, resulted in the creation of myrelay.page.
*Could be wrong, please let me know in the comments if you have examples of nostr clients that utilize NIP-78 for propagating customizations to other visitors.
Editor Flow
Now I'm going to give you a brief example of the Editor Flow on myrelay.page. There's a lot that isn't covered here, but I want to be as brief as possible.
Note: myrelay.page is alpha, there are bugs, quality of life issues and things are far from perfect.
Login
Presently, myrelay.page only supports NIP-07 authentication, but other authentication methods will be implemented at a later date.
In order to customize your page, you need to have a valid NIP-11 document that provides a valid hex
pubkey
value that is the same as the key you use to login.Click "Edit"
Add a block
For brevity, I'm going to add a markdown block
Configure the block
Add a title to the block and a sentence with markdown syntax.
Publish the configuration
Click publish and confirm the event, once it's been published to relays the page will refresh.
Note: Again it's alpha, so the page doesn't refresh after a few seconds, the publish probably failed. Press publish until it refreshes. Error handling here will improve with time.
Confirm state persistence
After reload, you should see your block persisted. Anyone who visits your page will see your newly configured page. Big caveat: Given the blessing of relays who store your configuration note, if your configuration cannot be found or you cannot connect to your relays, visitors will only see your relay's NIP-11.
Interested?
myrelay.page is alpha and only has two releases, so if you want to be an early adopter, you'll need the skillset and patience of an early adopter. That said, as long as you have some basic development and sysadmin skills as well as understand your reverse-proxy of choice, it's a quick, easy and low-risk side project that can be completed in about 20 minutes.
1. Build
yarn build
ornpm run build
orpnpm run build
(note: I had issues with pnpm and cannot guarantee they are resolved!)2. Deploy
Move the contents of
build
folder to your relay server (or another server that you can reverse-proxy to from your relay)3. Update your reverse-proxy configuration
You'll need to split your relay traffic from the http traffic, this ranges from easy to difficult, depending on your server of choice. - caddy: By far the easiest, see an example configuration for strfry here (easily adapted by those with experience to other relay software) - nginx: A little more stubborn, here's the most recent nginx config I got to work. You'll need to serve the static site from an internal port (
8080
in the aforementioned nginx conf) - haproxy: Should be easier than nginx or maybe even caddy, haven't tried yet. - no reverse-proxy: shrugsIf any of that's over your head, I'll be providing detailed guides for various deployment shapes within the next few weeks.
Exploring NIP-78
One of the special things about NIP-78 is that it is application specific, meaning, you don't need to conform to any existing NIP to make magic happen. Granted there are limits to this, as interoperability reigns supreme on nostr. However, there are many use cases where interoperability is not particularly desirable nor beneficial. It doesn't change the care needed to craft events, but it does enable a bunch of unique opportunities.
- A nostr client that is fully configurable and customized by the user.
- A nostr powered CMS that can be edited entirely on the client-side.
- Any use case where an application has special functionality or complex data structures that present no benefit in the context of interoperability (since they are "Application Specific").
Final thoughts
I was surprised at how quickly I was able to get myrelay.page customizable and loading within an acceptable timeframe;
NIP-11
, the operator'sNIP-65
and the myrelay.pageNIP-78
events all need to be fetched before the page is hydrated! While there is much to do around optimization, progressive page-loading, and general functionality, I'm very happy with the outcome of this short side project.I'll be shifting my focus over to another micro-app to validate a few concepts, and then on to the next nostr.watch. Rebuilding nostr.watch has been a high-priority item since shortly after Jack lit a flame under nostr in late 2022, but due to personal circumstances in 2023, I was unable to tackle it. Thanks to @opensats I am able to realize my ideas and explore ideas that have been keeping me up at night for a year or more.
Also, if you're a relay developer and are curious about making it easier for developers to deploy myrelay.page, get in touch.
Next article will likely be about the micro-app I briefly mentioned and nostr.watch. Until then, be well.
-
@ 3f770d65:7a745b24
2025-01-05 18:56:33New Year’s resolutions often feel boring and repetitive. Most revolve around getting in shape, eating healthier, or giving up alcohol. While the idea is interesting—using the start of a new calendar year as a catalyst for change—it also seems unnecessary. Why wait for a specific date to make a change? If you want to improve something in your life, you can just do it. You don’t need an excuse.
That’s why I’ve never been drawn to the idea of making a list of resolutions. If I wanted a change, I’d make it happen, without worrying about the calendar. At least, that’s how I felt until now—when, for once, the timing actually gave me a real reason to embrace the idea of New Year’s resolutions.
Enter Olas.
If you're a visual creator, you've likely experienced the relentless grind of building a following on platforms like Instagram—endless doomscrolling, ever-changing algorithms, and the constant pressure to stay relevant. But what if there was a better way? Olas is a Nostr-powered alternative to Instagram that prioritizes community, creativity, and value-for-value exchanges. It's a game changer.
Instagram’s failings are well-known. Its algorithm often dictates whose content gets seen, leaving creators frustrated and powerless. Monetization hurdles further alienate creators who are forced to meet arbitrary follower thresholds before earning anything. Additionally, the platform’s design fosters endless comparisons and exposure to negativity, which can take a significant toll on mental health.
Instagram’s algorithms are notorious for keeping users hooked, often at the cost of their mental health. I've spoken about this extensively, most recently at Nostr Valley, explaining how legacy social media is bad for you. You might find yourself scrolling through content that leaves you feeling anxious or drained. Olas takes a fresh approach, replacing "doomscrolling" with "bloomscrolling." This is a common theme across the Nostr ecosystem. The lack of addictive rage algorithms allows the focus to shift to uplifting, positive content that inspires rather than exhausts.
Monetization is another area where Olas will set itself apart. On Instagram, creators face arbitrary barriers to earning—needing thousands of followers and adhering to restrictive platform rules. Olas eliminates these hurdles by leveraging the Nostr protocol, enabling creators to earn directly through value-for-value exchanges. Fans can support their favorite artists instantly, with no delays or approvals required. The plan is to enable a brand new Olas account that can get paid instantly, with zero followers - that's wild.
Olas addresses these issues head-on. Operating on the open Nostr protocol, it removes centralized control over one's content’s reach or one's ability to monetize. With transparent, configurable algorithms, and a community that thrives on mutual support, Olas creates an environment where creators can grow and succeed without unnecessary barriers.
Join me on my New Year's resolution. Join me on Olas and take part in the #Olas365 challenge! It’s a simple yet exciting way to share your content. The challenge is straightforward: post at least one photo per day on Olas (though you’re welcome to share more!).
Download on Android or download via Zapstore.
Let's make waves together.
-
@ bcea2b98:7ccef3c9
2025-01-08 18:22:00originally posted at https://stacker.news/items/842405
-
@ 23b0e2f8:d8af76fc
2025-01-08 18:17:52Necessário
- Um Android que você não use mais (a câmera deve estar funcionando).
- Um cartão microSD (opcional, usado apenas uma vez).
- Um dispositivo para acompanhar seus fundos (provavelmente você já tem um).
Algumas coisas que você precisa saber
- O dispositivo servirá como um assinador. Qualquer movimentação só será efetuada após ser assinada por ele.
- O cartão microSD será usado para transferir o APK do Electrum e garantir que o aparelho não terá contato com outras fontes de dados externas após sua formatação. Contudo, é possível usar um cabo USB para o mesmo propósito.
- A ideia é deixar sua chave privada em um dispositivo offline, que ficará desligado em 99% do tempo. Você poderá acompanhar seus fundos em outro dispositivo conectado à internet, como seu celular ou computador pessoal.
O tutorial será dividido em dois módulos:
- Módulo 1 - Criando uma carteira fria/assinador.
- Módulo 2 - Configurando um dispositivo para visualizar seus fundos e assinando transações com o assinador.
No final, teremos:
- Uma carteira fria que também servirá como assinador.
- Um dispositivo para acompanhar os fundos da carteira.
Módulo 1 - Criando uma carteira fria/assinador
-
Baixe o APK do Electrum na aba de downloads em https://electrum.org/. Fique à vontade para verificar as assinaturas do software, garantindo sua autenticidade.
-
Formate o cartão microSD e coloque o APK do Electrum nele. Caso não tenha um cartão microSD, pule este passo.
- Retire os chips e acessórios do aparelho que será usado como assinador, formate-o e aguarde a inicialização.
- Durante a inicialização, pule a etapa de conexão ao Wi-Fi e rejeite todas as solicitações de conexão. Após isso, você pode desinstalar aplicativos desnecessários, pois precisará apenas do Electrum. Certifique-se de que Wi-Fi, Bluetooth e dados móveis estejam desligados. Você também pode ativar o modo avião.\ (Curiosidade: algumas pessoas optam por abrir o aparelho e danificar a antena do Wi-Fi/Bluetooth, impossibilitando essas funcionalidades.)
- Insira o cartão microSD com o APK do Electrum no dispositivo e instale-o. Será necessário permitir instalações de fontes não oficiais.
- No Electrum, crie uma carteira padrão e gere suas palavras-chave (seed). Anote-as em um local seguro. Caso algo aconteça com seu assinador, essas palavras permitirão o acesso aos seus fundos novamente. (Aqui entra seu método pessoal de backup.)
Módulo 2 - Configurando um dispositivo para visualizar seus fundos e assinando transações com o assinador.
-
Criar uma carteira somente leitura em outro dispositivo, como seu celular ou computador pessoal, é uma etapa bastante simples. Para este tutorial, usaremos outro smartphone Android com Electrum. Instale o Electrum a partir da aba de downloads em https://electrum.org/ ou da própria Play Store. (ATENÇÃO: O Electrum não existe oficialmente para iPhone. Desconfie se encontrar algum.)
-
Após instalar o Electrum, crie uma carteira padrão, mas desta vez escolha a opção Usar uma chave mestra.
- Agora, no assinador que criamos no primeiro módulo, exporte sua chave pública: vá em Carteira > Detalhes da carteira > Compartilhar chave mestra pública.
-
Escaneie o QR gerado da chave pública com o dispositivo de consulta. Assim, ele poderá acompanhar seus fundos, mas sem permissão para movimentá-los.
-
Para receber fundos, envie Bitcoin para um dos endereços gerados pela sua carteira: Carteira > Addresses/Coins.
-
Para movimentar fundos, crie uma transação no dispositivo de consulta. Como ele não possui a chave privada, será necessário assiná-la com o dispositivo assinador.
- No assinador, escaneie a transação não assinada, confirme os detalhes, assine e compartilhe. Será gerado outro QR, desta vez com a transação já assinada.
- No dispositivo de consulta, escaneie o QR da transação assinada e transmita-a para a rede.
Conclusão
Pontos positivos do setup:
- Simplicidade: Basta um dispositivo Android antigo.
- Flexibilidade: Funciona como uma ótima carteira fria, ideal para holders.
Pontos negativos do setup:
- Padronização: Não utiliza seeds no padrão BIP-39, você sempre precisará usar o electrum.
- Interface: A aparência do Electrum pode parecer antiquada para alguns usuários.
Nesse ponto, temos uma carteira fria que também serve para assinar transações. O fluxo de assinar uma transação se torna: Gerar uma transação não assinada > Escanear o QR da transação não assinada > Conferir e assinar essa transação com o assinador > Gerar QR da transação assinada > Escanear a transação assinada com qualquer outro dispositivo que possa transmiti-la para a rede.
Como alguns devem saber, uma transação assinada de Bitcoin é praticamente impossível de ser fraudada. Em um cenário catastrófico, você pode mesmo que sem internet, repassar essa transação assinada para alguém que tenha acesso à rede por qualquer meio de comunicação. Mesmo que não queiramos que isso aconteça um dia, esse setup acaba por tornar essa prática possível.
-
@ f9c0ea75:44e849f4
2025-01-08 18:15:47Nos anos 80, o Brasil testemunhou um dos momentos mais patéticos da sua história econômica: os "Fiscais do Sarney". Movidos por um decreto inútil, cidadãos foram incentivados a denunciar comerciantes que não seguissem o tabelamento de preços imposto pelo governo. O resultado? Um fracasso absoluto, prateleiras vazias, inflação descontrolada e a certeza de que a mentalidade fiscalizadora não gera valor para ninguém – apenas sufoca a economia e reforça o atraso.
Agora, décadas depois, vemos a mesma mentalidade derrotada ressurgir na Receita Federal com a fiscalização automática sobre transações acima de R$ 5.000 via PIX. Em vez de buscar um ambiente mais produtivo e inovador, o governo se empenha em monitorar cada centavo que circula, tratando qualquer movimentação um pouco maior como suspeita. Quem ganha com isso? Certamente não é o cidadão honesto, nem a economia real.
E quem são os protagonistas dessa história? Os novos fiscais da Receita Federal, que assumem um papel tão irrelevante quanto o dos fiscais de Sarney. Um trabalho de baixo valor agregado, que não contribui para a criação de riqueza ou inovação. São apenas burocratas modernos, presos na mentalidade de que controlar e punir é mais importante do que fomentar o crescimento e a liberdade financeira.
A história já provou que o fiscalismo estatal é um modelo falido, seja tabelando preços ou perseguindo transações financeiras. Enquanto alguns criam, inovam e geram valor, outros se ocupam apenas de vigiar e tributar. O tempo sempre mostrou quem estava certo.
Nos anos 80, o Brasil testemunhou um dos momentos mais patéticos da sua história econômica: os "Fiscais do Sarney". Movidos por um decreto inútil, cidadãos foram incentivados a denunciar comerciantes que não seguissem o tabelamento de preços imposto pelo governo. O resultado? Um fracasso absoluto, prateleiras vazias, inflação descontrolada e a certeza de que a mentalidade fiscalizadora não gera valor para ninguém – apenas sufoca a economia e reforça o atraso.
Agora, décadas depois, vemos a mesma mentalidade derrotada ressurgir na Receita Federal com a fiscalização automática sobre transações acima de R$ 5.000 via PIX. Em vez de buscar um ambiente mais produtivo e inovador, o governo se empenha em monitorar cada centavo que circula, tratando qualquer movimentação um pouco maior como suspeita. Quem ganha com isso? Certamente não é o cidadão honesto, nem a economia real.
E quem são os protagonistas dessa história? Os novos fiscais da Receita Federal, que assumem um papel tão irrelevante quanto o dos fiscais de Sarney. Um trabalho de baixo valor agregado, que não contribui para a criação de riqueza ou inovação. São apenas burocratas modernos, presos na mentalidade de que controlar e punir é mais importante do que fomentar o crescimento e a liberdade financeira.
A história já provou que o fiscalismo estatal é um modelo falido, seja tabelando preços ou perseguindo transações financeiras. Enquanto alguns criam, inovam e geram valor, outros se ocupam apenas de vigiar e tributar. O tempo sempre mostrou quem estava certo.
-
@ e6817453:b0ac3c39
2025-01-05 14:29:17The Rise of Graph RAGs and the Quest for Data Quality
As we enter a new year, it’s impossible to ignore the boom of retrieval-augmented generation (RAG) systems, particularly those leveraging graph-based approaches. The previous year saw a surge in advancements and discussions about Graph RAGs, driven by their potential to enhance large language models (LLMs), reduce hallucinations, and deliver more reliable outputs. Let’s dive into the trends, challenges, and strategies for making the most of Graph RAGs in artificial intelligence.
Booming Interest in Graph RAGs
Graph RAGs have dominated the conversation in AI circles. With new research papers and innovations emerging weekly, it’s clear that this approach is reshaping the landscape. These systems, especially those developed by tech giants like Microsoft, demonstrate how graphs can:
- Enhance LLM Outputs: By grounding responses in structured knowledge, graphs significantly reduce hallucinations.
- Support Complex Queries: Graphs excel at managing linked and connected data, making them ideal for intricate problem-solving.
Conferences on linked and connected data have increasingly focused on Graph RAGs, underscoring their central role in modern AI systems. However, the excitement around this technology has brought critical questions to the forefront: How do we ensure the quality of the graphs we’re building, and are they genuinely aligned with our needs?
Data Quality: The Foundation of Effective Graphs
A high-quality graph is the backbone of any successful RAG system. Constructing these graphs from unstructured data requires attention to detail and rigorous processes. Here’s why:
- Richness of Entities: Effective retrieval depends on graphs populated with rich, detailed entities.
- Freedom from Hallucinations: Poorly constructed graphs amplify inaccuracies rather than mitigating them.
Without robust data quality, even the most sophisticated Graph RAGs become ineffective. As a result, the focus must shift to refining the graph construction process. Improving data strategy and ensuring meticulous data preparation is essential to unlock the full potential of Graph RAGs.
Hybrid Graph RAGs and Variations
While standard Graph RAGs are already transformative, hybrid models offer additional flexibility and power. Hybrid RAGs combine structured graph data with other retrieval mechanisms, creating systems that:
- Handle diverse data sources with ease.
- Offer improved adaptability to complex queries.
Exploring these variations can open new avenues for AI systems, particularly in domains requiring structured and unstructured data processing.
Ontology: The Key to Graph Construction Quality
Ontology — defining how concepts relate within a knowledge domain — is critical for building effective graphs. While this might sound abstract, it’s a well-established field blending philosophy, engineering, and art. Ontology engineering provides the framework for:
- Defining Relationships: Clarifying how concepts connect within a domain.
- Validating Graph Structures: Ensuring constructed graphs are logically sound and align with domain-specific realities.
Traditionally, ontologists — experts in this discipline — have been integral to large enterprises and research teams. However, not every team has access to dedicated ontologists, leading to a significant challenge: How can teams without such expertise ensure the quality of their graphs?
How to Build Ontology Expertise in a Startup Team
For startups and smaller teams, developing ontology expertise may seem daunting, but it is achievable with the right approach:
- Assign a Knowledge Champion: Identify a team member with a strong analytical mindset and give them time and resources to learn ontology engineering.
- Provide Training: Invest in courses, workshops, or certifications in knowledge graph and ontology creation.
- Leverage Partnerships: Collaborate with academic institutions, domain experts, or consultants to build initial frameworks.
- Utilize Tools: Introduce ontology development tools like Protégé, OWL, or SHACL to simplify the creation and validation process.
- Iterate with Feedback: Continuously refine ontologies through collaboration with domain experts and iterative testing.
So, it is not always affordable for a startup to have a dedicated oncologist or knowledge engineer in a team, but you could involve consulters or build barefoot experts.
You could read about barefoot experts in my article :
Even startups can achieve robust and domain-specific ontology frameworks by fostering in-house expertise.
How to Find or Create Ontologies
For teams venturing into Graph RAGs, several strategies can help address the ontology gap:
-
Leverage Existing Ontologies: Many industries and domains already have open ontologies. For instance:
-
Public Knowledge Graphs: Resources like Wikipedia’s graph offer a wealth of structured knowledge.
- Industry Standards: Enterprises such as Siemens have invested in creating and sharing ontologies specific to their fields.
-
Business Framework Ontology (BFO): A valuable resource for enterprises looking to define business processes and structures.
-
Build In-House Expertise: If budgets allow, consider hiring knowledge engineers or providing team members with the resources and time to develop expertise in ontology creation.
-
Utilize LLMs for Ontology Construction: Interestingly, LLMs themselves can act as a starting point for ontology development:
-
Prompt-Based Extraction: LLMs can generate draft ontologies by leveraging their extensive training on graph data.
- Domain Expert Refinement: Combine LLM-generated structures with insights from domain experts to create tailored ontologies.
Parallel Ontology and Graph Extraction
An emerging approach involves extracting ontologies and graphs in parallel. While this can streamline the process, it presents challenges such as:
- Detecting Hallucinations: Differentiating between genuine insights and AI-generated inaccuracies.
- Ensuring Completeness: Ensuring no critical concepts are overlooked during extraction.
Teams must carefully validate outputs to ensure reliability and accuracy when employing this parallel method.
LLMs as Ontologists
While traditionally dependent on human expertise, ontology creation is increasingly supported by LLMs. These models, trained on vast amounts of data, possess inherent knowledge of many open ontologies and taxonomies. Teams can use LLMs to:
- Generate Skeleton Ontologies: Prompt LLMs with domain-specific information to draft initial ontology structures.
- Validate and Refine Ontologies: Collaborate with domain experts to refine these drafts, ensuring accuracy and relevance.
However, for validation and graph construction, formal tools such as OWL, SHACL, and RDF should be prioritized over LLMs to minimize hallucinations and ensure robust outcomes.
Final Thoughts: Unlocking the Power of Graph RAGs
The rise of Graph RAGs underscores a simple but crucial correlation: improving graph construction and data quality directly enhances retrieval systems. To truly harness this power, teams must invest in understanding ontologies, building quality graphs, and leveraging both human expertise and advanced AI tools.
As we move forward, the interplay between Graph RAGs and ontology engineering will continue to shape the future of AI. Whether through adopting existing frameworks or exploring innovative uses of LLMs, the path to success lies in a deep commitment to data quality and domain understanding.
Have you explored these technologies in your work? Share your experiences and insights — and stay tuned for more discussions on ontology extraction and its role in AI advancements. Cheers to a year of innovation!
-
@ a4a6b584:1e05b95b
2025-01-02 18:13:31The Four-Layer Framework
Layer 1: Zoom Out
Start by looking at the big picture. What’s the subject about, and why does it matter? Focus on the overarching ideas and how they fit together. Think of this as the 30,000-foot view—it’s about understanding the "why" and "how" before diving into the "what."
Example: If you’re learning programming, start by understanding that it’s about giving logical instructions to computers to solve problems.
- Tip: Keep it simple. Summarize the subject in one or two sentences and avoid getting bogged down in specifics at this stage.
Once you have the big picture in mind, it’s time to start breaking it down.
Layer 2: Categorize and Connect
Now it’s time to break the subject into categories—like creating branches on a tree. This helps your brain organize information logically and see connections between ideas.
Example: Studying biology? Group concepts into categories like cells, genetics, and ecosystems.
- Tip: Use headings or labels to group similar ideas. Jot these down in a list or simple diagram to keep track.
With your categories in place, you’re ready to dive into the details that bring them to life.
Layer 3: Master the Details
Once you’ve mapped out the main categories, you’re ready to dive deeper. This is where you learn the nuts and bolts—like formulas, specific techniques, or key terminology. These details make the subject practical and actionable.
Example: In programming, this might mean learning the syntax for loops, conditionals, or functions in your chosen language.
- Tip: Focus on details that clarify the categories from Layer 2. Skip anything that doesn’t add to your understanding.
Now that you’ve mastered the essentials, you can expand your knowledge to include extra material.
Layer 4: Expand Your Horizons
Finally, move on to the extra material—less critical facts, trivia, or edge cases. While these aren’t essential to mastering the subject, they can be useful in specialized discussions or exams.
Example: Learn about rare programming quirks or historical trivia about a language’s development.
- Tip: Spend minimal time here unless it’s necessary for your goals. It’s okay to skim if you’re short on time.
Pro Tips for Better Learning
1. Use Active Recall and Spaced Repetition
Test yourself without looking at notes. Review what you’ve learned at increasing intervals—like after a day, a week, and a month. This strengthens memory by forcing your brain to actively retrieve information.
2. Map It Out
Create visual aids like diagrams or concept maps to clarify relationships between ideas. These are particularly helpful for organizing categories in Layer 2.
3. Teach What You Learn
Explain the subject to someone else as if they’re hearing it for the first time. Teaching exposes any gaps in your understanding and helps reinforce the material.
4. Engage with LLMs and Discuss Concepts
Take advantage of tools like ChatGPT or similar large language models to explore your topic in greater depth. Use these tools to:
- Ask specific questions to clarify confusing points.
- Engage in discussions to simulate real-world applications of the subject.
- Generate examples or analogies that deepen your understanding.Tip: Use LLMs as a study partner, but don’t rely solely on them. Combine these insights with your own critical thinking to develop a well-rounded perspective.
Get Started
Ready to try the Four-Layer Method? Take 15 minutes today to map out the big picture of a topic you’re curious about—what’s it all about, and why does it matter? By building your understanding step by step, you’ll master the subject with less stress and more confidence.
-
@ 3f770d65:7a745b24
2024-12-31 17:03:46Here are my predictions for Nostr in 2025:
Decentralization: The outbox and inbox communication models, sometimes referred to as the Gossip model, will become the standard across the ecosystem. By the end of 2025, all major clients will support these models, providing seamless communication and enhanced decentralization. Clients that do not adopt outbox/inbox by then will be regarded as outdated or legacy systems.
Privacy Standards: Major clients such as Damus and Primal will move away from NIP-04 DMs, adopting more secure protocol possibilities like NIP-17 or NIP-104. These upgrades will ensure enhanced encryption and metadata protection. Additionally, NIP-104 MLS tools will drive the development of new clients and features, providing users with unprecedented control over the privacy of their communications.
Interoperability: Nostr's ecosystem will become even more interconnected. Platforms like the Olas image-sharing service will expand into prominent clients such as Primal, Damus, Coracle, and Snort, alongside existing integrations with Amethyst, Nostur, and Nostrudel. Similarly, audio and video tools like Nostr Nests and Zap.stream will gain seamless integration into major clients, enabling easy participation in live events across the ecosystem.
Adoption and Migration: Inspired by early pioneers like Fountain and Orange Pill App, more platforms will adopt Nostr for authentication, login, and social systems. In 2025, a significant migration from a high-profile application platform with hundreds of thousands of users will transpire, doubling Nostr’s daily activity and establishing it as a cornerstone of decentralized technologies.
-
@ 6e468422:15deee93
2024-12-21 19:25:26We didn't hear them land on earth, nor did we see them. The spores were not visible to the naked eye. Like dust particles, they softly fell, unhindered, through our atmosphere, covering the earth. It took us a while to realize that something extraordinary was happening on our planet. In most places, the mushrooms didn't grow at all. The conditions weren't right. In some places—mostly rocky places—they grew large enough to be noticeable. People all over the world posted pictures online. "White eggs," they called them. It took a bit until botanists and mycologists took note. Most didn't realize that we were dealing with a species unknown to us.
We aren't sure who sent them. We aren't even sure if there is a "who" behind the spores. But once the first portals opened up, we learned that these mushrooms aren't just a quirk of biology. The portals were small at first—minuscule, even. Like a pinhole camera, we were able to glimpse through, but we couldn't make out much. We were only able to see colors and textures if the conditions were right. We weren't sure what we were looking at.
We still don't understand why some mushrooms open up, and some don't. Most don't. What we do know is that they like colder climates and high elevations. What we also know is that the portals don't stay open for long. Like all mushrooms, the flush only lasts for a week or two. When a portal opens, it looks like the mushroom is eating a hole into itself at first. But the hole grows, and what starts as a shimmer behind a grey film turns into a clear picture as the egg ripens. When conditions are right, portals will remain stable for up to three days. Once the fruit withers, the portal closes, and the mushroom decays.
The eggs grew bigger year over year. And with it, the portals. Soon enough, the portals were big enough to stick your finger through. And that's when things started to get weird...
-
@ 20986fb8:cdac21b3
2024-12-18 03:19:36English
Introducing YakiHonne: Write Without Limits
YakiHonne is the ultimate text editor designed to help you express yourself creatively, no matter the language.
Features you'll love:
- 🌟 Rich Formatting: Add headings, bold, italics, and more.
- 🌏 Multilingual Support: Seamlessly write in English, Chinese, Arabic, and Japanese.
- 🔗 Interactive Links: Learn more about YakiHonne.Benefits:
1. Easy to use. 2. Enhance readability with customizable styles.
3. Supports various complex formats including LateX."YakiHonne is a game-changer for content creators."
-
@ fe32298e:20516265
2024-12-16 20:59:13Today I learned how to install NVapi to monitor my GPUs in Home Assistant.
NVApi is a lightweight API designed for monitoring NVIDIA GPU utilization and enabling automated power management. It provides real-time GPU metrics, supports integration with tools like Home Assistant, and offers flexible power management and PCIe link speed management based on workload and thermal conditions.
- GPU Utilization Monitoring: Utilization, memory usage, temperature, fan speed, and power consumption.
- Automated Power Limiting: Adjusts power limits dynamically based on temperature thresholds and total power caps, configurable per GPU or globally.
- Cross-GPU Coordination: Total power budget applies across multiple GPUs in the same system.
- PCIe Link Speed Management: Controls minimum and maximum PCIe link speeds with idle thresholds for power optimization.
- Home Assistant Integration: Uses the built-in RESTful platform and template sensors.
Getting the Data
sudo apt install golang-go git clone https://github.com/sammcj/NVApi.git cd NVapi go run main.go -port 9999 -rate 1 curl http://localhost:9999/gpu
Response for a single GPU:
[ { "index": 0, "name": "NVIDIA GeForce RTX 4090", "gpu_utilisation": 0, "memory_utilisation": 0, "power_watts": 16, "power_limit_watts": 450, "memory_total_gb": 23.99, "memory_used_gb": 0.46, "memory_free_gb": 23.52, "memory_usage_percent": 2, "temperature": 38, "processes": [], "pcie_link_state": "not managed" } ]
Response for multiple GPUs:
[ { "index": 0, "name": "NVIDIA GeForce RTX 3090", "gpu_utilisation": 0, "memory_utilisation": 0, "power_watts": 14, "power_limit_watts": 350, "memory_total_gb": 24, "memory_used_gb": 0.43, "memory_free_gb": 23.57, "memory_usage_percent": 2, "temperature": 36, "processes": [], "pcie_link_state": "not managed" }, { "index": 1, "name": "NVIDIA RTX A4000", "gpu_utilisation": 0, "memory_utilisation": 0, "power_watts": 10, "power_limit_watts": 140, "memory_total_gb": 15.99, "memory_used_gb": 0.56, "memory_free_gb": 15.43, "memory_usage_percent": 3, "temperature": 41, "processes": [], "pcie_link_state": "not managed" } ]
Start at Boot
Create
/etc/systemd/system/nvapi.service
:``` [Unit] Description=Run NVapi After=network.target
[Service] Type=simple Environment="GOPATH=/home/ansible/go" WorkingDirectory=/home/ansible/NVapi ExecStart=/usr/bin/go run main.go -port 9999 -rate 1 Restart=always User=ansible
Environment="GPU_TEMP_CHECK_INTERVAL=5"
Environment="GPU_TOTAL_POWER_CAP=400"
Environment="GPU_0_LOW_TEMP=40"
Environment="GPU_0_MEDIUM_TEMP=70"
Environment="GPU_0_LOW_TEMP_LIMIT=135"
Environment="GPU_0_MEDIUM_TEMP_LIMIT=120"
Environment="GPU_0_HIGH_TEMP_LIMIT=100"
Environment="GPU_1_LOW_TEMP=45"
Environment="GPU_1_MEDIUM_TEMP=75"
Environment="GPU_1_LOW_TEMP_LIMIT=140"
Environment="GPU_1_MEDIUM_TEMP_LIMIT=125"
Environment="GPU_1_HIGH_TEMP_LIMIT=110"
[Install] WantedBy=multi-user.target ```
Home Assistant
Add to Home Assistant
configuration.yaml
and restart HA (completely).For a single GPU, this works: ``` sensor: - platform: rest name: MYPC GPU Information resource: http://mypc:9999 method: GET headers: Content-Type: application/json value_template: "{{ value_json[0].index }}" json_attributes: - name - gpu_utilisation - memory_utilisation - power_watts - power_limit_watts - memory_total_gb - memory_used_gb - memory_free_gb - memory_usage_percent - temperature scan_interval: 1 # seconds
- platform: template sensors: mypc_gpu_0_gpu: friendly_name: "MYPC {{ state_attr('sensor.mypc_gpu_information', 'name') }} GPU" value_template: "{{ state_attr('sensor.mypc_gpu_information', 'gpu_utilisation') }}" unit_of_measurement: "%" mypc_gpu_0_memory: friendly_name: "MYPC {{ state_attr('sensor.mypc_gpu_information', 'name') }} Memory" value_template: "{{ state_attr('sensor.mypc_gpu_information', 'memory_utilisation') }}" unit_of_measurement: "%" mypc_gpu_0_power: friendly_name: "MYPC {{ state_attr('sensor.mypc_gpu_information', 'name') }} Power" value_template: "{{ state_attr('sensor.mypc_gpu_information', 'power_watts') }}" unit_of_measurement: "W" mypc_gpu_0_power_limit: friendly_name: "MYPC {{ state_attr('sensor.mypc_gpu_information', 'name') }} Power Limit" value_template: "{{ state_attr('sensor.mypc_gpu_information', 'power_limit_watts') }}" unit_of_measurement: "W" mypc_gpu_0_temperature: friendly_name: "MYPC {{ state_attr('sensor.mypc_gpu_information', 'name') }} Temperature" value_template: "{{ state_attr('sensor.mypc_gpu_information', 'temperature') }}" unit_of_measurement: "°C" ```
For multiple GPUs: ``` rest: scan_interval: 1 resource: http://mypc:9999 sensor: - name: "MYPC GPU0 Information" value_template: "{{ value_json[0].index }}" json_attributes_path: "$.0" json_attributes: - name - gpu_utilisation - memory_utilisation - power_watts - power_limit_watts - memory_total_gb - memory_used_gb - memory_free_gb - memory_usage_percent - temperature - name: "MYPC GPU1 Information" value_template: "{{ value_json[1].index }}" json_attributes_path: "$.1" json_attributes: - name - gpu_utilisation - memory_utilisation - power_watts - power_limit_watts - memory_total_gb - memory_used_gb - memory_free_gb - memory_usage_percent - temperature
-
platform: template sensors: mypc_gpu_0_gpu: friendly_name: "MYPC GPU0 GPU" value_template: "{{ state_attr('sensor.mypc_gpu0_information', 'gpu_utilisation') }}" unit_of_measurement: "%" mypc_gpu_0_memory: friendly_name: "MYPC GPU0 Memory" value_template: "{{ state_attr('sensor.mypc_gpu0_information', 'memory_utilisation') }}" unit_of_measurement: "%" mypc_gpu_0_power: friendly_name: "MYPC GPU0 Power" value_template: "{{ state_attr('sensor.mypc_gpu0_information', 'power_watts') }}" unit_of_measurement: "W" mypc_gpu_0_power_limit: friendly_name: "MYPC GPU0 Power Limit" value_template: "{{ state_attr('sensor.mypc_gpu0_information', 'power_limit_watts') }}" unit_of_measurement: "W" mypc_gpu_0_temperature: friendly_name: "MYPC GPU0 Temperature" value_template: "{{ state_attr('sensor.mypc_gpu0_information', 'temperature') }}" unit_of_measurement: "C"
-
platform: template sensors: mypc_gpu_1_gpu: friendly_name: "MYPC GPU1 GPU" value_template: "{{ state_attr('sensor.mypc_gpu1_information', 'gpu_utilisation') }}" unit_of_measurement: "%" mypc_gpu_1_memory: friendly_name: "MYPC GPU1 Memory" value_template: "{{ state_attr('sensor.mypc_gpu1_information', 'memory_utilisation') }}" unit_of_measurement: "%" mypc_gpu_1_power: friendly_name: "MYPC GPU1 Power" value_template: "{{ state_attr('sensor.mypc_gpu1_information', 'power_watts') }}" unit_of_measurement: "W" mypc_gpu_1_power_limit: friendly_name: "MYPC GPU1 Power Limit" value_template: "{{ state_attr('sensor.mypc_gpu1_information', 'power_limit_watts') }}" unit_of_measurement: "W" mypc_gpu_1_temperature: friendly_name: "MYPC GPU1 Temperature" value_template: "{{ state_attr('sensor.mypc_gpu1_information', 'temperature') }}" unit_of_measurement: "C"
```
Basic entity card:
type: entities entities: - entity: sensor.mypc_gpu_0_gpu secondary_info: last-updated - entity: sensor.mypc_gpu_0_memory secondary_info: last-updated - entity: sensor.mypc_gpu_0_power secondary_info: last-updated - entity: sensor.mypc_gpu_0_power_limit secondary_info: last-updated - entity: sensor.mypc_gpu_0_temperature secondary_info: last-updated
Ansible Role
```
-
name: install go become: true package: name: golang-go state: present
-
name: git clone git: repo: "https://github.com/sammcj/NVApi.git" dest: "/home/ansible/NVapi" update: yes force: true
go run main.go -port 9999 -rate 1
-
name: install systemd service become: true copy: src: nvapi.service dest: /etc/systemd/system/nvapi.service
-
name: Reload systemd daemons, enable, and restart nvapi become: true systemd: name: nvapi daemon_reload: yes enabled: yes state: restarted ```
-
@ 1cb14ab3:95d52462
2025-01-08 18:11:43
Previous Works in the Series:
More from Hes:
All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from these photos, please feel free to send a zap. Enjoy life on a Bitcoin standard.
-
@ bf47c19e:c3d2573b
2025-01-08 18:06:36Originalni tekst na danas.rs
22.09.2024 / Autor: Marko Matanović
Bitkoin je 2009. godine zamišljen da bude digitalni keš. Zvučalo je revolucionarno zbog toga što je mnoge dovelo u dilemu: kako nešto potpuno digitalno može da ima vrednost i bude valuta.
Pre 15 godina smo živeli u društvu u kome je preko 95 odsto ukupnog novca u opticaju već potpuno digitalno i virtuelno.
Danas je još više izražena digitalizacija novca. Bitkoin je bio deo procesa evolucije više nego revolucije kada je u pitanju barem forma “novca”.
Petnaest godina kasnije bitkoin nije zamenio tradicionalne valute: dolare, evre, dinare. I verovatno to neće uraditi. Nije ispunio početnu zamisao, digitalni novac.
Ali se nametnuo kao čuvar vrednosti. Jedan od razloga je jednostavan. Kada posedujemo bilo koji oblik imovine, uvek ćemo za plaćanje (čemu novac većini ljudi i služi) koristiti najmanje kvalitetan novac, onaj koji vremenom ne dobija na vrednosti ili je gubi čak.
Veći deo vlasnika bitkoina veruje da će njegova vrednost rasti vremenom. Dok s druge strane imamo dinar, evro ili dolar koji će 100 odsto za godinu dana vredeti dva odsto ili 15 odsto manje. Zbog toga većina vlasnika bitkoina ga neće koristiti da kupuje hleb ili plaća račune za telefon, tj. kao sredstvo plaćanja.
Za razliku od fizičkog zlata, svima poznatog, jedna od prednosti bitkoina je prenosivost. Bitkoin infrastruktura funkcioniše tako da se svaka transakcija prenosa bitkoina obavlja u proseku za 10-ak minuta, 24/7/365.
Ta transakcija će se realizovati 100 odsto ako je usklađena sa pravilima Bitkoin ekosistema. Pravila su pritom transparentna, ista, lako primenljiva za sve. Iz ovoga se nameće i druga i treća potencijalna prednost bitkoina u odnosu na zlato. Bez obzira na količinu i vrednost bitkoina koji se kroz transakciju prenose, vreme tog prenosa je oko 10 minuta. A cena obrade transakcije zanemarljiva. Par dolara ili manje. Na dan pisanja teksta, kilogram zlata je vredeo oko 84.000 dolara ili 10 kilograma oko 840.000 dolara itd. Slične vrednosti je 1,4 bitkoin, tj. 14 bitkoina…
Postoje ozbiljni regulatorni, sigurnosni, vremenski, troškovni izazovi prenosa pomenutih količina zlata s jedne lokacije na drugu ili u drugu državu. Za prenos 0.0001 btc-a (bitkoina), vrednosti oko šest dolara ili za prenos 1.000 btc, vrednosti oko 60 miliona dolara trebaće vam 10 minuta. Transakcije vas mogu koštati i manje od jednog dolara!
I ne postoji bezbednosni rizik. Neuporedivo brže, sigurnije, jeftinije. Neki kažu da je bitkoin „digitalno zlato“ i pouzdana mreža za prenos vrednosti.
Bitkoin su u početku koristili samo pojedinci, fizička lica. Danas ga koriste i kompanije i neke države. Pojedinci deo sredstava prebacuju u bitkoine, kako bi se sačuvali od inflacije koja je u skoro svim ekonomijama prisutna i obezvređuje novac koji posedujemo.
Neki u njemu vide potencijal rasta vrednosti. Neki se bave “trading-om”, špekulisanjem u nadi da će kratkoročno zaraditi. Neki ga koriste da bi preneli vrednost brže i lakše.
U ratom zahvaćenih delovima sveta, deo populacije je kroz bitkoin i kriptovalute imao jedinu mogućnost da spase svoju do tada stečenu imovinu. U tim situacijama ne možete nekretninu, zlato, umetnička dela, automobile lako preneti ili sačuvati. Često su tada blokirani bankarski računi ili rad banaka. Ali, deo sredstava se može prebaciti u kriptovalute.
Zbog toga u Srbiji puno ljudi koji su se sklonili iz Rusije i Ukrajine zapravo koristi kriptovalute. Globalno, kompanije kupuju bitkoine, jer imaju investiciono usmerenje ili usmerenje ka diversifikaciji sredstava. I takođe bitkoin ili neke druge kriptovalute koriste kao sredstvo plaćanja u internacionalnom poslovanju. Neuporedivo je veća brzina realizacije transakcija kritpovaluta u poređenju sa transakcijama koje idu kroz bankarski sistem.
Postoje jurisdikcije koje nisu integrisane u globalne finansijske sisteme i ne postoji način naplate i saradnje dve kompanije iz dve države. Sve dok se kripto nije pojavio. Države imaju različite stavove po pitanju kripta. Neke ga kupuju. Neke ga rudare čak.
Ali većina je donela regulatorne okvire koji definišu zakonske mogućnosti i načine korišćenja kriptovaluta. I za građane i za kompanije. I za firme koje pružaju usluge povezane za kriptovalutama u tim državama. U Srbiji se primenjuje Zakon o digitalnoj imovini od 2021. godine i time su postavljeni dodatni regulatorni okviri.
SPLET konferencija koja se 8. oktobra održava u Beogradu je deo svog programa posvetila temama povezanim sa kriptovalutama, tokenizacijom, pravnim aspektima tog sveta.
ECD.rs, prva kriptomenjačnica u Srbiji, će imati svoje predstavnike i paneliste na SPLET-u. Cilj je da još dublje zaronimo u ove teme. Želimo da ponudimo dodatne uvide, odgovore. Delićemo iskustvo od 12 i više godina bavljenja kriptovalutama. Vidimo se na SPLET-u!
Splet konferenciju zajednički organizuju projekti „Preduzmi ideju“ u realizaciji Inicijative „Digitalna Srbija“ i „Srbija Inovira“, koje sprovodi ICT HUB, u saradnji sa Američkom agencijom za međunarodni razvoj (USAID). Ovogodišnju konferenciju realizuju i uz podršku i pokroviteljstvo Ministarstva nauke, tehnološkog razvoja i inovacija.
-
@ bf47c19e:c3d2573b
2025-01-08 17:55:06Originalni tekst za nin.rs.
09.10.2024 / Autor: Marko Matanović
Najveći deo stvari merimo zajedničkim imeniteljem – novcem. Fantastični izum društva. Olakšava komunikaciju, saradnju i napredak civilizacije. Trenutna novčana vrednost mnogih stvari ne mora biti pokazatelj realne ili vrednosti na duge staze.
Bitkoin kao kriptovaluta ima svojih uspona i padova. U ceni. Kada nešto vredi nula pa krene od par mesta desno iza decimalnog zareza u $ protivvrednosti i završi na 50.000 ili 70.000$, može se reći da je bilo više uspona nego padova.
Zamišljen i najavljen je kao digitalni keš 2008. godine. Preskačući prvu godinu ili dve, rezervisane skoro isključivo za uzak krug programera, sledi poistovećivanje bitkoina sa sredstvom za plaćanja ilegalnih usluga i proizvoda. Zbog delimične zablude da su transakcije bitkoinom anonimne.
Godine 2013. godine pada Silk Road platforma, online marketplace, na kome se za bitkoin moglo kupiti puno toga ilegalnog. Po nekima to je i konačni pad bitkoina. Iz današnje perspektive, neupućena osoba može i dalje ostati pri stavu da je bitkoin pretežno tu za izvršenje ilegalnih transakcija. Bitkoin i danas postoji, Silk Road ne.
Par meseci posle Silk Road-a, pada i tada pratkično jedina “ozbiljna” kripto berza Mt. Gox. U to vreme odgovorna za 70%+ svih bitkoin transakcija. Tačno 10 godina kasnije, svedoci smo vraćanja dela izgubljenih sredstava (oko 25%) tadašnjim vlasnicima naloga na Mt. Gox berzi. Bitkoin je danas 100 puta vredniji nego pre 2014. Taj vraćeni “delić” izgubljenih bitkoina njegovim vlasnicima je danas “samo” 25 puta vredniji.
Bilo je još dosta propalih kripto projekata. I biće ih. Među poznatijim, prevara iza OneCoin-a. Sunovrat UST-a i Lune, Celsius i FTX bankroti. Svaki odogovoran za gubitke koji prelaze milijarde dolara. Bitkoin je i dalje tu. Bitkoin je imao i konkurente iz redova kriptovaluta. Poslednji pravi je iz 2017. godine i “Bitcoin Cash”. Danas kada se pogleda gde je jedan a gde drugi sve je jasno.
Satoshi Nakamoto, ime iza ideje bitkoina i njegovog lansiranja, je postavio fascinantne postulate na kojima će prva kriptovaluta funkcionisati. A inspirisan manjkavostima globalnog finansijskog sistema. Bitkoin je baziran na transparentnom, decentralizovanom sistemu. Dostupan svima, sa jednakim i izuzetno niskim barijerama ulaska i izlaska iz tog ekosistema. Funkcioniše po setu pravila koja su ista za sve. Ukoliko se poštuju, transakciju bitkoinom niko ne može osporiti i ne može se retroaktivno manipulisati.
Prvi put imamo digitalni sadržaj koji se ne može kopirati. Bitkoin ekosistem funkcioniše 15 godina pratkično bez down-time-a. Usko je shvatanje reći da je rudarenje bitkoina proces koji bespotrebno troši previše energije. Ili da bitkoin nema uporište u nekoj opipljivoj vrednosti. Ta skupa reč je poverenje. Ničijom svesnom namerom, već organski, bitkoin je od digitalnog keša postao prepoznat kao čuvar vrednosti, digitalno zlato. Jer zašto da koristiš za svakodnevna plaćanja nešto što može vredeti za godinu ili godine 5%,10%, 50% više, ako imaš RSD, EUR ili $ koji će 100% za godinu dana vredeti 2% ili 15% manje?
Danas bitkoin koriste obični ljudi, kompanije i države.
Satoshi je svakako imao drugačiju viziju ove kriptovalute – digitalni keš i pošteniji novac. Kreirajući ekosistem na koji svi mi možemo vršiti uticaj barem podjednako koliko i Satoshi, ostavljena su otvorena vrata da se vizija promeni. Vizija je prilagođena, prepuštena našim prethodnim i budućim postupcima i društvenim okolnostima. Važno je da su postulati i dalje tu. Sa njima i Bitkoin.
-
@ 4720beb1:fde5de50
2025-01-08 17:45:09I just published the new version of my NIP-404. It basically a way to have real ephemeral interactions on Nostr, so developers can model Stories and messages that disappear etc and providing a good level of plausible deniability. Here is the new version: https://github.com/nostr-protocol/nips/pull/1676
This is a follow-up of a previous proposal I did in last November. I tried to tackle most of issues that npub12262qa4uhw7u8gdwlgmntqtv7aye8vdcmvszkqwgs0zchel6mz7s6cgrkj npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c have raised.
There is a "working" example (I'm not a cryptographer, have mercy on me): https://github.com/gu1p/nip404_demo
TL;DR;
NIP-404: Ghost Events
This NIP introduces Ghost Events—a protocol for creating events that are plausibly deniable with a ephemeral nature, providing a weak binding to the author's identity. It leverages ring signatures, elliptic curve point-hashing, and a distance-based proof-of-work that references Bitcoin block hashes for chronological anchoring.
High-Level Mechanics
- Ring Signature over exactly two keys:
1) Your real key
2) A “mined” key — found by solving a proof-of-work puzzle (attacker) or randomly (by the real signer). - Distance-based PoW: The mined key’s public key must be within distance
δ
of a “challenge point” derived from your public key and a Bitcoin block hash. - Deniability: Verifiers can only tell that one of the two keys signed the event, not which one. Because all components are public, anyone can forge a Ghost Event referencing your key.
2. Detailed Protocol
2.1. Reference a Bitcoin Block
Pick a Bitcoin block
B
with hashH_B
and timestampt_B
. This block anchors the event in time.2.2. Derive a Challenge Point
- Take your main public key
P_A
and concatenate it withH_B
. - Compute
S = SHA256(P_A || H_B)
- Map
S
to secp256k1 (RFC 9380 “Hashing to Elliptic Curves”):challenge_PK = HashToCurve(S)
Anyone can verify this point by performing the same steps.
2.3. Pick a “Mined Key”
P_mined
- Let
x_c
be the x-coordinate ofchallenge_PK
. - Find
x_m
such that|x_m - x_c| <= δ
and(x_m, y_m)
is a valid secp256k1 point. -
δ
reflects the “difficulty” of finding such a key. -
In the proposal I have provide a way to get a δ given the number of tries and target probability you expect someone to mine the
P_mined
and also the inverse, compute the δ given a number of tries. -
Compute $T$ (number of tries) given $\delta$ and target probability.
2.4. Create a Ring Signature
Form a ring of two public keys:
{P_A, P_mined}
.
Use your real private key to sign, producing a ring signature that proves one of the private keys (eithersk_A
orsk_mined
) signed — but not which one.2.5. Publish the Ghost Event
Publish a standard Nostr event (
kind
,content
, etc.) plus tags:["ghost", "block-hash", "<H_B>"]
["ghost", "block-hash-timestamp", "<t_B>"]
The event’s
sig
field is the ring signature. Verifiers can:- Check validity of the ring signature over
{P_A, P_mined}
. - Recompute
challenge_PK
from<P_A, H_B>
. - Measure how close
P_mined
is tochallenge_PK
(i.e., proof-of-work difficulty). - Conclude: “Either Alice really signed, or someone else who found a matching
P_mined
did.”
Practical Tips
-
Picking δ:
-
Decide how quickly you want deniability to set in. If you pick a very small δ, it requires more CPU time for an attacker to replicate—but also temporarily ties the event more strongly to you.
- If you want faster deniability, pick a larger δ, but accept that forging a second “mined” key becomes easier.
-
If you want avoid OTS, pick a larger δ and reference older blocks.
-
Verifying a Received Ghost Event:
- Check the actual δ provided.
- Estimate the tries
T
needed for a given success probability. - Check the
Key/s
rate necessary to produce the event since the block was mined.
7. Example Ghost Event JSON
Alice: Today is a good day to post wild picture of me on Nostr! Maybe I will regret it later...
Alice: Let post as a ghost event!
Alice: I will set a PoW of 86400000000 tries for a 30% of success. It is an easy one!json { "id": "f9d32cace9ead9457d121041c4c17a779ab84cecf90f08d90ccacd9673f1bab4", "pubkey": "npub1r587vuykqhf8k7x4e06380edc7mr7pkz59r44tausmlwq970wkyqv9dh85", "created_at": 1736350383, "kind": 1, "tags": [ [ "ghost", "block-hash", "00000000000000000000c75dc9d3296751a8bb62b2463fbc49035ee75ab45f39" ], [ "ghost", "block-hash-timestamp", 1736264059 ] ], "content": "Hi! This is Alice... Here is a picture of me drinking a beer!", "sig": "...<ring signature>...." }
Bob: Wow! There is an event from Alice!
Bob: Let's check the signature to make sure it is from Alice
Bob: Alice didn't sign this event!
Bob: I see some ghost tags here...
Bob: It is a ghost event!
Bob: There are 2 possible signers!
Bob: Alice is one of the possible signers!
It was produced, allegedly, after the block a 00000000000000000000c75dc9d3296751a8bb62b2463fbc49035ee75ab45f39
Bob: It says that the block was mined at 1736264059
Bob: Let see if this block is real!
Bob: The block is real!
Bob: Let's check the PoW
Bob: The other signer is: npub1jktevjlge6vjp2yfaltrlvuv99th2uxaxy8eglvcsvr7e2r9h5lq2978dz
Bob: The challenge public key is: npub1jktevjldsr7kr52f90602gfhmc8cac9quq6yy8k9vy94w2qptsasz9cfps
Bob: Let's figure out how hard it was to mine the private key
Bob: The distance between the challenge and the alleged mined public key is 494635222290174920048599093528121665305037827746663102318405983997
Bob: For having 50% of chance of figuring out this key, the signer should have done 83496150448 tries
Bob: The signer should have mined 967231 keys per second, since the block was mined
Bob: It is not a hard PoW! - Ring Signature over exactly two keys:
-
@ 6f6b50bb:a848e5a1
2024-12-15 15:09:52Che cosa significherebbe trattare l'IA come uno strumento invece che come una persona?
Dall’avvio di ChatGPT, le esplorazioni in due direzioni hanno preso velocità.
La prima direzione riguarda le capacità tecniche. Quanto grande possiamo addestrare un modello? Quanto bene può rispondere alle domande del SAT? Con quanta efficienza possiamo distribuirlo?
La seconda direzione riguarda il design dell’interazione. Come comunichiamo con un modello? Come possiamo usarlo per un lavoro utile? Quale metafora usiamo per ragionare su di esso?
La prima direzione è ampiamente seguita e enormemente finanziata, e per una buona ragione: i progressi nelle capacità tecniche sono alla base di ogni possibile applicazione. Ma la seconda è altrettanto cruciale per il campo e ha enormi incognite. Siamo solo a pochi anni dall’inizio dell’era dei grandi modelli. Quali sono le probabilità che abbiamo già capito i modi migliori per usarli?
Propongo una nuova modalità di interazione, in cui i modelli svolgano il ruolo di applicazioni informatiche (ad esempio app per telefoni): fornendo un’interfaccia grafica, interpretando gli input degli utenti e aggiornando il loro stato. In questa modalità, invece di essere un “agente” che utilizza un computer per conto dell’essere umano, l’IA può fornire un ambiente informatico più ricco e potente che possiamo utilizzare.
Metafore per l’interazione
Al centro di un’interazione c’è una metafora che guida le aspettative di un utente su un sistema. I primi giorni dell’informatica hanno preso metafore come “scrivanie”, “macchine da scrivere”, “fogli di calcolo” e “lettere” e le hanno trasformate in equivalenti digitali, permettendo all’utente di ragionare sul loro comportamento. Puoi lasciare qualcosa sulla tua scrivania e tornare a prenderlo; hai bisogno di un indirizzo per inviare una lettera. Man mano che abbiamo sviluppato una conoscenza culturale di questi dispositivi, la necessità di queste particolari metafore è scomparsa, e con esse i design di interfaccia skeumorfici che le rafforzavano. Come un cestino o una matita, un computer è ora una metafora di se stesso.
La metafora dominante per i grandi modelli oggi è modello-come-persona. Questa è una metafora efficace perché le persone hanno capacità estese che conosciamo intuitivamente. Implica che possiamo avere una conversazione con un modello e porgli domande; che il modello possa collaborare con noi su un documento o un pezzo di codice; che possiamo assegnargli un compito da svolgere da solo e che tornerà quando sarà finito.
Tuttavia, trattare un modello come una persona limita profondamente il nostro modo di pensare all’interazione con esso. Le interazioni umane sono intrinsecamente lente e lineari, limitate dalla larghezza di banda e dalla natura a turni della comunicazione verbale. Come abbiamo tutti sperimentato, comunicare idee complesse in una conversazione è difficile e dispersivo. Quando vogliamo precisione, ci rivolgiamo invece a strumenti, utilizzando manipolazioni dirette e interfacce visive ad alta larghezza di banda per creare diagrammi, scrivere codice e progettare modelli CAD. Poiché concepiamo i modelli come persone, li utilizziamo attraverso conversazioni lente, anche se sono perfettamente in grado di accettare input diretti e rapidi e di produrre risultati visivi. Le metafore che utilizziamo limitano le esperienze che costruiamo, e la metafora modello-come-persona ci impedisce di esplorare il pieno potenziale dei grandi modelli.
Per molti casi d’uso, e specialmente per il lavoro produttivo, credo che il futuro risieda in un’altra metafora: modello-come-computer.
Usare un’IA come un computer
Sotto la metafora modello-come-computer, interagiremo con i grandi modelli seguendo le intuizioni che abbiamo sulle applicazioni informatiche (sia su desktop, tablet o telefono). Nota che ciò non significa che il modello sarà un’app tradizionale più di quanto il desktop di Windows fosse una scrivania letterale. “Applicazione informatica” sarà un modo per un modello di rappresentarsi a noi. Invece di agire come una persona, il modello agirà come un computer.
Agire come un computer significa produrre un’interfaccia grafica. Al posto del flusso lineare di testo in stile telescrivente fornito da ChatGPT, un sistema modello-come-computer genererà qualcosa che somiglia all’interfaccia di un’applicazione moderna: pulsanti, cursori, schede, immagini, grafici e tutto il resto. Questo affronta limitazioni chiave dell’interfaccia di chat standard modello-come-persona:
-
Scoperta. Un buon strumento suggerisce i suoi usi. Quando l’unica interfaccia è una casella di testo vuota, spetta all’utente capire cosa fare e comprendere i limiti del sistema. La barra laterale Modifica in Lightroom è un ottimo modo per imparare l’editing fotografico perché non si limita a dirti cosa può fare questa applicazione con una foto, ma cosa potresti voler fare. Allo stesso modo, un’interfaccia modello-come-computer per DALL-E potrebbe mostrare nuove possibilità per le tue generazioni di immagini.
-
Efficienza. La manipolazione diretta è più rapida che scrivere una richiesta a parole. Per continuare l’esempio di Lightroom, sarebbe impensabile modificare una foto dicendo a una persona quali cursori spostare e di quanto. Ci vorrebbe un giorno intero per chiedere un’esposizione leggermente più bassa e una vibranza leggermente più alta, solo per vedere come apparirebbe. Nella metafora modello-come-computer, il modello può creare strumenti che ti permettono di comunicare ciò che vuoi più efficientemente e quindi di fare le cose più rapidamente.
A differenza di un’app tradizionale, questa interfaccia grafica è generata dal modello su richiesta. Questo significa che ogni parte dell’interfaccia che vedi è rilevante per ciò che stai facendo in quel momento, inclusi i contenuti specifici del tuo lavoro. Significa anche che, se desideri un’interfaccia più ampia o diversa, puoi semplicemente richiederla. Potresti chiedere a DALL-E di produrre alcuni preset modificabili per le sue impostazioni ispirati da famosi artisti di schizzi. Quando clicchi sul preset Leonardo da Vinci, imposta i cursori per disegni prospettici altamente dettagliati in inchiostro nero. Se clicchi su Charles Schulz, seleziona fumetti tecnicolor 2D a basso dettaglio.
Una bicicletta della mente proteiforme
La metafora modello-come-persona ha una curiosa tendenza a creare distanza tra l’utente e il modello, rispecchiando il divario di comunicazione tra due persone che può essere ridotto ma mai completamente colmato. A causa della difficoltà e del costo di comunicare a parole, le persone tendono a suddividere i compiti tra loro in blocchi grandi e il più indipendenti possibile. Le interfacce modello-come-persona seguono questo schema: non vale la pena dire a un modello di aggiungere un return statement alla tua funzione quando è più veloce scriverlo da solo. Con il sovraccarico della comunicazione, i sistemi modello-come-persona sono più utili quando possono fare un intero blocco di lavoro da soli. Fanno le cose per te.
Questo contrasta con il modo in cui interagiamo con i computer o altri strumenti. Gli strumenti producono feedback visivi in tempo reale e sono controllati attraverso manipolazioni dirette. Hanno un overhead comunicativo così basso che non è necessario specificare un blocco di lavoro indipendente. Ha più senso mantenere l’umano nel loop e dirigere lo strumento momento per momento. Come stivali delle sette leghe, gli strumenti ti permettono di andare più lontano a ogni passo, ma sei ancora tu a fare il lavoro. Ti permettono di fare le cose più velocemente.
Considera il compito di costruire un sito web usando un grande modello. Con le interfacce di oggi, potresti trattare il modello come un appaltatore o un collaboratore. Cercheresti di scrivere a parole il più possibile su come vuoi che il sito appaia, cosa vuoi che dica e quali funzionalità vuoi che abbia. Il modello genererebbe una prima bozza, tu la eseguirai e poi fornirai un feedback. “Fai il logo un po’ più grande”, diresti, e “centra quella prima immagine principale”, e “deve esserci un pulsante di login nell’intestazione”. Per ottenere esattamente ciò che vuoi, invierai una lista molto lunga di richieste sempre più minuziose.
Un’interazione alternativa modello-come-computer sarebbe diversa: invece di costruire il sito web, il modello genererebbe un’interfaccia per te per costruirlo, dove ogni input dell’utente a quell’interfaccia interroga il grande modello sotto il cofano. Forse quando descrivi le tue necessità creerebbe un’interfaccia con una barra laterale e una finestra di anteprima. All’inizio la barra laterale contiene solo alcuni schizzi di layout che puoi scegliere come punto di partenza. Puoi cliccare su ciascuno di essi, e il modello scrive l’HTML per una pagina web usando quel layout e lo visualizza nella finestra di anteprima. Ora che hai una pagina su cui lavorare, la barra laterale guadagna opzioni aggiuntive che influenzano la pagina globalmente, come accoppiamenti di font e schemi di colore. L’anteprima funge da editor WYSIWYG, permettendoti di afferrare elementi e spostarli, modificarne i contenuti, ecc. A supportare tutto ciò è il modello, che vede queste azioni dell’utente e riscrive la pagina per corrispondere ai cambiamenti effettuati. Poiché il modello può generare un’interfaccia per aiutare te e lui a comunicare più efficientemente, puoi esercitare più controllo sul prodotto finale in meno tempo.
La metafora modello-come-computer ci incoraggia a pensare al modello come a uno strumento con cui interagire in tempo reale piuttosto che a un collaboratore a cui assegnare compiti. Invece di sostituire un tirocinante o un tutor, può essere una sorta di bicicletta proteiforme per la mente, una che è sempre costruita su misura esattamente per te e il terreno che intendi attraversare.
Un nuovo paradigma per l’informatica?
I modelli che possono generare interfacce su richiesta sono una frontiera completamente nuova nell’informatica. Potrebbero essere un paradigma del tutto nuovo, con il modo in cui cortocircuitano il modello di applicazione esistente. Dare agli utenti finali il potere di creare e modificare app al volo cambia fondamentalmente il modo in cui interagiamo con i computer. Al posto di una singola applicazione statica costruita da uno sviluppatore, un modello genererà un’applicazione su misura per l’utente e le sue esigenze immediate. Al posto della logica aziendale implementata nel codice, il modello interpreterà gli input dell’utente e aggiornerà l’interfaccia utente. È persino possibile che questo tipo di interfaccia generativa sostituisca completamente il sistema operativo, generando e gestendo interfacce e finestre al volo secondo necessità.
All’inizio, l’interfaccia generativa sarà un giocattolo, utile solo per l’esplorazione creativa e poche altre applicazioni di nicchia. Dopotutto, nessuno vorrebbe un’app di posta elettronica che occasionalmente invia email al tuo ex e mente sulla tua casella di posta. Ma gradualmente i modelli miglioreranno. Anche mentre si spingeranno ulteriormente nello spazio di esperienze completamente nuove, diventeranno lentamente abbastanza affidabili da essere utilizzati per un lavoro reale.
Piccoli pezzi di questo futuro esistono già. Anni fa Jonas Degrave ha dimostrato che ChatGPT poteva fare una buona simulazione di una riga di comando Linux. Allo stesso modo, websim.ai utilizza un LLM per generare siti web su richiesta mentre li navighi. Oasis, GameNGen e DIAMOND addestrano modelli video condizionati sull’azione su singoli videogiochi, permettendoti di giocare ad esempio a Doom dentro un grande modello. E Genie 2 genera videogiochi giocabili da prompt testuali. L’interfaccia generativa potrebbe ancora sembrare un’idea folle, ma non è così folle.
Ci sono enormi domande aperte su come apparirà tutto questo. Dove sarà inizialmente utile l’interfaccia generativa? Come condivideremo e distribuiremo le esperienze che creiamo collaborando con il modello, se esistono solo come contesto di un grande modello? Vorremmo davvero farlo? Quali nuovi tipi di esperienze saranno possibili? Come funzionerà tutto questo in pratica? I modelli genereranno interfacce come codice o produrranno direttamente pixel grezzi?
Non conosco ancora queste risposte. Dovremo sperimentare e scoprirlo!Che cosa significherebbe trattare l'IA come uno strumento invece che come una persona?
Dall’avvio di ChatGPT, le esplorazioni in due direzioni hanno preso velocità.
La prima direzione riguarda le capacità tecniche. Quanto grande possiamo addestrare un modello? Quanto bene può rispondere alle domande del SAT? Con quanta efficienza possiamo distribuirlo?
La seconda direzione riguarda il design dell’interazione. Come comunichiamo con un modello? Come possiamo usarlo per un lavoro utile? Quale metafora usiamo per ragionare su di esso?
La prima direzione è ampiamente seguita e enormemente finanziata, e per una buona ragione: i progressi nelle capacità tecniche sono alla base di ogni possibile applicazione. Ma la seconda è altrettanto cruciale per il campo e ha enormi incognite. Siamo solo a pochi anni dall’inizio dell’era dei grandi modelli. Quali sono le probabilità che abbiamo già capito i modi migliori per usarli?
Propongo una nuova modalità di interazione, in cui i modelli svolgano il ruolo di applicazioni informatiche (ad esempio app per telefoni): fornendo un’interfaccia grafica, interpretando gli input degli utenti e aggiornando il loro stato. In questa modalità, invece di essere un “agente” che utilizza un computer per conto dell’essere umano, l’IA può fornire un ambiente informatico più ricco e potente che possiamo utilizzare.
Metafore per l’interazione
Al centro di un’interazione c’è una metafora che guida le aspettative di un utente su un sistema. I primi giorni dell’informatica hanno preso metafore come “scrivanie”, “macchine da scrivere”, “fogli di calcolo” e “lettere” e le hanno trasformate in equivalenti digitali, permettendo all’utente di ragionare sul loro comportamento. Puoi lasciare qualcosa sulla tua scrivania e tornare a prenderlo; hai bisogno di un indirizzo per inviare una lettera. Man mano che abbiamo sviluppato una conoscenza culturale di questi dispositivi, la necessità di queste particolari metafore è scomparsa, e con esse i design di interfaccia skeumorfici che le rafforzavano. Come un cestino o una matita, un computer è ora una metafora di se stesso.
La metafora dominante per i grandi modelli oggi è modello-come-persona. Questa è una metafora efficace perché le persone hanno capacità estese che conosciamo intuitivamente. Implica che possiamo avere una conversazione con un modello e porgli domande; che il modello possa collaborare con noi su un documento o un pezzo di codice; che possiamo assegnargli un compito da svolgere da solo e che tornerà quando sarà finito.
Tuttavia, trattare un modello come una persona limita profondamente il nostro modo di pensare all’interazione con esso. Le interazioni umane sono intrinsecamente lente e lineari, limitate dalla larghezza di banda e dalla natura a turni della comunicazione verbale. Come abbiamo tutti sperimentato, comunicare idee complesse in una conversazione è difficile e dispersivo. Quando vogliamo precisione, ci rivolgiamo invece a strumenti, utilizzando manipolazioni dirette e interfacce visive ad alta larghezza di banda per creare diagrammi, scrivere codice e progettare modelli CAD. Poiché concepiamo i modelli come persone, li utilizziamo attraverso conversazioni lente, anche se sono perfettamente in grado di accettare input diretti e rapidi e di produrre risultati visivi. Le metafore che utilizziamo limitano le esperienze che costruiamo, e la metafora modello-come-persona ci impedisce di esplorare il pieno potenziale dei grandi modelli.
Per molti casi d’uso, e specialmente per il lavoro produttivo, credo che il futuro risieda in un’altra metafora: modello-come-computer.
Usare un’IA come un computer
Sotto la metafora modello-come-computer, interagiremo con i grandi modelli seguendo le intuizioni che abbiamo sulle applicazioni informatiche (sia su desktop, tablet o telefono). Nota che ciò non significa che il modello sarà un’app tradizionale più di quanto il desktop di Windows fosse una scrivania letterale. “Applicazione informatica” sarà un modo per un modello di rappresentarsi a noi. Invece di agire come una persona, il modello agirà come un computer.
Agire come un computer significa produrre un’interfaccia grafica. Al posto del flusso lineare di testo in stile telescrivente fornito da ChatGPT, un sistema modello-come-computer genererà qualcosa che somiglia all’interfaccia di un’applicazione moderna: pulsanti, cursori, schede, immagini, grafici e tutto il resto. Questo affronta limitazioni chiave dell’interfaccia di chat standard modello-come-persona:
Scoperta. Un buon strumento suggerisce i suoi usi. Quando l’unica interfaccia è una casella di testo vuota, spetta all’utente capire cosa fare e comprendere i limiti del sistema. La barra laterale Modifica in Lightroom è un ottimo modo per imparare l’editing fotografico perché non si limita a dirti cosa può fare questa applicazione con una foto, ma cosa potresti voler fare. Allo stesso modo, un’interfaccia modello-come-computer per DALL-E potrebbe mostrare nuove possibilità per le tue generazioni di immagini.
Efficienza. La manipolazione diretta è più rapida che scrivere una richiesta a parole. Per continuare l’esempio di Lightroom, sarebbe impensabile modificare una foto dicendo a una persona quali cursori spostare e di quanto. Ci vorrebbe un giorno intero per chiedere un’esposizione leggermente più bassa e una vibranza leggermente più alta, solo per vedere come apparirebbe. Nella metafora modello-come-computer, il modello può creare strumenti che ti permettono di comunicare ciò che vuoi più efficientemente e quindi di fare le cose più rapidamente.
A differenza di un’app tradizionale, questa interfaccia grafica è generata dal modello su richiesta. Questo significa che ogni parte dell’interfaccia che vedi è rilevante per ciò che stai facendo in quel momento, inclusi i contenuti specifici del tuo lavoro. Significa anche che, se desideri un’interfaccia più ampia o diversa, puoi semplicemente richiederla. Potresti chiedere a DALL-E di produrre alcuni preset modificabili per le sue impostazioni ispirati da famosi artisti di schizzi. Quando clicchi sul preset Leonardo da Vinci, imposta i cursori per disegni prospettici altamente dettagliati in inchiostro nero. Se clicchi su Charles Schulz, seleziona fumetti tecnicolor 2D a basso dettaglio.
Una bicicletta della mente proteiforme
La metafora modello-come-persona ha una curiosa tendenza a creare distanza tra l’utente e il modello, rispecchiando il divario di comunicazione tra due persone che può essere ridotto ma mai completamente colmato. A causa della difficoltà e del costo di comunicare a parole, le persone tendono a suddividere i compiti tra loro in blocchi grandi e il più indipendenti possibile. Le interfacce modello-come-persona seguono questo schema: non vale la pena dire a un modello di aggiungere un return statement alla tua funzione quando è più veloce scriverlo da solo. Con il sovraccarico della comunicazione, i sistemi modello-come-persona sono più utili quando possono fare un intero blocco di lavoro da soli. Fanno le cose per te.
Questo contrasta con il modo in cui interagiamo con i computer o altri strumenti. Gli strumenti producono feedback visivi in tempo reale e sono controllati attraverso manipolazioni dirette. Hanno un overhead comunicativo così basso che non è necessario specificare un blocco di lavoro indipendente. Ha più senso mantenere l’umano nel loop e dirigere lo strumento momento per momento. Come stivali delle sette leghe, gli strumenti ti permettono di andare più lontano a ogni passo, ma sei ancora tu a fare il lavoro. Ti permettono di fare le cose più velocemente.
Considera il compito di costruire un sito web usando un grande modello. Con le interfacce di oggi, potresti trattare il modello come un appaltatore o un collaboratore. Cercheresti di scrivere a parole il più possibile su come vuoi che il sito appaia, cosa vuoi che dica e quali funzionalità vuoi che abbia. Il modello genererebbe una prima bozza, tu la eseguirai e poi fornirai un feedback. “Fai il logo un po’ più grande”, diresti, e “centra quella prima immagine principale”, e “deve esserci un pulsante di login nell’intestazione”. Per ottenere esattamente ciò che vuoi, invierai una lista molto lunga di richieste sempre più minuziose.
Un’interazione alternativa modello-come-computer sarebbe diversa: invece di costruire il sito web, il modello genererebbe un’interfaccia per te per costruirlo, dove ogni input dell’utente a quell’interfaccia interroga il grande modello sotto il cofano. Forse quando descrivi le tue necessità creerebbe un’interfaccia con una barra laterale e una finestra di anteprima. All’inizio la barra laterale contiene solo alcuni schizzi di layout che puoi scegliere come punto di partenza. Puoi cliccare su ciascuno di essi, e il modello scrive l’HTML per una pagina web usando quel layout e lo visualizza nella finestra di anteprima. Ora che hai una pagina su cui lavorare, la barra laterale guadagna opzioni aggiuntive che influenzano la pagina globalmente, come accoppiamenti di font e schemi di colore. L’anteprima funge da editor WYSIWYG, permettendoti di afferrare elementi e spostarli, modificarne i contenuti, ecc. A supportare tutto ciò è il modello, che vede queste azioni dell’utente e riscrive la pagina per corrispondere ai cambiamenti effettuati. Poiché il modello può generare un’interfaccia per aiutare te e lui a comunicare più efficientemente, puoi esercitare più controllo sul prodotto finale in meno tempo.
La metafora modello-come-computer ci incoraggia a pensare al modello come a uno strumento con cui interagire in tempo reale piuttosto che a un collaboratore a cui assegnare compiti. Invece di sostituire un tirocinante o un tutor, può essere una sorta di bicicletta proteiforme per la mente, una che è sempre costruita su misura esattamente per te e il terreno che intendi attraversare.
Un nuovo paradigma per l’informatica?
I modelli che possono generare interfacce su richiesta sono una frontiera completamente nuova nell’informatica. Potrebbero essere un paradigma del tutto nuovo, con il modo in cui cortocircuitano il modello di applicazione esistente. Dare agli utenti finali il potere di creare e modificare app al volo cambia fondamentalmente il modo in cui interagiamo con i computer. Al posto di una singola applicazione statica costruita da uno sviluppatore, un modello genererà un’applicazione su misura per l’utente e le sue esigenze immediate. Al posto della logica aziendale implementata nel codice, il modello interpreterà gli input dell’utente e aggiornerà l’interfaccia utente. È persino possibile che questo tipo di interfaccia generativa sostituisca completamente il sistema operativo, generando e gestendo interfacce e finestre al volo secondo necessità.
All’inizio, l’interfaccia generativa sarà un giocattolo, utile solo per l’esplorazione creativa e poche altre applicazioni di nicchia. Dopotutto, nessuno vorrebbe un’app di posta elettronica che occasionalmente invia email al tuo ex e mente sulla tua casella di posta. Ma gradualmente i modelli miglioreranno. Anche mentre si spingeranno ulteriormente nello spazio di esperienze completamente nuove, diventeranno lentamente abbastanza affidabili da essere utilizzati per un lavoro reale.
Piccoli pezzi di questo futuro esistono già. Anni fa Jonas Degrave ha dimostrato che ChatGPT poteva fare una buona simulazione di una riga di comando Linux. Allo stesso modo, websim.ai utilizza un LLM per generare siti web su richiesta mentre li navighi. Oasis, GameNGen e DIAMOND addestrano modelli video condizionati sull’azione su singoli videogiochi, permettendoti di giocare ad esempio a Doom dentro un grande modello. E Genie 2 genera videogiochi giocabili da prompt testuali. L’interfaccia generativa potrebbe ancora sembrare un’idea folle, ma non è così folle.
Ci sono enormi domande aperte su come apparirà tutto questo. Dove sarà inizialmente utile l’interfaccia generativa? Come condivideremo e distribuiremo le esperienze che creiamo collaborando con il modello, se esistono solo come contesto di un grande modello? Vorremmo davvero farlo? Quali nuovi tipi di esperienze saranno possibili? Come funzionerà tutto questo in pratica? I modelli genereranno interfacce come codice o produrranno direttamente pixel grezzi?
Non conosco ancora queste risposte. Dovremo sperimentare e scoprirlo!
Tradotto da:\ https://willwhitney.com/computing-inside-ai.htmlhttps://willwhitney.com/computing-inside-ai.html
-
-
@ dd664d5e:5633d319
2024-12-14 15:25:56Christmas season hasn't actually started, yet, in Roman #Catholic Germany. We're in Advent until the evening of the 24th of December, at which point Christmas begins (with the Nativity, at Vespers), and continues on for 40 days until Mariä Lichtmess (Presentation of Christ in the temple) on February 2nd.
It's 40 days because that's how long the post-partum isolation is, before women were allowed back into the temple (after a ritual cleansing).
That is the day when we put away all of the Christmas decorations and bless the candles, for the next year. (Hence, the British name "Candlemas".) It used to also be when household staff would get paid their cash wages and could change employer. And it is the day precisely in the middle of winter.
Between Christmas Eve and Candlemas are many celebrations, concluding with the Twelfth Night called Epiphany or Theophany. This is the day some Orthodox celebrate Christ's baptism, so traditions rotate around blessing of waters.
The Monday after Epiphany was the start of the farming season, in England, so that Sunday all of the ploughs were blessed, but the practice has largely died out.
Our local tradition is for the altar servers to dress as the wise men and go door-to-door, carrying their star and looking for the Baby Jesus, who is rumored to be lying in a manger.
They collect cash gifts and chocolates, along the way, and leave the generous their powerful blessing, written over the door. The famous 20 * C + M + B * 25 blessing means "Christus mansionem benedicat" (Christ, bless this house), or "Caspar, Melchior, Balthasar" (the names of the three kings), depending upon who you ask.
They offer the cash to the Baby Jesus (once they find him in the church's Nativity scene), but eat the sweets, themselves. It is one of the biggest donation-collections in the world, called the "Sternsinger" (star singers). The money goes from the German children, to help children elsewhere, and they collect around €45 million in cash and coins, every year.
As an interesting aside:
The American "groundhog day", derives from one of the old farmers' sayings about Candlemas, brought over by the Pennsylvania Dutch. It says, that if the badger comes out of his hole and sees his shadow, then it'll remain cold for 4 more weeks. When they moved to the USA, they didn't have any badgers around, so they switched to groundhogs, as they also hibernate in winter.
-
@ d0bf8568:4db3e76f
2024-12-12 21:26:52Depuis sa création en 2009, Bitcoin suscite débats passionnés. Pour certains, il s’agit d’une tentative utopique d’émancipation du pouvoir étatique, inspirée par une philosophie libertarienne radicale. Pour d’autres, c'est une réponse pragmatique à un système monétaire mondial jugé défaillant. Ces deux perspectives, souvent opposées, méritent d’être confrontées pour mieux comprendre les enjeux et les limites de cette révolution monétaire.
La critique économique de Bitcoin
David Cayla, dans ses dernières contributions, perçoit Bitcoin comme une tentative de réaliser une « utopie libertarienne ». Selon lui, les inventeurs des cryptomonnaies cherchent à créer une monnaie détachée de l’État et des rapports sociaux traditionnels, en s’inspirant de l’école autrichienne d’économie. Cette école, incarnée par des penseurs comme Friedrich Hayek, prône une monnaie privée et indépendante de l’intervention politique.
Cayla reproche à Bitcoin de nier la dimension intrinsèquement sociale et politique de la monnaie. Pour lui, toute monnaie repose sur la confiance collective et la régulation étatique. En rendant la monnaie exogène et dénuée de dette, Bitcoin chercherait à éviter les interactions sociales au profit d’une logique purement individuelle. Selon cette analyse, Bitcoin serait une illusion, incapable de remplacer les monnaies traditionnelles qui sont des « biens publics » soutenus par des institutions.
Cependant, cette critique semble minimiser la légitimité des motivations derrière Bitcoin. La crise financière de 2008, marquée par des abus systémiques et des sauvetages bancaires controversés, a largement érodé la confiance dans les systèmes monétaires centralisés. Bitcoin n’est pas qu’une réaction idéologique : c’est une tentative de créer un système monétaire transparent, immuable et résistant aux manipulations.
La perspective maximaliste
Pour les bitcoiners, Bitcoin n’est pas une utopie mais une réponse pragmatique à un problème réel : la centralisation excessive et les défaillances des monnaies fiat. Contrairement à ce que Cayla affirme, Bitcoin ne cherche pas à nier la société, mais à protéger les individus de la coercition étatique. En déplaçant la confiance des institutions vers un protocole neutre et transparent, Bitcoin redéfinit les bases des échanges monétaires.
L’accusation selon laquelle Bitcoin serait « asocial » ignore son écosystème communautaire mondial. Les bitcoiners collaborent activement à l’amélioration du réseau, organisent des événements éducatifs et développent des outils inclusifs. Bitcoin n’est pas un rejet des rapports sociaux, mais une tentative de les reconstruire sur des bases plus justes et transparentes.
Un maximaliste insisterait également sur l’émergence historique de la monnaie. Contrairement à l’idée que l’État aurait toujours créé la monnaie, de nombreux exemples montrent que celle-ci émergeait souvent du marché, avant d’être capturée par les gouvernements pour financer des guerres ou imposer des monopoles. Bitcoin réintroduit une monnaie à l’abri des manipulations politiques, similaire aux systèmes basés sur l’or, mais en mieux : numérique, immuable et accessible.
Utopie contre réalité
Si Cayla critique l’absence de dette dans Bitcoin, Nous y voyons une vertu. La « monnaie-dette » actuelle repose sur un système de création monétaire inflationniste qui favorise les inégalités et l’érosion du pouvoir d’achat. En limitant son offre à 21 millions d’unités, Bitcoin offre une alternative saine et prévisible, loin des politiques monétaires arbitraires.
Cependant, les maximalistes ne nient pas que Bitcoin ait encore des défis à relever. La volatilité de sa valeur, sa complexité technique pour les nouveaux utilisateurs, et les tensions entre réglementation et liberté individuelle sont des questions ouvertes. Mais pour autant, ces épreuves ne remettent pas en cause sa pertinence. Au contraire, elles illustrent l’importance de réfléchir à des modèles alternatifs.
Conclusion : un débat essentiel
Bitcoin n’est pas une utopie libertarienne, mais une révolution monétaire sans précédent. Les critiques de Cayla, bien qu’intellectuellement stimulantes, manquent de saisir l’essence de Bitcoin : une monnaie qui libère les individus des abus systémiques des États et des institutions centralisées. Loin de simplement avoir un « potentiel », Bitcoin est déjà en train de redéfinir les rapports entre la monnaie, la société et la liberté. Bitcoin offre une expérience unique : celle d’une monnaie mondiale, neutre et décentralisée, qui redonne le pouvoir aux individus. Que l’on soit sceptique ou enthousiaste, il est clair que Bitcoin oblige à repenser les rapports entre monnaie, société et État.
En fin de compte, le débat sur Bitcoin n’est pas seulement une querelle sur sa légitimité, mais une interrogation sur la manière dont il redessine les rapports sociaux et sociétaux autour de la monnaie. En rendant le pouvoir monétaire à chaque individu, Bitcoin propose un modèle où les interactions économiques peuvent être réalisées sans coercition, renforçant ainsi la confiance mutuelle et les communautés globales. Cette discussion, loin d’être close, ne fait que commencer.
-
@ e6817453:b0ac3c39
2024-12-07 15:06:43I started a long series of articles about how to model different types of knowledge graphs in the relational model, which makes on-device memory models for AI agents possible.
We model-directed graphs
Also, graphs of entities
We even model hypergraphs
Last time, we discussed why classical triple and simple knowledge graphs are insufficient for AI agents and complex memory, especially in the domain of time-aware or multi-model knowledge.
So why do we need metagraphs, and what kind of challenge could they help us to solve?
- complex and nested event and temporal context and temporal relations as edges
- multi-mode and multilingual knowledge
- human-like memory for AI agents that has multiple contexts and relations between knowledge in neuron-like networks
MetaGraphs
A meta graph is a concept that extends the idea of a graph by allowing edges to become graphs. Meta Edges connect a set of nodes, which could also be subgraphs. So, at some level, node and edge are pretty similar in properties but act in different roles in a different context.
Also, in some cases, edges could be referenced as nodes.
This approach enables the representation of more complex relationships and hierarchies than a traditional graph structure allows. Let’s break down each term to understand better metagraphs and how they differ from hypergraphs and graphs.Graph Basics
- A standard graph has a set of nodes (or vertices) and edges (connections between nodes).
- Edges are generally simple and typically represent a binary relationship between two nodes.
- For instance, an edge in a social network graph might indicate a “friend” relationship between two people (nodes).
Hypergraph
- A hypergraph extends the concept of an edge by allowing it to connect any number of nodes, not just two.
- Each connection, called a hyperedge, can link multiple nodes.
- This feature allows hypergraphs to model more complex relationships involving multiple entities simultaneously. For example, a hyperedge in a hypergraph could represent a project team, connecting all team members in a single relation.
- Despite its flexibility, a hypergraph doesn’t capture hierarchical or nested structures; it only generalizes the number of connections in an edge.
Metagraph
- A metagraph allows the edges to be graphs themselves. This means each edge can contain its own nodes and edges, creating nested, hierarchical structures.
- In a meta graph, an edge could represent a relationship defined by a graph. For instance, a meta graph could represent a network of organizations where each organization’s structure (departments and connections) is represented by its own internal graph and treated as an edge in the larger meta graph.
- This recursive structure allows metagraphs to model complex data with multiple layers of abstraction. They can capture multi-node relationships (as in hypergraphs) and detailed, structured information about each relationship.
Named Graphs and Graph of Graphs
As you can notice, the structure of a metagraph is quite complex and could be complex to model in relational and classical RDF setups. It could create a challenge of luck of tools and software solutions for your problem.
If you need to model nested graphs, you could use a much simpler model of Named graphs, which could take you quite far.The concept of the named graph came from the RDF community, which needed to group some sets of triples. In this way, you form subgraphs inside an existing graph. You could refer to the subgraph as a regular node. This setup simplifies complex graphs, introduces hierarchies, and even adds features and properties of hypergraphs while keeping a directed nature.
It looks complex, but it is not so hard to model it with a slight modification of a directed graph.
So, the node could host graphs inside. Let's reflect this fact with a location for a node. If a node belongs to a main graph, we could set the location to null or introduce a main node . it is up to youNodes could have edges to nodes in different subgraphs. This structure allows any kind of nesting graphs. Edges stay location-free
Meta Graphs in Relational Model
Let’s try to make several attempts to model different meta-graphs with some constraints.
Directed Metagraph where edges are not used as nodes and could not contain subgraphs
In this case, the edge always points to two sets of nodes. This introduces an overhead of creating a node set for a single node. In this model, we can model empty node sets that could require application-level constraints to prevent such cases.
Directed Metagraph where edges are not used as nodes and could contain subgraphs
Adding a node set that could model a subgraph located in an edge is easy but could be separate from in-vertex or out-vert.
I also do not see a direct need to include subgraphs to a node, as we could just use a node set interchangeably, but it still could be a case.Directed Metagraph where edges are used as nodes and could contain subgraphs
As you can notice, we operate all the time with node sets. We could simply allow the extension node set to elements set that include node and edge IDs, but in this case, we need to use uuid or any other strategy to differentiate node IDs from edge IDs. In this case, we have a collision of ephemeral edges or ephemeral nodes when we want to change the role and purpose of the node as an edge or vice versa.
A full-scale metagraph model is way too complex for a relational database.
So we need a better model.Now, we have more flexibility but loose structural constraints. We cannot show that the element should have one vertex, one vertex, or both. This type of constraint has been moved to the application level. Also, the crucial question is about query and retrieval needs.
Any meta-graph model should be more focused on domain and needs and should be used in raw form. We did it for a pure theoretical purpose. -
@ e6817453:b0ac3c39
2024-12-07 15:03:06Hey folks! Today, let’s dive into the intriguing world of neurosymbolic approaches, retrieval-augmented generation (RAG), and personal knowledge graphs (PKGs). Together, these concepts hold much potential for bringing true reasoning capabilities to large language models (LLMs). So, let’s break down how symbolic logic, knowledge graphs, and modern AI can come together to empower future AI systems to reason like humans.
The Neurosymbolic Approach: What It Means ?
Neurosymbolic AI combines two historically separate streams of artificial intelligence: symbolic reasoning and neural networks. Symbolic AI uses formal logic to process knowledge, similar to how we might solve problems or deduce information. On the other hand, neural networks, like those underlying GPT-4, focus on learning patterns from vast amounts of data — they are probabilistic statistical models that excel in generating human-like language and recognizing patterns but often lack deep, explicit reasoning.
While GPT-4 can produce impressive text, it’s still not very effective at reasoning in a truly logical way. Its foundation, transformers, allows it to excel in pattern recognition, but the models struggle with reasoning because, at their core, they rely on statistical probabilities rather than true symbolic logic. This is where neurosymbolic methods and knowledge graphs come in.
Symbolic Calculations and the Early Vision of AI
If we take a step back to the 1950s, the vision for artificial intelligence was very different. Early AI research was all about symbolic reasoning — where computers could perform logical calculations to derive new knowledge from a given set of rules and facts. Languages like Lisp emerged to support this vision, enabling programs to represent data and code as interchangeable symbols. Lisp was designed to be homoiconic, meaning it treated code as manipulatable data, making it capable of self-modification — a huge leap towards AI systems that could, in theory, understand and modify their own operations.
Lisp: The Earlier AI-Language
Lisp, short for “LISt Processor,” was developed by John McCarthy in 1958, and it became the cornerstone of early AI research. Lisp’s power lay in its flexibility and its use of symbolic expressions, which allowed developers to create programs that could manipulate symbols in ways that were very close to human reasoning. One of the most groundbreaking features of Lisp was its ability to treat code as data, known as homoiconicity, which meant that Lisp programs could introspect and transform themselves dynamically. This ability to adapt and modify its own structure gave Lisp an edge in tasks that required a form of self-awareness, which was key in the early days of AI when researchers were exploring what it meant for machines to “think.”
Lisp was not just a programming language—it represented the vision for artificial intelligence, where machines could evolve their understanding and rewrite their own programming. This idea formed the conceptual basis for many of the self-modifying and adaptive algorithms that are still explored today in AI research. Despite its decline in mainstream programming, Lisp’s influence can still be seen in the concepts used in modern machine learning and symbolic AI approaches.
Prolog: Formal Logic and Deductive Reasoning
In the 1970s, Prolog was developed—a language focused on formal logic and deductive reasoning. Unlike Lisp, based on lambda calculus, Prolog operates on formal logic rules, allowing it to perform deductive reasoning and solve logical puzzles. This made Prolog an ideal candidate for expert systems that needed to follow a sequence of logical steps, such as medical diagnostics or strategic planning.
Prolog, like Lisp, allowed symbols to be represented, understood, and used in calculations, creating another homoiconic language that allows reasoning. Prolog’s strength lies in its rule-based structure, which is well-suited for tasks that require logical inference and backtracking. These features made it a powerful tool for expert systems and AI research in the 1970s and 1980s.
The language is declarative in nature, meaning that you define the problem, and Prolog figures out how to solve it. By using formal logic and setting constraints, Prolog systems can derive conclusions from known facts, making it highly effective in fields requiring explicit logical frameworks, such as legal reasoning, diagnostics, and natural language understanding. These symbolic approaches were later overshadowed during the AI winter — but the ideas never really disappeared. They just evolved.
Solvers and Their Role in Complementing LLMs
One of the most powerful features of Prolog and similar logic-based systems is their use of solvers. Solvers are mechanisms that can take a set of rules and constraints and automatically find solutions that satisfy these conditions. This capability is incredibly useful when combined with LLMs, which excel at generating human-like language but need help with logical consistency and structured reasoning.
For instance, imagine a scenario where an LLM needs to answer a question involving multiple logical steps or a complex query that requires deducing facts from various pieces of information. In this case, a solver can derive valid conclusions based on a given set of logical rules, providing structured answers that the LLM can then articulate in natural language. This allows the LLM to retrieve information and ensure the logical integrity of its responses, leading to much more robust answers.
Solvers are also ideal for handling constraint satisfaction problems — situations where multiple conditions must be met simultaneously. In practical applications, this could include scheduling tasks, generating optimal recommendations, or even diagnosing issues where a set of symptoms must match possible diagnoses. Prolog’s solver capabilities and LLM’s natural language processing power can make these systems highly effective at providing intelligent, rule-compliant responses that traditional LLMs would struggle to produce alone.
By integrating neurosymbolic methods that utilize solvers, we can provide LLMs with a form of deductive reasoning that is missing from pure deep-learning approaches. This combination has the potential to significantly improve the quality of outputs for use-cases that require explicit, structured problem-solving, from legal queries to scientific research and beyond. Solvers give LLMs the backbone they need to not just generate answers but to do so in a way that respects logical rigor and complex constraints.
Graph of Rules for Enhanced Reasoning
Another powerful concept that complements LLMs is using a graph of rules. A graph of rules is essentially a structured collection of logical rules that interconnect in a network-like structure, defining how various entities and their relationships interact. This structured network allows for complex reasoning and information retrieval, as well as the ability to model intricate relationships between different pieces of knowledge.
In a graph of rules, each node represents a rule, and the edges define relationships between those rules — such as dependencies or causal links. This structure can be used to enhance LLM capabilities by providing them with a formal set of rules and relationships to follow, which improves logical consistency and reasoning depth. When an LLM encounters a problem or a question that requires multiple logical steps, it can traverse this graph of rules to generate an answer that is not only linguistically fluent but also logically robust.
For example, in a healthcare application, a graph of rules might include nodes for medical symptoms, possible diagnoses, and recommended treatments. When an LLM receives a query regarding a patient’s symptoms, it can use the graph to traverse from symptoms to potential diagnoses and then to treatment options, ensuring that the response is coherent and medically sound. The graph of rules guides reasoning, enabling LLMs to handle complex, multi-step questions that involve chains of reasoning, rather than merely generating surface-level responses.
Graphs of rules also enable modular reasoning, where different sets of rules can be activated based on the context or the type of question being asked. This modularity is crucial for creating adaptive AI systems that can apply specific sets of logical frameworks to distinct problem domains, thereby greatly enhancing their versatility. The combination of neural fluency with rule-based structure gives LLMs the ability to conduct more advanced reasoning, ultimately making them more reliable and effective in domains where accuracy and logical consistency are critical.
By implementing a graph of rules, LLMs are empowered to perform deductive reasoning alongside their generative capabilities, creating responses that are not only compelling but also logically aligned with the structured knowledge available in the system. This further enhances their potential applications in fields such as law, engineering, finance, and scientific research — domains where logical consistency is as important as linguistic coherence.
Enhancing LLMs with Symbolic Reasoning
Now, with LLMs like GPT-4 being mainstream, there is an emerging need to add real reasoning capabilities to them. This is where neurosymbolic approaches shine. Instead of pitting neural networks against symbolic reasoning, these methods combine the best of both worlds. The neural aspect provides language fluency and recognition of complex patterns, while the symbolic side offers real reasoning power through formal logic and rule-based frameworks.
Personal Knowledge Graphs (PKGs) come into play here as well. Knowledge graphs are data structures that encode entities and their relationships — they’re essentially semantic networks that allow for structured information retrieval. When integrated with neurosymbolic approaches, LLMs can use these graphs to answer questions in a far more contextual and precise way. By retrieving relevant information from a knowledge graph, they can ground their responses in well-defined relationships, thus improving both the relevance and the logical consistency of their answers.
Imagine combining an LLM with a graph of rules that allow it to reason through the relationships encoded in a personal knowledge graph. This could involve using deductive databases to form a sophisticated way to represent and reason with symbolic data — essentially constructing a powerful hybrid system that uses LLM capabilities for language fluency and rule-based logic for structured problem-solving.
My Research on Deductive Databases and Knowledge Graphs
I recently did some research on modeling knowledge graphs using deductive databases, such as DataLog — which can be thought of as a limited, data-oriented version of Prolog. What I’ve found is that it’s possible to use formal logic to model knowledge graphs, ontologies, and complex relationships elegantly as rules in a deductive system. Unlike classical RDF or traditional ontology-based models, which sometimes struggle with complex or evolving relationships, a deductive approach is more flexible and can easily support dynamic rules and reasoning.
Prolog and similar logic-driven frameworks can complement LLMs by handling the parts of reasoning where explicit rule-following is required. LLMs can benefit from these rule-based systems for tasks like entity recognition, logical inferences, and constructing or traversing knowledge graphs. We can even create a graph of rules that governs how relationships are formed or how logical deductions can be performed.
The future is really about creating an AI that is capable of both deep contextual understanding (using the powerful generative capacity of LLMs) and true reasoning (through symbolic systems and knowledge graphs). With the neurosymbolic approach, these AIs could be equipped not just to generate information but to explain their reasoning, form logical conclusions, and even improve their own understanding over time — getting us a step closer to true artificial general intelligence.
Why It Matters for LLM Employment
Using neurosymbolic RAG (retrieval-augmented generation) in conjunction with personal knowledge graphs could revolutionize how LLMs work in real-world applications. Imagine an LLM that understands not just language but also the relationships between different concepts — one that can navigate, reason, and explain complex knowledge domains by actively engaging with a personalized set of facts and rules.
This could lead to practical applications in areas like healthcare, finance, legal reasoning, or even personal productivity — where LLMs can help users solve complex problems logically, providing relevant information and well-justified reasoning paths. The combination of neural fluency with symbolic accuracy and deductive power is precisely the bridge we need to move beyond purely predictive AI to truly intelligent systems.
Let's explore these ideas further if you’re as fascinated by this as I am. Feel free to reach out, follow my YouTube channel, or check out some articles I’ll link below. And if you’re working on anything in this field, I’d love to collaborate!
Until next time, folks. Stay curious, and keep pushing the boundaries of AI!
-
@ 2355757c:5ad3e04d
2025-01-08 17:44:53Originally published Feb, 23, 2024
Introduction
Sunlight is the most important nutrient for our body. That may sound delusional to some, but the definition of a nutrient is: a substance that provides nourishment essential for growth and the maintenance of life. Sunlight certainly is necessary and essential for growth and the maintenance of life, but most don’t understand why. Most do not understand that the real benefit of sunlight is that it provides a vast spectrum of electromagnetic radiation (light) that signals different functions in our biology. This is why we can never replace sunlight with artificial lights, because the sun is a “broad band emitter” and all artificial lights are “narrow band emitters”. This means they only have a few isolated wavelengths, whereas sunlight contains the whole swath.
The other most important aspect of sunlight is that it is time and location dependent. It is always changing…and that change or shift in light frequencies is providing our body the right information about how to function properly in our given environment. Artificial light is constant and provides a consistent/un-natural input signal that confuses our biology.
The last piece, which I will dive into more in a future post…is the fact that sunlight is a continuous electromagnetic wave while indoor lighting is highly pulsed. This is a major reason why eye strain and headaches from staring at screens is so common.
Let’s dive into the important biological effects of the various wavelengths in full spectrum sunlight.
Summary
-
Sunlight is a broad band emitter and artificial light is a narrow band emitter
-
Sunlight is an un-polarized, continuous source of electromagnetic radiation. Artificial light is highly pulsed
-
Sunlight that reaches the earth is comprised of light frequencies that range from 280nm (UVB) to 2500nm (NIR) and everything in between. Each category of wavelength serves as a different biological stimuli
-
UVB radiation stimulates the production of vitamin D, as well as serotonin and beta-endorphins, UVA promotes the release of nitric oxide into the blood, and both have a positive effect on the diversity of the microbiome and our endogenous hormone production
-
Violet light can reverse myopia and potentially improve sleep quality
-
Blue light is the master circadian signaler, turning on/off the SCN via melanopsin photoreceptor…thus regulating cortisol/melatonin production as well as all circadian timing in the body
-
Green light can treat skin issues and also be used as a pain releiver
-
Red light, near-infrared radiation (NIR), and far-infrared (FIR) radiation have anti-inflammatory and tissue healing effects…NIR also stimulates the production of melatonin inside the mitochondria, a master anti-oxidant.
The Biological Effects of Sunlight: By Color/Wavelength
There are several wavelengths of energy from the sun that reach the earth’s surface and trigger specific actions within the body to influence our health. And, just as some of this spectrum is able to make it through the atmosphere, different wavelengths are also able to penetrate the skin to different depths of the body’s tissues and have certain effects on the cells within those tissues, as you can see in the figure below.
Those at the lower wavelengths (such as UVB) only penetrate the very surface of the skin, while those at higher wavelengths (such as visible light) are able to penetrate deeper. Think of how you are able to see the light from a flashlight on the back of your hand when held against the skin on the palm of the hand – you can visually see the energy traveling through the skin, muscles, blood vessels and tissues of the hand. Infrared radiation can even get into the cells and mitochondria, and can get through clothing and bone!
Ultraviolet-B Radiation (UVB) – Vitamin D, Neurotransmitters, Melanin and Beta-endorphins
UVB (280-315nm) is the highest energy wavelength that reaches surface of the earth. It is only present when the sun is >30 degrees above the horizon. You can use apps like “Circadian” and “dminder” to tell you when UVB is present. At the 45th latitude in Wyoming, I go WITHOUT UVB for around 2 months in winter time. This is a big deal, because UVB light stimulates vitamin D synthesis, one of the most important molecules/hormones in the body. More importantly, it stimulates synthesis of sulfated Vitamin D, which is more bioactive and has far more biological relevance compared to un-sulfated Vitamin D as you would get from a supplement. This is why you can’t replace sunlight with a supplement, especially when it comes to Vitamin D. Using a UVB lamp (outside or in combo with NIR) would be in my opinion a better option than supplementing Vit D, or if you do take a supplement take it mid day and get some UVB exposure after taking it. I wrote extensively about Vitamin D supplementation in a previous newsletter.
The vitamin D produced in the skin can also help protect the skin cells from DNA damage, facilitate DNA repair directly upon any UV damage, help prevent cell death, and protect against melanoma. In fact, keratinocytes, which make up over 90% of the outermost layer of skin, cannot rely on vitamin D3 from supplements and must synthesize their own supply of vitamin D directly from sun exposure, or by topical application.
Besides vitamin D, UVB radiation also promotes the production of neurotransmitters and beta-endorphins, chemicals that drive cognition, mood, relaxation, pain relief, and boost immunity. It also triggers the synthesis of MELANIN. It does this by stimulating proopiomelanocortin (POMC) activity in the brain and via exciting our aromatic amino acids.
POMC is a precursor protein of several neuropeptides, including adrenocorticotropin (ACTH), α-melanocyte stimulating hormone (α-MSH) and β-endorphin (β-END). Our aromatic amino acids (tryptophan, tyrosine, and phenylalanine) have ringed structures that allow them to trap UV light energy, and these aromatic amino acids are the precursors to neurotransmitters dopamine, serotonin, as well as melatonin and melanin. Serotonin is involved in cognition, regulation of feeding behavior, anxiety, aggression, pain, sexual activity, and sleep. These aromatics absorb heavily in the UVB/UVC range.
This UV-induced release of beta-endorphins means only one thing: there is an innate built in addiction pathway to the sun. Our biology is able to provide a “reward” for UV-induced vitamin D synthesis when vitamin D levels are low, during which time a greater amount of beta-endorphins are released upon exposure to UVB. As vitamin D levels rise, the sun-seeking behavior and resulting opioid response become repressed as less vitamin D is needed. It’s almost as if our body knows best, and we should go out of our way to listen to it. Instead, most people will continue to pour the Vit D supplements down their gully.
Melanin, which is synthesized from UV light exposure and activation of alpha-MSH via POMC, is one of the most important molecules in our biology. It absorbs the entire EMR spectrum and acts as both a biological semiconductor and energy storage system (battery). I have written more about it in a previous newsletter and will dive even deeper very soon.
Ultraviolet-A Radiation (UVA) – Nitric Oxide + More
UVA (315-380nm) exists at a wavelength between UVB and visible light, and is able to reach deeper than UVB light but still only a few millimeters. UVA leads to the release of nitric oxide into the bloodstream which in turn benefits the cardiovascular and metabolic systems, and may offer other immunological benefits beyond those offered by nitric oxide. This vasodilatory effect enhances blood flow, lowers blood prressure and improves circulation.
UVA can have similar effects to UVB such as stimulating POMC and the neuroendocrine axis, just with lesser efficiency compared to UVB light as it is a lower energy wavelength spectrum so it does not have as great of an excitatory effect on our biology.
“UVA has better penetration reaching the reticular dermis but has 1000 times lower efficiency at inducing biological effects (expressed as the minimal erythema dose) than UVB”
UVA also shares some benefits with violet light (visible) such as reversing myopia in the eyes. Will discuss that more in the Violet light section.
Ultraviolet Radiation (UVA + UVB) – The Most Important Input for Your Microbiome
Your gastrointestinal tract and the surface of the skin are home to trillions of microbes (bacteria, viruses, and yeast), called your “microbiome,” which act as their own organ and are crucial to your overall health. Skin health in particular is maintained by a balanced, diverse microbiome, which is in turn affected by nutrition, pH level, hygiene, exposure to toxins, barrier strength, stress levels, sunlight exposure, and overall health.
UV exposure (and vitamin D itself) can have a healthy, regulatory effect on the microbiome of the skin and the gut, with UVB light having a beneficial impact on the diversity and abundance of the bacteria species of the gut microbiome, and UVB as well as UVA benefitting the skin microbiome. Studies have even shown that several molecules that help protect our skin from UV damage can be produced by the microbiome on our skin upon UV exposure, acting as a sort of natural sunscreen.
Why is UV light so good for our gut? Two reasons:
-
Remember those aromatic amino acids and neurotransmitters mentioned earlier? Well a vast majority of aromatics are synthesized by your gut microbes via the famous shikamate pathway (famous because glyphosate disrupts this). As a result, most of your neurotransmitter synthesis is happening in the gut. 90-95% of serotonin and 50% of dopamine is produced and stored in the gut. There is a reason it is called your second brain, and it is not fully due to the vagal nerve connection.
-
Your bacteria absorb and fluoresce light constantly. We are made up of far more “bacteria” cells than our own cells and this microbiota is highly dependent on light input. It seems that UV light modulates pathogenic bacteria and helps beneficial bacteria proliferate. This is why UV light has been known as an effective method for cleaning surfaces.
UV Light Summary
UV light is imperative for properly functioning biology, and the fact that it has been demonized for “causing skin cancer” has resulted in a chronic health epidemic. Yes, solar tolerance and callus matters…that is why being outside all year round is imperative. UV light is the reason life began on this planet in the first place (read Nick Lane’s work on deep sea vents), and it stands true today that nearly ALL of the biological semi-conductors that power our biology absorb strongest in the UV range. When you can harness UV light, you become what it truly means to be a human being.
Blue Light – Regulation of Circadian Rhythm, and Melatonin
Blue light (420-500nm) perhaps ma be the most well known light in the visible spectrum. It has been vilified (for good reason) as the light that will disrupt our sleep. This is true, but that does not mean that blue light has a negative impact on our health in the right context, the opposite actually.
Blue light is the master circadian signaler. We sense it in our eyes and skin via the melanopsin receptor and the signal is what sets our bodies master circadian clock: the suprachiasmatic nucleus (SCN). This is how our body tells time, and this is why our blue light and overall light environment is so important. Blue light at night suppresses melatonin production far greater than any other color of light. Blue light conversely stimulates cortisol production, which is what provides wakefulness in the morning.
Blue light is the highest energy wavelength that is present for almost the entirety of sunlight exposure, with an ever increasing amount until solar noon…and then decreasing amount in the afternoon. Again, this is how our body tells time. If you subscribe to the fact that our circadian rhythm is one of if not the most important aspect of our biology (timing is everything), then you would agree that your blue light environment may be the most important area of your health to tackle. This is why there has been such a monumental push on the education around artificial blue light and an entire industry made around blocking blue light.
A healthy, regular circadian rhythm promotes healthy mood and improved cognition. Disruptions to circadian rhythm have been shown to increase the risk of most chornic diseases: including cancer, heart disease, neurodegenerative disease and metabolic conditions. Research has found that, compared to white light therapy, blue light is more effective for resetting circadian rhythms, suppressing nighttime melatonin, and enhancing performance. Other physiological actions of blue light suggested by the scientific literature include an increase in circulating beta endorphins, decreased systolic blood pressure due to nitric oxide mechanisms in the skin, an anti-bacterial effect, and a potential bio-modulating effect within the cells.
Blue light (like all areas of the light spectra) deserves an article of its own. I will be releasing an article dedicated to artificial blue light next month so stay tuned!
Red and Infrared Light - Healing Wavelengths
Red and infrared light is the most abundant portion of full spectrum sunlight, making up over 50% of the sunlight that hits the earth. Most of this is coming in the form of Near Infrared light (750-3000nm). Photo-biomodulation is a term used to describe the physiological effects from irradiation by red or near-infrared wavelengths. Red and near-infrared wavelengths have the ability to penetrate inside of our body’s tissues and cells, and can even penetrate through clothing. Studies have shown benefits such as improved tissue function, wound healing, anti-inflammatory effects, and improved energy metabolism from red and near-infrared wavelengths.
Conditions that may benefit from photobiomodulation include allergies, hypothyroidism, depression, dementia, cancer, diabetes related symptoms, exercise performance and recovery, pain, and cardiovascular diseases.
I have written an article on this substack that dives deep into the benefits of NIR light, and why I think it is the biggest nutrient deficiency worldwide (sunlight = NIR). NIR light (over 950 nm) may penetrate as deep as 8 cm and can penetrate bone, enter the cerebrospinal fluid and the brain.
Why is Red/NIR light so beneficial for our health ? Because it up-regulates ATP production and expands our exclusion zone water. You may have heard how fantastic Red/NIR light is for mitochondria…that is 100% true. Part of that reason is due to melatonin synthesis which is highlighted below. The other part is because it up regulates ATP production by expanding the exclusion zone water around the ATP nanomotor-reducing its viscosity and improving rotational torque. Bit complex yes, but that is the reality of our biology. ATP opens the binding site of proteins to water, which need to be hydrated to function properly as biological semiconductors so you could say that Red/NIR is IMPERATIVE for optimal biological function.
NIR light & Intracellular Melatonin Synthesis
Recent research by Zimmerman, S. and Reiter R. suggests that melatonin (a master antioxidant) exists in two main forms within the body – circulatory melatonin, which is suppressed during the day upon exposure to blue light and has its major effect on sleep and the circadian rhythm, and sub-cellular melatonin, which is produced and used locally by the mitochondria within our cells. NIR light stimulates melatonin production in the mitochondria, which helps protect the cells from oxidative stress from whatever stressors/toxins make their way into the mitochondria. It also helps naturally combat the free radicals generated from UV exposure. This is why Red/NIR wavelengths are so healing, and balance out the high energy and biologically damaging (to some degree) Blue/UV wavelengths. There is always a far higher amount of NIR light than any other light in the spectrum when it comes to energy and power density.
I have written an in depth article about Melatonin as well, because it is so much more than a “sleep hormone”. Zimmerman brilliantly discusses this in his work and how most of the circadian community misses this piece. Melatonin is THE MASTER ANTIOXIDANT, being able to stabilize up to 10 free radicals per molecule due to its remarkable cascading antioxidant abilities.
Violet, Green, Yellow/Orange Light
Violet light (visible) is hard to find research on but can be thought to range from 360-420nm, right after UVA (or even some overlap) and right before blue light in the ascending wavelength spectrum of full spectrum sunlight.
Japanese research showed that violet light (360–400 nm wavelengths) suppressed the axial length elongation both in a chick myopia model and in human. They also spiked out the fact that we are violet light deficient in a modern, indoor world because of the fear mongering around UV light. Blue light from screens causes myopia and violet/UVA light reverses it…
Violet light is also being studied for its potential benefit to improve sleep quality.
Green light (495-570nm) penetrates your dermis, almost reaching the subcutaneous tissue below. Studies have shown that green light is effective for relieving pain. Green light is also beneficial for treating skin condictions, especially with regard to skin tone and complexion. Sunspots, melasma, rosacea, eczema, and psoriasis can all benefit from green light. Another tout to the importance of full spectrum sun is the under discussed skin HEALING frequencies such as green + red to balance the high energy UV.
Green Light:
-
Might be used in attempts to reduce skin redness and irritation.
-
Has been studied for potential pain-reducing properties.
Yellow and Orange light. Lesser research around these wavelengths but including them anyways. These wavelengths penetrate the subcutaneous tissue beneath your dermis. Like green and blue light, they are effective at treating skin issues like eczema, sunburn, psoriasis, and creating an even skin tone. Yellow and orange light therapy is one of the less common types; however, it can help flush waste from your skin, elevate the functioning of your lymphatic system, and stimulate cellular energy to some extent.
One study proved that 590 nm light therapy after laser skin treatments reduced the intensity and healing time of skin irritation.
Yellow light:
-
Sometimes used to stimulate collagen production in the skin.
-
Has been used in lightbox therapies for mood regulation.
Orange light:
-
Often used in attempts to revitalize skin and promote a vibrant complexion.
-
Might be utilized for its potentially energizing and uplifting effects.
Conclusion
You can not replace full spectrum sunlight with light therapies that have only a few isolated frequencies. Sunlight contains such a vast amount of frequencies that all affect our biology in different ways and together provides a very synergistic affect. Our biology has evolved over millions of years to take the FULL SPECTRUM sun as our main input signal.
Light therapy can still be beneficial in certain scenarios without a doubt, but it will never replace full spectrum sunlight. This is a challenge in our modern indoor world we live in, and that is why we need to be so deliberate about going outside. That is also why I am so excited to be working with Daylight Computer, the world’s first computer that is designed to be used outside and has reflective screen technology that doesn’t destroy your retinas. Much more to come on Daylight Computer …so for now here is a repeat of the summary:
-
Sunlight is a broad band emitter and artificial light is a narrow band emitter
-
Sunlight is an un-polarized, continuous source of electromagnetic radiation. Artificial light is highly pulsed
-
Sunlight that reaches the earth is comprised of light frequencies that range from 280nm (UVB) to 2500nm (NIR) and everything in between. Each category of wavelength serves as a different biological stimuli
-
UVB radiation stimulates the production of vitamin D, as well as serotonin and beta-endorphins, UVA promotes the release of nitric oxide into the blood, and both have a positive effect on the diversity of the microbiome and our endogenous hormone production
-
Violet light can reverse myopia and potentially improve sleep quality
-
Blue light is the master circadian signaler, turning on/off the SCN via melanopsin photoreceptor…thus regulating cortisol/melatonin production as well as all circadian timing in the body
-
Green light can treat skin issues and also be used as a pain releiver
-
Red light, near-infrared radiation (NIR), and far-infrared (FIR) radiation have anti-inflammatory and tissue healing effects…NIR also stimulates the production of melatonin inside the mitochondria, a master anti-oxidant
Sunlight is the ultimate provider of light. Your light/EMF diet matters more than anything else in regards to health.
Biology is fundamentally electromagnetic.
Stay Sovereign,
Tristan
My NEW COURSE EMF-201 is officially out! An in depth educational course that follows my flagship EMF-101 course. Diving deep into Radio Frequencies, 5G, and Modern Tech with an appearance from an RF Engineer who has 20+ years of industry experience.
Follow my Decentralized Radio podcast for some brilliant upcoming episodes on light and EMFs.
-
-
@ bf47c19e:c3d2573b
2025-01-08 17:43:36Originalni tekst na novaekonomija.rs
05.12.2024 / Autor: Dragan Milić
Kada se desio prvi veliki „hajp“ oko bitkoina i kriptovaluta generalno (veći od prethodnih), negde krajem 2017-te, verujem da nije bilo čoveka koji tada bar u prolazu nije čuo da neko pominje te čudne, nove reči i fraze. Sećam se da mi je neki taksista, ničim izazvan, rekao da ulazi u posao sa rudarenjem kripta i da je uložio novac u grafičke karte koje treba da stignu preko veze, jer ih nema u prodaji. U tom trenutku to je moglo imati dvojako značenje. Ili da je kripto konačno ušao u mejnstrim i da ga je zajednica široko prihvatila ili da je vreme za izlazak iz tog biznisa i rasprodaju silnih altkoina koji su nicali kao pečurke posle kiše. Ispostavilo se da je ovo drugo bio ispravan odgovor odnosno dobra odluka.
Već u januaru sledeće, 2018. godine ceo sistem je počeo da se urušava kao kula od karata. Zagovornici kripta su govorili da je u pitanju samo korekcija i da će se stvar već na proleće popraviti, ali bitkoin se nije vratio na 17.000 dolara naredne tri godine. A mnoge druge kriptovalute zauvek su izgubile svoju vrednost.
Iako je to novo tržište volatilnost pratila godinama, a prati ga i danas, sada, na izmaku 2024. godine možda već možemo reći da je bitkoin na neki način prošao test vremena i „da je tu da ostane“. Dugo se bitkoin kretao u granicama između 50 i 70 hiljada američkih dolara, ali poguran rezultatima izbora u SAD i drugim makroekonomskim efektima koji su već konstanta, početkom decembra 2024. probio je psihološku granicu od 100.000 USD, čime su se dokazale tvrdnje da vreme digitalne imovine tek dolazi. Dan pre probijanja ovog limita, Džerom Pauel predsednik FED-a, nazvao je bitkoin digitalnim zlatom, i dodatno ubrzao ceo proces.
Mnogima ni danas nije jasno šta je zapravo kripto imovina i kako funkcioniše blokčejn na kojoj ista počiva. Što je opravdano jer je reč o veoma kompleksnoj tehnologiji čije razumevanje podrazumeva solidnu tehničku potkovanost i informisanost.
Činjenica je da nije potrebno poznavati tehnološki aspekt kripta da bi ga posedovali i trgovali istim, međutim to nas dovodi do starog pravila da investirate samo u stvari odnosno poslove koje razumete. Možda je to razlog zašto se tradicionalni ulagač i dalje drži S&P500 indeksa i nekretnina kao primarnog izbora, koji su uvek sigurnija opcija i manje podložna nestabilnosti.
Međutim, kako vreme odmiče, polako se stvara poverenje i u digitalnu imovinu kao opciju za ulaganje, koja nosi veliki rizik ali i veliku mogućnost zarade. Na primer, ko je pre nekoliko godina kupio bitkoin, na srednji rok je mogao višestruko da umnoži svoje ulaganje. A ko je bio u stanju da izađe iz okvira saveta „uloži onoliko koliko si spreman da oprostiš“ mogao je značajno da uveća svoj kapital. Na primer, da sam početkom 2020-te u jeku pandemije imao hrabrosti da kupim bitkoin po 5.000 dolara, sada bih zaradio dvadeset puta više. Ali, moglo je da bude i drugačije. Naknadna pamet ne važi…
Inače, moja lična predviđanja iz perioda s početka ove priče, dakle iz 2017-te, su bila polovično optimistična. Smeo sam se kladiti na blokčejn kao tehnologiju i njenu budućnost, međutim nisam bio siguran u bitkoin, jer sam mislio da će ubrzo biti prevaziđen. Naročito zbog svog Proof of work-a odnosno trošenja velike količine energije i računarskih resursa za odobravanje transakcija što nije bio slučaj kod nekih, u to vreme, novih kriptovaluta.
U avgustu 2017. u autorskom tekstu za jedan portal, sam napisao da kako god da završi Bitcoin kao čudo koje je okrenulo ekonomiju naglavačke ili i sam padne u revoluciji čiji je pionir i začetnik, Blockchain kao jedinstveno i genijalno tehnološko rešenje za transferisanje digitalnog novca će ostati. I mnogi upravo u ovoj tehnologiji vide budućnost novca. I pogrešio sam. Blokčejn i dalje čeka na svojih pet minuta, ali bitkoin odoleva i uči nas da na njega moramo računati.
U međuvremenu se dakle mnogo toga promenilo. Bitkoin se i pored volatilnosti uvukao u portfolije ozbiljnih investitora, odobreni su takozvani ETF-ovi (Exchange-Traded Fund), koji omogućavaju investitorima da ulažu u bitkoin bez potrebe da ga direktno poseduju ili upravljaju svojim digitalnim novčanicima i privatnim ključevima.
Glavna prepreka, u vidu nedostatka regulative, takođe je prevaziđena u mnogim pravnim sistemima. Možemo s ponosom istaći da je Republika Srbija jedna od prvih država u Evropi koja je regulisala Digitalnu imovinu. Ubrzo nakon usvajanja Zakona o digitalnoj imovini, izmenjen je i Zakon o porezu na dohodak građana, gde je bar na papiru, osvetljen i poreski tretman kripta. Problema u praksi i dalje ima, naročito oko podnošenja poreskih prijava i utvrđivanja poreske osnovice odnosno obračuna poreza, ali bar u delu vrste poreza i poreske stope pravne nesigurnosti više nema. Takođe, svako ko želi da se bavi pružanjem usluga može proći ne tako jednostavnu proceduru pribavljanja odgovarajućih dozvola u skladu sa zakonom i otpočeti taj posao u potpuno legalnim okvirima, što je do pre nekoliko godina bila siva zona i kod nas i u većini zemalja.
Bitkoinova mlađa braća nešto kaskaju sa dostizanjem svog ATH-a (All Time High), pa na primer ETH (Itirijum) u trenutku pisanja ovog teksta još uvek nije dostigao za njega magičnih 5.000 dolara, ali sva je prilika da će bitkoin prokrčiti put i za druge tokene odnosno kriptovalute na tržištu. Bar one koji su prošli test vremena i iza kojih postoji ozbiljnija infrastruktura i poslovanje.
-
@ 6e4f2866:a76f7a29
2025-01-08 17:29:36Foreword
“What’s the best sex you’ve ever had?”
Imagine that being the question that changed your life’s work!
And no, it didn’t come from a sleazy porn director in the basement
of a dingy house directed towards the person sitting on the
casting couch. It was asked by Rob Brinded at Chelsea FC’s stateof-
the-art Sports and Injury Prevention Medical facility and directed
at one of the best Football players in the world at that time.
Why did Rob ask that question? What did it reveal to him, and
how did that lead to him quitting his ‘perfect life’?
Even before the athlete answered, Rob knew he had unlocked
an incredibly important discovery. A discovery that would change
the trajectory of his life. One that would trigger him to walk
away from a high-paying job, get dumped by his girlfriend, and be
shunned by his professional peers while facing the inner demons
and self-torture of disappointment.
During this time, Rob forged a new mindset, armed himself
with the tools to cure himself, and extended that healing touch to
anyone who had the fortune of interacting with him.
Like many of my new friends, I first met Rob on Twitter. He
approached me after I had been the featured guest on The Bitcoin
Standard Podcast. My discussion with host Saifedean Ammous \ \ centred around the intricacies of the current education system
and the benefits of homeschooling. Rob had been particularly
intrigued by my insights about teaching versus learning and
how our education system is designed to mould kids rather than
nurture and inspire them. But what truly piqued Rob’s curiosity
was what I didn’t say. Throughout the podcast conversation,
he wanted to ask about certain nuances, the pauses. Because, well,
that’s the way Rob’s mind works now!
Over the next few months, Rob and I stayed in contact and
eventually had the pleasure of meeting each other in Madeira when
we received an invitation to assemble with other bitcoiners to meet
the President, as he and his cabinet wanted to learn more about
bitcoin and the opportunities it might bring to their island.
Extended, in-person conversations with Rob about his work
are truly fascinating. During our first meet-up, I found myself
open to everything he shared. Some people he has encountered
have brushed him off as a ‘Guru’ or too ‘Woo-Woo’ and thought
his ideas were too far out there. The irony here is that their feelings
are triggered by the very conditioning and programming that
these people have been subjected to and have been running from
their whole lives. As Rob would explain, the only way to step off
the hamster wheel is to realise you are on it in the first place. Most
people don’t and will forever be trapped, running the same selfdeprecating
programmes for their whole lives.
I was so captivated by Rob’s ideas that I booked him for a
few sessions (paid in bitcoin) to learn more about his work and,
of course, myself. My goal was to understand why I thought the
way I thought and why I acted the way I acted under certain stressors.
With a spirit of open exploration, we embarked on a journey
through my past, present and future, engaging in candid conversations
that flowed effortlessly. Rob’s guidance helped me decipher
the programs I had been running in my head (my OS system) and
how to close them down. I can best surmise it with the analogy
of ‘force-quitting’ a program on your computer when you get the
‘spinning beach ball of death’.
Once you do this simple visualisation exercise, a remarkable
transformation occurs — you feel lighter and think clearer. Like
our minds, our bodies can react in the most incredible ways. Lifelong
ailments, aches, or pains can feel instantly better and even disappear
completely.
Rob’s conviction in his work is not from blind luck; it’s rooted
in decades of deep introspection mixed with theoretical and practical
study — and, importantly, from results. The outcomes Rob
has seen and shared in this book are beyond remarkable and worth
everyone’s attention. As you journey through these pages and into
this rabbit hole, remember to note what emotions are triggered
within YOU carefully. Because that, dear reader, is your personal
hamster wheel. Those triggered emotions have been programmed
into your OS since you were born, and those programs are what
hold you back mentally and physically from being your best self
and living a happier and freer life.
So, sit back and enjoy the ride. Welcome to the rabbit hole of
decentralising your mind!
Daniel Prince
Host of The Once Bitten Podcast and Author of Choose Life
Block Height 800,608 — SW France \ \ M I N D , D E C E N T R A L I S E D
-
@ 7ed7d5c3:6927e200
2025-01-08 17:10:00Can't decide if the terrible book you just read is a 1 or 1.5 star book? Look no further than this chart. Was it Shit or just Bad? Was that movie you watched Very Good or just Decent? How many things out there are really Life Changing?
Finally, a rating scale for humans. Use it for anything in your life that needs a rating out of 5 stars.
Rating / Description
0.5 – The worst 1.0 – Shit 1.5 – Bad 2.0 – Eh 2.5 – Entertaining, but not great 3.0 – Neutral 3.5 – Alright 4.0 – Decent 4.5 – Very good 5.0 – Life Changing
P.S. Do not use it to rate your wife's cooking. The author is not liable for any damages.
-
@ e6817453:b0ac3c39
2024-12-07 14:54:46Introduction: Personal Knowledge Graphs and Linked Data
We will explore the world of personal knowledge graphs and discuss how they can be used to model complex information structures. Personal knowledge graphs aren’t just abstract collections of nodes and edges—they encode meaningful relationships, contextualizing data in ways that enrich our understanding of it. While the core structure might be a directed graph, we layer semantic meaning on top, enabling nuanced connections between data points.
The origin of knowledge graphs is deeply tied to concepts from linked data and the semantic web, ideas that emerged to better link scattered pieces of information across the web. This approach created an infrastructure where data islands could connect — facilitating everything from more insightful AI to improved personal data management.
In this article, we will explore how these ideas have evolved into tools for modeling AI’s semantic memory and look at how knowledge graphs can serve as a flexible foundation for encoding rich data contexts. We’ll specifically discuss three major paradigms: RDF (Resource Description Framework), property graphs, and a third way of modeling entities as graphs of graphs. Let’s get started.
Intro to RDF
The Resource Description Framework (RDF) has been one of the fundamental standards for linked data and knowledge graphs. RDF allows data to be modeled as triples: subject, predicate, and object. Essentially, you can think of it as a structured way to describe relationships: “X has a Y called Z.” For instance, “Berlin has a population of 3.5 million.” This modeling approach is quite flexible because RDF uses unique identifiers — usually URIs — to point to data entities, making linking straightforward and coherent.
RDFS, or RDF Schema, extends RDF to provide a basic vocabulary to structure the data even more. This lets us describe not only individual nodes but also relationships among types of data entities, like defining a class hierarchy or setting properties. For example, you could say that “Berlin” is an instance of a “City” and that cities are types of “Geographical Entities.” This kind of organization helps establish semantic meaning within the graph.
RDF and Advanced Topics
Lists and Sets in RDF
RDF also provides tools to model more complex data structures such as lists and sets, enabling the grouping of nodes. This extension makes it easier to model more natural, human-like knowledge, for example, describing attributes of an entity that may have multiple values. By adding RDF Schema and OWL (Web Ontology Language), you gain even more expressive power — being able to define logical rules or even derive new relationships from existing data.
Graph of Graphs
A significant feature of RDF is the ability to form complex nested structures, often referred to as graphs of graphs. This allows you to create “named graphs,” essentially subgraphs that can be independently referenced. For example, you could create a named graph for a particular dataset describing Berlin and another for a different geographical area. Then, you could connect them, allowing for more modular and reusable knowledge modeling.
Property Graphs
While RDF provides a robust framework, it’s not always the easiest to work with due to its heavy reliance on linking everything explicitly. This is where property graphs come into play. Property graphs are less focused on linking everything through triples and allow more expressive properties directly within nodes and edges.
For example, instead of using triples to represent each detail, a property graph might let you store all properties about an entity (e.g., “Berlin”) directly in a single node. This makes property graphs more intuitive for many developers and engineers because they more closely resemble object-oriented structures: you have entities (nodes) that possess attributes (properties) and are connected to other entities through relationships (edges).
The significant benefit here is a condensed representation, which speeds up traversal and queries in some scenarios. However, this also introduces a trade-off: while property graphs are more straightforward to query and maintain, they lack some complex relationship modeling features RDF offers, particularly when connecting properties to each other.
Graph of Graphs and Subgraphs for Entity Modeling
A third approach — which takes elements from RDF and property graphs — involves modeling entities using subgraphs or nested graphs. In this model, each entity can be represented as a graph. This allows for a detailed and flexible description of attributes without exploding every detail into individual triples or lump them all together into properties.
For instance, consider a person entity with a complex employment history. Instead of representing every employment detail in one node (as in a property graph), or as several linked nodes (as in RDF), you can treat the employment history as a subgraph. This subgraph could then contain nodes for different jobs, each linked with specific properties and connections. This approach keeps the complexity where it belongs and provides better flexibility when new attributes or entities need to be added.
Hypergraphs and Metagraphs
When discussing more advanced forms of graphs, we encounter hypergraphs and metagraphs. These take the idea of relationships to a new level. A hypergraph allows an edge to connect more than two nodes, which is extremely useful when modeling scenarios where relationships aren’t just pairwise. For example, a “Project” could connect multiple “People,” “Resources,” and “Outcomes,” all in a single edge. This way, hypergraphs help in reducing the complexity of modeling high-order relationships.
Metagraphs, on the other hand, enable nodes and edges to themselves be represented as graphs. This is an extremely powerful feature when we consider the needs of artificial intelligence, as it allows for the modeling of relationships between relationships, an essential aspect for any system that needs to capture not just facts, but their interdependencies and contexts.
Balancing Structure and Properties
One of the recurring challenges when modeling knowledge is finding the balance between structure and properties. With RDF, you get high flexibility and standardization, but complexity can quickly escalate as you decompose everything into triples. Property graphs simplify the representation by using attributes but lose out on the depth of connection modeling. Meanwhile, the graph-of-graphs approach and hypergraphs offer advanced modeling capabilities at the cost of increased computational complexity.
So, how do you decide which model to use? It comes down to your use case. RDF and nested graphs are strong contenders if you need deep linkage and are working with highly variable data. For more straightforward, engineer-friendly modeling, property graphs shine. And when dealing with very complex multi-way relationships or meta-level knowledge, hypergraphs and metagraphs provide the necessary tools.
The key takeaway is that only some approaches are perfect. Instead, it’s all about the modeling goals: how do you want to query the graph, what relationships are meaningful, and how much complexity are you willing to manage?
Conclusion
Modeling AI semantic memory using knowledge graphs is a challenging but rewarding process. The different approaches — RDF, property graphs, and advanced graph modeling techniques like nested graphs and hypergraphs — each offer unique strengths and weaknesses. Whether you are building a personal knowledge graph or scaling up to AI that integrates multiple streams of linked data, it’s essential to understand the trade-offs each approach brings.
In the end, the choice of representation comes down to the nature of your data and your specific needs for querying and maintaining semantic relationships. The world of knowledge graphs is vast, with many tools and frameworks to explore. Stay connected and keep experimenting to find the balance that works for your projects.
-
@ e6817453:b0ac3c39
2024-12-07 14:52:47The temporal semantics and temporal and time-aware knowledge graphs. We have different memory models for artificial intelligence agents. We all try to mimic somehow how the brain works, or at least how the declarative memory of the brain works. We have the split of episodic memory and semantic memory. And we also have a lot of theories, right?
Declarative Memory of the Human Brain
How is the semantic memory formed? We all know that our brain stores semantic memory quite close to the concept we have with the personal knowledge graphs, that it’s connected entities. They form a connection with each other and all those things. So far, so good. And actually, then we have a lot of concepts, how the episodic memory and our experiences gets transmitted to the semantic:
- hippocampus indexing and retrieval
- sanitization of episodic memories
- episodic-semantic shift theory
They all give a different perspective on how different parts of declarative memory cooperate.
We know that episodic memories get semanticized over time. You have semantic knowledge without the notion of time, and probably, your episodic memory is just decayed.
But, you know, it’s still an open question:
do we want to mimic an AI agent’s memory as a human brain memory, or do we want to create something different?
It’s an open question to which we have no good answer. And if you go to the theory of neuroscience and check how episodic and semantic memory interfere, you will still find a lot of theories, yeah?
Some of them say that you have the hippocampus that keeps the indexes of the memory. Some others will say that you semantic the episodic memory. Some others say that you have some separate process that digests the episodic and experience to the semantics. But all of them agree on the plan that it’s operationally two separate areas of memories and even two separate regions of brain, and the semantic, it’s more, let’s say, protected.
So it’s harder to forget the semantical facts than the episodes and everything. And what I’m thinking about for a long time, it’s this, you know, the semantic memory.
Temporal Semantics
It’s memory about the facts, but you somehow mix the time information with the semantics. I already described a lot of things, including how we could combine time with knowledge graphs and how people do it.
There are multiple ways we could persist such information, but we all hit the wall because the complexity of time and the semantics of time are highly complex concepts.
Time in a Semantic context is not a timestamp.
What I mean is that when you have a fact, and you just mentioned that I was there at this particular moment, like, I don’t know, 15:40 on Monday, it’s already awake because we don’t know which Monday, right? So you need to give the exact date, but usually, you do not have experiences like that.
You do not record your memories like that, except you do the journaling and all of the things. So, usually, you have no direct time references. What I mean is that you could say that I was there and it was some event, blah, blah, blah.
Somehow, we form a chain of events that connect with each other and maybe will be connected to some period of time if we are lucky enough. This means that we could not easily represent temporal-aware information as just a timestamp or validity and all of the things.
For sure, the validity of the knowledge graphs (simple quintuple with start and end dates)is a big topic, and it could solve a lot of things. It could solve a lot of the time cases. It’s super simple because you give the end and start dates, and you are done, but it does not answer facts that have a relative time or time information in facts . It could solve many use cases but struggle with facts in an indirect temporal context. I like the simplicity of this idea. But the problem of this approach that in most cases, we simply don’t have these timestamps. We don’t have the timestamp where this information starts and ends. And it’s not modeling many events in our life, especially if you have the processes or ongoing activities or recurrent events.
I’m more about thinking about the time of semantics, where you have a time model as a hybrid clock or some global clock that does the partial ordering of the events. It’s mean that you have the chain of the experiences and you have the chain of the facts that have the different time contexts.
We could deduct the time from this chain of the events. But it’s a big, big topic for the research. But what I want to achieve, actually, it’s not separation on episodic and semantic memory. It’s having something in between.
Blockchain of connected events and facts
I call it temporal-aware semantics or time-aware knowledge graphs, where we could encode the semantic fact together with the time component.I doubt that time should be the simple timestamp or the region of the two timestamps. For me, it is more a chain for facts that have a partial order and form a blockchain like a database or a partially ordered Acyclic graph of facts that are temporally connected. We could have some notion of time that is understandable to the agent and a model that allows us to order the events and focus on what the agent knows and how to order this time knowledge and create the chains of the events.
Time anchors
We may have a particular time in the chain that allows us to arrange a more concrete time for the rest of the events. But it’s still an open topic for research. The temporal semantics gets split into a couple of domains. One domain is how to add time to the knowledge graphs. We already have many different solutions. I described them in my previous articles.
Another domain is the agent's memory and how the memory of the artificial intelligence treats the time. This one, it’s much more complex. Because here, we could not operate with the simple timestamps. We need to have the representation of time that are understandable by model and understandable by the agent that will work with this model. And this one, it’s way bigger topic for the research.”
-
@ 2355757c:5ad3e04d
2025-01-08 17:00:53Non-Native Electromagnetic Fields (nnEMFs) are in my opinion, the least discussed and most pervasive environmental toxin in modern society that is negatively affecting our health. We live in a toxic soup world, where we are being attacked from every angle. Polluted air, water, plastics, chemicals in our food/clothes, endocrine disruptors in our personal care and cooking products…the list goes on and on. It is the unfortunate reality of living in a modern fiat world, where all big companies cut corners with cheap, toxic ingredients just so you can have a $20 cooking pan and a $15 t-shirt.
On the bright side of things, most of those toxins are pretty easily avoidable by just swapping for higher quality or more natural alternatives. You can also filter or buy better water and eat real food that was raised locally without toxic herbicides (to a pretty easy degree). Enter nnEMFs, something that is IMPOSSIBLE to fully avoid and MUCH more challenging to mitigate exposure to. That is because technology is so ubiquitous in our modern society. Cell phones and wifi routers in every house, smart appliances, cell towers on every block, power distribution and transmission lines, 5G rollout…we are surrounded by nnEMFs on a daily basis.
What are nnEMFs and why are they bad for my health?
A nnEMF is any EMF generated from a non-native source AKA a result of modern human technology. The three most common sources of nnEMFs are from our electrical power grid, radiofrequency (RF) communication, and microwave frequencies. These three sources differ by function and frequency.
-
Electrical Power Grid - 60Hz Frequency - In “Extremely Low Frequency Range (ELF)”
-
Radio Frequency (RF) - 3kHz to 300GHz - Mobile/Societal Communication/TV/Radio
-
Microwave (MW) - 300MHz to 300GHz - Radar/Satellite/Space Communication
It gets a bit confusing in the nomenclature between RF and MW, but in reality the only difference is the type of application above 300MHz. Below 300MHz and it is distinctly an RF frequency. All transmission and distribution of power to industry/homes/businesses is occurring at 60Hz. Vast differences in frequency, both turn out to be pretty detrimental for our health. Here’s a few reasons why:
- Classified as a possible carcinogen by the IARC (Group 2B)
RF-EMFs and ELF EMFs have been classified by the IARC as possibly carcinogenic based on the current scientific evidence. Now this is still a lower classification than red meat, so does this carry any merit? I say yes. Many researchers agree, such as in THIS study where researchers looked at mobile phone radiation and risk of brain tumors and concluded that RF fields should be classified as a probable carcinogenunder the criteria used by the IARC.
- RF and ELF Fields Increase Oxidative Stress
Oxidative stress. If you are a regular here in the health space you know how much comes down to maintaining redox homeostasis in our mitochondria (the supplier of ATP in our cells). Dysfunctional mitochondria = dysfunctional health and it just so happens that nnEMFs can significantly increase oxidative stress in our cells, with review studies like THIS one documenting how the most electromagnetic organs (brain, heart) as well as reproductive organs (testes, ovaries) were the MOST affected. (I wrote a recent substack post on declining sperm count and nnEMFs was the star of the show). Increased oxidative stress is consistent with OG findings from the likes of Dr. Robert Becker and Dr. Andrew Marino in their research. It is high level, but increased levels of oxidative stress predisposes you to increased risk of ALL KNOWN CHRONIC DISEASES. Because of this, nnEMFs have been strongly linked to increased risk of the following:
-
Neurodegenerative diseases
-
Reproductive issues
-
Cancer
-
Cardiovascular disease
-
Diabetes
-
Disturbed Sleep
We live in a toxic soup world. Achieving restorative sleep is the only way our body is able to fight back and restore our health from all of these toxic exposures. ANYTHING that impedes sleep restoration is a premature nail in the coffin in my eyes. Don’t believe me on the importance and power of melatonin and our circadian rhythm? Check out THIS thread I wrote on melatonin (anti-cancer, potent anti-oxidant, mitochondrial composer, etc.). Exposure to nnEMFs during the day AND at night disturb our sleep and prevent the ability to have that highly restorative sleep needed to detoxify and replenish our cells. Lose quality sleep, lose the ability to handle stressors that you are exposed to daily.
DON’T BELIEVE ME THAT nnEMFs are harmful to human health? You are not alone. Many mainstream media outlets, researchers, and industry “experts” dismiss the level of non-ionizing radiation coming from things like cell phones as dangerous to human health. This is has been ongoing since the 1970s. However, if you are subscribed to this newsletter you may have more of an open mind to believing everything you read from CNN, Forbes, or the WHO. I know you all question things more than the average member of society. So if you question the efficacy and morality of the vaccine, why would you not also question the potential health hazards of nnEMF exposure? Even Presidential Nominee RFK is on board. Big Tech, Big Pharma, Big Food…there is no difference! Centralized industry will do anything it takes to cover up research that is sound and not funded by themselves. Here is an example…
Dr. Henry Lai from University of Washington Emeritus has compiled the most comprehensive set of research articles regarding nnEMFs and biological impacts. He has reviewed OVER 2,500 studies. His conclusion?
Dr. Lai reports concluded from his research that exposure to RFR or ELF EMF produces oxidative effects or free radicals, and damages DNA. Downstream effects of studies examined include significant effects on genetic, neurological and reproductive functions. Among hundreds of studies of Radio Frequency Radiation (RFR), 70% to 89% reported significant biological effects. Among hundreds of studies of Extremely Low Frequency (ELF) and static fields, 74% to 91% reported significant biological effects.
Still don’t believe me, read the book Going Somewhere by Dr. Andrew Marino. It will blow your mind on how much effort has gone to cover up research on the biological effects of nnEMFs since the 1970s. Or Google Russia’s stance on nnEMFs.
You can also listen to one of our latest Decentralized Radio episodes with Anthony Smith, COO of EMF Safe. EMF Safe is a fantastic company that offers, in my opinion, the MOST effective nnEMF mitigation technology for your house. Hint: it’s not a f*cking pendant or harmonizer. YouTube link or Spotify link HERE.
Now that we got through the depressing side of the story, let's talk about WHAT YOU CAN DO to protect yourself from the harmful effects of nnEMFs without having to live in the woods-not a perfect solution either ;)
HOW TO MITIGATE nnEMF detrimental health effects: DURATION + DISTANCE \
\ TIME/DURATION. Your worst enemy in being exposed to nnEMFs is the duration of exposure. Nearly all of the negative studies showed that after 48-72hrs of exposure (chronic), detrimental health effects were seen. HOWEVER, the same studies showed less conclusive negative health effects for exposures less than 24-48hrs (with variance). For me that means the following action items:
-
Turn off the wifi-router at night
-
Turn phone on airplane mode when not using for >10 min
-
Turn appliances OFF when not in use in your home
-
Create a sleep sanctuary with minimal/no electronics in the bedroom
-
Do not move to an area right next to High Voltage Transmission Lines, Substation, Airport, Hospital, etc. (any area with high powered communication/RF equipment or power distribution equipment)
DISTANCE. Distance is your best friend in mitigating nnEMFs. Why? Inverse square law. Inverse square law is the fact that the magnitude of the EMF is calculated with the square of the distance in the denominator of the equation. This means that for every doubling of distance you have between you and the EMF source, the magnitude weakens by a factor of FOUR. Triple the distance, EMF magnitude goes down by a factor of NINE (and so forth). For me that results in the following action items:
-
Do not keep your cell phone ON your body when ON & receiving calls/texts
-
Do NOT hold your cell phone up to your ear when making calls (use headphones/speaker)
-
Move your bed 6-12 inches AWAY from any electrical outlets in your bedroom (especially near your head)
-
Do not stand immediately next to high powered appliances when ON & in use (microwave, washer, dryer, blender, etc.)
There exists a lot of other nnEMF “mitigating/harmonizing” technologies, however I would be highly suspect of anyone trying to sell you something. EMFs are extremely complex. The angle of incidence, power level, and frequency matter tremendously. Most folks who aren’t engineers or have a deep knowledge of physics likely won’t be able to have the baseline knowledge to know what is a scam and what is not. OR what to prioritize from an nnEMF mitigation perspective. I gave a pretty good starting point above for what actionable steps you can take. THis does not mean all products are a scam. nnEMF shielding has its place and I use some of these products…but whenever a topic is extremely complex to the layperson, it is easy for someone to convince you that a product works. Especially when proof is challenging to come up with (EMF readers are an okay tool at best).
As someone who holds a M.S. in Electrical Engineering, I never thought that my degree would come in handy for health optimization. Now in 2023, here I am realizing how electromagnetism is likely the MOST important topic to conceptualize to really crack the optimal health code. We are electromagnetic beings, and the research in this space has only just begun to scratch the surface.
If you want to learn more in depth about nnEMFs, mitigation tactics, what products work and do not, etc…subscribe to stay up to date on the latest. I am directly working with some renowned EMF experts on developing more educational content/courses that I will be launching in the near future to help practitioners and fellow esoteric health connoisseurs better understand nnEMFs more in depth to help themselves and their clients live a more optimal life.
Here on Decentralized Health, I will be writing in depth about the electromagnetic aspects of health alongside other topics I am passionate about such as environmental toxins, regenerative agriculture, decentralization, Bitcoin and more. I want as many people as possible to become empowered through education so that they can escape the dependencies of the centralized systems that are tarnishing our quality of life.
This is just the tip of the nnEMF iceberg.
Stay Sovereign,
Tristan
Originally published Sep 25. 2023
-
-
@ a39d19ec:3d88f61e
2024-11-21 12:05:09A state-controlled money supply can influence the development of socialist policies and practices in various ways. Although the relationship is not deterministic, state control over the money supply can contribute to a larger role of the state in the economy and facilitate the implementation of socialist ideals.
Fiscal Policy Capabilities
When the state manages the money supply, it gains the ability to implement fiscal policies that can lead to an expansion of social programs and welfare initiatives. Funding these programs by creating money can enhance the state's influence over the economy and move it closer to a socialist model. The Soviet Union, for instance, had a centralized banking system that enabled the state to fund massive industrialization and social programs, significantly expanding the state's role in the economy.
Wealth Redistribution
Controlling the money supply can also allow the state to influence economic inequality through monetary policies, effectively redistributing wealth and reducing income disparities. By implementing low-interest loans or providing financial assistance to disadvantaged groups, the state can narrow the wealth gap and promote social equality, as seen in many European welfare states.
Central Planning
A state-controlled money supply can contribute to increased central planning, as the state gains more influence over the economy. Central banks, which are state-owned or heavily influenced by the state, play a crucial role in managing the money supply and facilitating central planning. This aligns with socialist principles that advocate for a planned economy where resources are allocated according to social needs rather than market forces.
Incentives for Staff
Staff members working in state institutions responsible for managing the money supply have various incentives to keep the system going. These incentives include job security, professional expertise and reputation, political alignment, regulatory capture, institutional inertia, and legal and administrative barriers. While these factors can differ among individuals, they can collectively contribute to the persistence of a state-controlled money supply system.
In conclusion, a state-controlled money supply can facilitate the development of socialist policies and practices by enabling fiscal policies, wealth redistribution, and central planning. The staff responsible for managing the money supply have diverse incentives to maintain the system, further ensuring its continuation. However, it is essential to note that many factors influence the trajectory of an economic system, and the relationship between state control over the money supply and socialism is not inevitable.
-
@ a39d19ec:3d88f61e
2024-11-17 10:48:56This week's functional 3d print is the "Dino Clip".
Dino Clip
I printed it some years ago for my son, so he would have his own clip for cereal bags.
Now it is used to hold a bag of dog food close.
The design by "Sneaks" is a so called "print in place". This means that the whole clip with moving parts is printed in one part, without the need for assembly after the print.
The clip is very strong, and I would print it again if I need a "heavy duty" clip for more rigid or big bags. Link to the file at Printables
-
@ 4ba8e86d:89d32de4
2024-11-14 09:17:14Tutorial feito por nostr:nostr:npub1rc56x0ek0dd303eph523g3chm0wmrs5wdk6vs0ehd0m5fn8t7y4sqra3tk poste original abaixo:
Parte 1 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/263585/tutorial-debloat-de-celulares-android-via-adb-parte-1
Parte 2 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/263586/tutorial-debloat-de-celulares-android-via-adb-parte-2
Quando o assunto é privacidade em celulares, uma das medidas comumente mencionadas é a remoção de bloatwares do dispositivo, também chamado de debloat. O meio mais eficiente para isso sem dúvidas é a troca de sistema operacional. Custom Rom’s como LineageOS, GrapheneOS, Iodé, CalyxOS, etc, já são bastante enxutos nesse quesito, principalmente quanto não é instalado os G-Apps com o sistema. No entanto, essa prática pode acabar resultando em problemas indesejados como a perca de funções do dispositivo, e até mesmo incompatibilidade com apps bancários, tornando este método mais atrativo para quem possui mais de um dispositivo e separando um apenas para privacidade. Pensando nisso, pessoas que possuem apenas um único dispositivo móvel, que são necessitadas desses apps ou funções, mas, ao mesmo tempo, tem essa visão em prol da privacidade, buscam por um meio-termo entre manter a Stock rom, e não ter seus dados coletados por esses bloatwares. Felizmente, a remoção de bloatwares é possível e pode ser realizada via root, ou mais da maneira que este artigo irá tratar, via adb.
O que são bloatwares?
Bloatware é a junção das palavras bloat (inchar) + software (programa), ou seja, um bloatware é basicamente um programa inútil ou facilmente substituível — colocado em seu dispositivo previamente pela fabricante e operadora — que está no seu dispositivo apenas ocupando espaço de armazenamento, consumindo memória RAM e pior, coletando seus dados e enviando para servidores externos, além de serem mais pontos de vulnerabilidades.
O que é o adb?
O Android Debug Brigde, ou apenas adb, é uma ferramenta que se utiliza das permissões de usuário shell e permite o envio de comandos vindo de um computador para um dispositivo Android exigindo apenas que a depuração USB esteja ativa, mas também pode ser usada diretamente no celular a partir do Android 11, com o uso do Termux e a depuração sem fio (ou depuração wifi). A ferramenta funciona normalmente em dispositivos sem root, e também funciona caso o celular esteja em Recovery Mode.
Requisitos:
Para computadores:
• Depuração USB ativa no celular; • Computador com adb; • Cabo USB;
Para celulares:
• Depuração sem fio (ou depuração wifi) ativa no celular; • Termux; • Android 11 ou superior;
Para ambos:
• Firewall NetGuard instalado e configurado no celular; • Lista de bloatwares para seu dispositivo;
Ativação de depuração:
Para ativar a Depuração USB em seu dispositivo, pesquise como ativar as opções de desenvolvedor de seu dispositivo, e lá ative a depuração. No caso da depuração sem fio, sua ativação irá ser necessária apenas no momento que for conectar o dispositivo ao Termux.
Instalação e configuração do NetGuard
O NetGuard pode ser instalado através da própria Google Play Store, mas de preferência instale pela F-Droid ou Github para evitar telemetria.
F-Droid: https://f-droid.org/packages/eu.faircode.netguard/
Github: https://github.com/M66B/NetGuard/releases
Após instalado, configure da seguinte maneira:
Configurações → padrões (lista branca/negra) → ative as 3 primeiras opções (bloquear wifi, bloquear dados móveis e aplicar regras ‘quando tela estiver ligada’);
Configurações → opções avançadas → ative as duas primeiras (administrar aplicativos do sistema e registrar acesso a internet);
Com isso, todos os apps estarão sendo bloqueados de acessar a internet, seja por wifi ou dados móveis, e na página principal do app basta permitir o acesso a rede para os apps que você vai usar (se necessário). Permita que o app rode em segundo plano sem restrição da otimização de bateria, assim quando o celular ligar, ele já estará ativo.
Lista de bloatwares
Nem todos os bloatwares são genéricos, haverá bloatwares diferentes conforme a marca, modelo, versão do Android, e até mesmo região.
Para obter uma lista de bloatwares de seu dispositivo, caso seu aparelho já possua um tempo de existência, você encontrará listas prontas facilmente apenas pesquisando por elas. Supondo que temos um Samsung Galaxy Note 10 Plus em mãos, basta pesquisar em seu motor de busca por:
Samsung Galaxy Note 10 Plus bloatware list
Provavelmente essas listas já terão inclusas todos os bloatwares das mais diversas regiões, lhe poupando o trabalho de buscar por alguma lista mais específica.
Caso seu aparelho seja muito recente, e/ou não encontre uma lista pronta de bloatwares, devo dizer que você acaba de pegar em merda, pois é chato para um caralho pesquisar por cada aplicação para saber sua função, se é essencial para o sistema ou se é facilmente substituível.
De antemão já aviso, que mais para frente, caso vossa gostosura remova um desses aplicativos que era essencial para o sistema sem saber, vai acabar resultando na perda de alguma função importante, ou pior, ao reiniciar o aparelho o sistema pode estar quebrado, lhe obrigando a seguir com uma formatação, e repetir todo o processo novamente.
Download do adb em computadores
Para usar a ferramenta do adb em computadores, basta baixar o pacote chamado SDK platform-tools, disponível através deste link: https://developer.android.com/tools/releases/platform-tools. Por ele, você consegue o download para Windows, Mac e Linux.
Uma vez baixado, basta extrair o arquivo zipado, contendo dentro dele uma pasta chamada platform-tools que basta ser aberta no terminal para se usar o adb.
Download do adb em celulares com Termux.
Para usar a ferramenta do adb diretamente no celular, antes temos que baixar o app Termux, que é um emulador de terminal linux, e já possui o adb em seu repositório. Você encontra o app na Google Play Store, mas novamente recomendo baixar pela F-Droid ou diretamente no Github do projeto.
F-Droid: https://f-droid.org/en/packages/com.termux/
Github: https://github.com/termux/termux-app/releases
Processo de debloat
Antes de iniciarmos, é importante deixar claro que não é para você sair removendo todos os bloatwares de cara sem mais nem menos, afinal alguns deles precisam antes ser substituídos, podem ser essenciais para você para alguma atividade ou função, ou até mesmo são insubstituíveis.
Alguns exemplos de bloatwares que a substituição é necessária antes da remoção, é o Launcher, afinal, é a interface gráfica do sistema, e o teclado, que sem ele só é possível digitar com teclado externo. O Launcher e teclado podem ser substituídos por quaisquer outros, minha recomendação pessoal é por aqueles que respeitam sua privacidade, como Pie Launcher e Simple Laucher, enquanto o teclado pelo OpenBoard e FlorisBoard, todos open-source e disponíveis da F-Droid.
Identifique entre a lista de bloatwares, quais você gosta, precisa ou prefere não substituir, de maneira alguma você é obrigado a remover todos os bloatwares possíveis, modifique seu sistema a seu bel-prazer. O NetGuard lista todos os apps do celular com o nome do pacote, com isso você pode filtrar bem qual deles não remover.
Um exemplo claro de bloatware insubstituível e, portanto, não pode ser removido, é o com.android.mtp, um protocolo onde sua função é auxiliar a comunicação do dispositivo com um computador via USB, mas por algum motivo, tem acesso a rede e se comunica frequentemente com servidores externos. Para esses casos, e melhor solução mesmo é bloquear o acesso a rede desses bloatwares com o NetGuard.
MTP tentando comunicação com servidores externos:
Executando o adb shell
No computador
Faça backup de todos os seus arquivos importantes para algum armazenamento externo, e formate seu celular com o hard reset. Após a formatação, e a ativação da depuração USB, conecte seu aparelho e o pc com o auxílio de um cabo USB. Muito provavelmente seu dispositivo irá apenas começar a carregar, por isso permita a transferência de dados, para que o computador consiga se comunicar normalmente com o celular.
Já no pc, abra a pasta platform-tools dentro do terminal, e execute o seguinte comando:
./adb start-server
O resultado deve ser:
daemon not running; starting now at tcp:5037 daemon started successfully
E caso não apareça nada, execute:
./adb kill-server
E inicie novamente.
Com o adb conectado ao celular, execute:
./adb shell
Para poder executar comandos diretamente para o dispositivo. No meu caso, meu celular é um Redmi Note 8 Pro, codinome Begonia.
Logo o resultado deve ser:
begonia:/ $
Caso ocorra algum erro do tipo:
adb: device unauthorized. This adb server’s $ADB_VENDOR_KEYS is not set Try ‘adb kill-server’ if that seems wrong. Otherwise check for a confirmation dialog on your device.
Verifique no celular se apareceu alguma confirmação para autorizar a depuração USB, caso sim, autorize e tente novamente. Caso não apareça nada, execute o kill-server e repita o processo.
No celular
Após realizar o mesmo processo de backup e hard reset citado anteriormente, instale o Termux e, com ele iniciado, execute o comando:
pkg install android-tools
Quando surgir a mensagem “Do you want to continue? [Y/n]”, basta dar enter novamente que já aceita e finaliza a instalação
Agora, vá até as opções de desenvolvedor, e ative a depuração sem fio. Dentro das opções da depuração sem fio, terá uma opção de emparelhamento do dispositivo com um código, que irá informar para você um código em emparelhamento, com um endereço IP e porta, que será usado para a conexão com o Termux.
Para facilitar o processo, recomendo que abra tanto as configurações quanto o Termux ao mesmo tempo, e divida a tela com os dois app’s, como da maneira a seguir:
Para parear o Termux com o dispositivo, não é necessário digitar o ip informado, basta trocar por “localhost”, já a porta e o código de emparelhamento, deve ser digitado exatamente como informado. Execute:
adb pair localhost:porta CódigoDeEmparelhamento
De acordo com a imagem mostrada anteriormente, o comando ficaria “adb pair localhost:41255 757495”.
Com o dispositivo emparelhado com o Termux, agora basta conectar para conseguir executar os comandos, para isso execute:
adb connect localhost:porta
Obs: a porta que você deve informar neste comando não é a mesma informada com o código de emparelhamento, e sim a informada na tela principal da depuração sem fio.
Pronto! Termux e adb conectado com sucesso ao dispositivo, agora basta executar normalmente o adb shell:
adb shell
Remoção na prática Com o adb shell executado, você está pronto para remover os bloatwares. No meu caso, irei mostrar apenas a remoção de um app (Google Maps), já que o comando é o mesmo para qualquer outro, mudando apenas o nome do pacote.
Dentro do NetGuard, verificando as informações do Google Maps:
Podemos ver que mesmo fora de uso, e com a localização do dispositivo desativado, o app está tentando loucamente se comunicar com servidores externos, e informar sabe-se lá que peste. Mas sem novidades até aqui, o mais importante é que podemos ver que o nome do pacote do Google Maps é com.google.android.apps.maps, e para o remover do celular, basta executar:
pm uninstall –user 0 com.google.android.apps.maps
E pronto, bloatware removido! Agora basta repetir o processo para o resto dos bloatwares, trocando apenas o nome do pacote.
Para acelerar o processo, você pode já criar uma lista do bloco de notas com os comandos, e quando colar no terminal, irá executar um atrás do outro.
Exemplo de lista:
Caso a donzela tenha removido alguma coisa sem querer, também é possível recuperar o pacote com o comando:
cmd package install-existing nome.do.pacote
Pós-debloat
Após limpar o máximo possível o seu sistema, reinicie o aparelho, caso entre no como recovery e não seja possível dar reboot, significa que você removeu algum app “essencial” para o sistema, e terá que formatar o aparelho e repetir toda a remoção novamente, desta vez removendo poucos bloatwares de uma vez, e reiniciando o aparelho até descobrir qual deles não pode ser removido. Sim, dá trabalho… quem mandou querer privacidade?
Caso o aparelho reinicie normalmente após a remoção, parabéns, agora basta usar seu celular como bem entender! Mantenha o NetGuard sempre executando e os bloatwares que não foram possíveis remover não irão se comunicar com servidores externos, passe a usar apps open source da F-Droid e instale outros apps através da Aurora Store ao invés da Google Play Store.
Referências: Caso você seja um Australopithecus e tenha achado este guia difícil, eis uma videoaula (3:14:40) do Anderson do canal Ciberdef, realizando todo o processo: http://odysee.com/@zai:5/Como-remover-at%C3%A9-200-APLICATIVOS-que-colocam-a-sua-PRIVACIDADE-E-SEGURAN%C3%87A-em-risco.:4?lid=6d50f40314eee7e2f218536d9e5d300290931d23
Pdf’s do Anderson citados na videoaula: créditos ao anon6837264 http://eternalcbrzpicytj4zyguygpmkjlkddxob7tptlr25cdipe5svyqoqd.onion/file/3863a834d29285d397b73a4af6fb1bbe67c888d72d30/t-05e63192d02ffd.pdf
Processo de instalação do Termux e adb no celular: https://youtu.be/APolZrPHSms
-
@ a10260a2:caa23e3e
2024-11-10 04:35:34nostr:npub1nkmta4dmsa7pj25762qxa6yqxvrhzn7ug0gz5frp9g7p3jdscnhsu049fn added support for classified listings (NIP-99) about a month ago and recently announced this update that allows for creating/editing listings and blog posts via the dashboard.
In other words, listings created on the website are also able to be viewed and edited on other Nostr apps like Amethyst and Shopstr. Interoperability FTW.
I took some screenshots to give you an idea of how things work.
The home page is clean with the ability to search for profiles by name, npub, or Nostr address (NIP-05).
Clicking login allows signing in with a browser extension.
The dashboard gives an overview of the amount of notes posted (both short and long form) and products listed.
Existing blog posts (i.e. long form notes) are synced.
Same for product listings. There’s a nice interface to create new ones and preview them before publishing.
That’s all for now. As you can see, super slick stuff!
Bullish on Cypher.
So much so I had to support the project and buy a subdomain. 😎
https://bullish.cypher.space
originally posted at https://stacker.news/items/760592
-
@ f96073dc:5951c7c2
2025-01-08 16:54:42Introduction
The food we consume plays an obvious yet undervalued role in not just sustaining us, but also in shaping who we become.
The phrase "You are what you eat" transcends cliché to embody a profound truth: our diet directly influences our life experience.
Debates continue about the optimal food sources for human health and longevity.
These discussions often involve emotionally charged arguments influenced by faith, traditions, economic interests, and political opinions concerning the global climate crisis and sustainability.
My goal isn’t to delve into the weeds of this emotional & political debate, but instead to strip things back and provide a birds eye view on nutrition, whilst offering alternative lenses through which we can view food.
## Understanding Food as Information
More than mere fuel, food serves as crucial information for our bodies.
This concept may sound strange, as much of our nutritional understanding has been dumbed down to ‘energy in, energy out’, or ‘calories in, calories out’.
This perspective bypasses the importance of micro nutrients—the vitamins & minerals our bodies interrelate with, or don’t.
Food information determines how our cells function and regenerate, impacting everything from energy levels to cognitive ability.
The challenge lies in deciphering what constitutes "good information."
For centuries, nature provided a simple guide.
Our ancestors thrived on a diet of organ meats, plants, seafood, fruit, muscle meats, bones, and eggs—foods naturally rich in nutrients and absent of modern chemicals.
The question remains: If our forebears thrived on these natural foods, why have we deviated so drastically?
## The Shift in Food Paradigms
The introduction of heavily processed "Frankenfoods" laden with chemicals represents a stark departure from the diets of our grandparents and great-grandparents.
They consumed what we now coin "organic" food out of necessity rather than choice.
Food is pleasure, but it’s also a tool for a healthy self.
This ratio has been disproportionally thrown out of alignment.
The modern supermarket, with its aisles dominated by hyper palatable and processed products, reflects a concerning shift in our eating habits.
On the periphery of supermarkets lie fruits, vegetables, dairy, and animal based products, many of which have been sprayed with chemicals like glyphosate, or raised under inhumane conditions.
This brings us to the troubling paradox: while some parts of the world suffer from over-consumption and associated health issues like obesity and metabolic diseases, others face malnutrition and starvation due to food scarcity. (See red line below)
*HFCS: High fructose corn syrup
Questioning Current Food Paradigms
Our current food systems are broken.
A hard truth and pill to swallow, but if you look around, people have never been this unwell and overweight.
Misleading ‘Health Star Ratings’ and a flawed food pyramid, reflect a deeper societal malaise.
These systems often promote products that are not conducive to health, with processed carbohydrate forms serving as our staple, while nutrient and caloric dense foods like meat, fish, dairy, and natural fats have been marginalised.
## Whole Foods and Balanced Nutrients
So, what’s the ideal diet?
There is no universal diet that fits everybody.
The journey to finding the right diet involves personal experimentation.
However, a diet emphasising whole foods, which humans have consumed for millennia, remains a sound choice.
Eating natural foods avoids the pitfalls of ultra-processed foods and provides a balanced array of nutrients.
Side note: historically, meat was always the prized resource.
## Beyond Pesticides
Every year, the Environmental Working Group (EWG) puts together a list of 15 foods with the lowest amounts of pesticide residues, and conversely, 12 of the most contaminated foods with pesticides.
This is known as the ‘Clean Fifteen’ and ‘Dirty Dozen’.
When financially feasible, it’s advised to consume organic and pasture raised products.
If buying organic isn’t possible, one strategy to reduce pesticides is to soak the produce in water and a teaspoon of baking soda or a splash of apple cider vinegar for a few minutes.
## Nutritional Strategies for Specific Needs
Strategies like the elimination diet can help individuals identify how specific foods affect their bodies, allowing them to make informed choices that resonate with their unique physiological needs.
Tracking macronutrients and particularly protein intake can be crucial for specific health goals like muscle growth or weight loss.
Gaining a baseline understanding of the macros in your food can be an important piece of the puzzle, but should not become an obsessive practice.
Many diets serve a purpose, and depending on your goals as well as physiology, can be leveraged for great benefit.
This broad concept has been developed into a growing area of research called Nutrigenomics, defined as the study of how different foods may interact with specific genes to modify the risk of common chronic diseases, such as heart disease, stroke, and certain cancers.
For example, a ketogenic diet can help those with neurological disorders such as epilepsy or Alzheimer's disease, intermittent fasting can facilitate weight loss, and a carnivore diet can heal chronic skin or gut issues.
## Conclusion
In an era where diet-related health issues are rampant, returning to a more natural, informed way of eating is not just beneficial; it is necessary.
The prevalence of heavily processed "Frankenfoods" deviates from the nutrient-rich diets of our ancestors, contributing to a paradox of overconsumption and malnutrition.
Challenging current food paradigms is necessary to address misleading nutritional guidelines and flawed food systems.
Empower yourself to explore food in a deeper fashion, seeking a diet that not only nourishes your body but also aligns with your lifestyle goals and fosters a sense of vitality and well-being.
Eating well is a form of a self respect, and while we get the chance to inhabit this physical form, it should be our duty to make the most of this life and embody our fullest potential.
-
@ 35f3a26c:92ddf231
2024-11-09 17:10:57"Files" by Google new feature
"Files" by Google added a "feature"... "Smart Search", you can toggle it to OFF and it is highly recommended to do so.
Toggle the Smart Search to OFF, otherwise, google will search and index every picture, video and document in your device, no exceptions, anything you have ever photographed and you forgot, any document you have downloaded or article, etc...
How this could affect you?
Google is actively combating child abuse and therefore it has built in its "AI" a very aggressive algorithm searching of material that "IT THINKS" is related, therefore the following content could be flagged:
- [ ] Pictures of you and your children in the beach
- [ ] Pictures or videos which are innocent in nature but the "AI" "thinks" are not
- [ ] Articles you may have save for research to write your next essay that have links to flagged information or sites
The results:
- [ ] Your google account will be canceled
- [ ] You will be flagged as a criminal across the digital world
You think this is non sense? Think again: https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
How to switch it off:
- Open files by Google
- Tap on Menu -> Settings
- Turn OFF Smart Search
But you can do more for your privacy and the security of your family
- Stop using google apps, if possible get rid off of Google OS and use Graphene OS
- Go to Settings -> Apps
- Search for Files by Google
- Unistall the app, if you can't disable it
- Keep doing that with most Google apps that are not a must if you have not switched already to GrapheneOS
Remember, Google keeps advocating for privacy, but as many others have pointed out repeatedly, they are the first ones lobbying for the removal of your privacy by regulation and draconian laws, their hypocrisy knows no limits
Recommendation:
I would assume you have installed F-Droid in your android, or Obtainium if you are more advanced, if so, consider "Simple File Manager Pro" by Tibor Kaputa, this dev has a suite of apps that are basic needs and the best feature in my opinion is that not one of his apps connect to the internet, contacts, gallery, files, phone, etc.
Note As most people, we all love the convenience of technology, it makes our lives easier, however, our safety and our family safety should go first, between technology being miss-used and abused by corporations and cyber-criminals data mining and checking for easy targets to attack for profit, we need to keep our guard up. Learning is key, resist the use of new tech if you do not understand the privacy trade offs, no matter how appealing and convenient it looks like. .
Please leave your comments with your favorite FOSS Files app!
-
@ 3bf0c63f:aefa459d
2024-11-07 14:56:17The case against edits
Direct edits are a centralizing force on Nostr, a slippery slope that should not be accepted.
Edits are fine in other, more specialized event kinds, but the
kind:1
space shouldn't be compromised with such a push towards centralization, becausekind:1
is the public square of Nostr, where all focus should be on decentralization and censorship-resistance.- Why?
Edits introduce too much complexity. If edits are widespread, all clients now have to download dozens of extra events at the same time while users are browsing a big feed of notes which are already coming from dozens of different relays using complicated outbox-model-based querying, then for each event they have to open yet another subscription to these relays -- or perform some other complicated batching of subscriptions which then requires more complexity on the event handling side and then when associating these edits with the original events. I can only imagine this will hurt apps performance, but it definitely raises the barrier to entry and thus necessarily decreases Nostr decentralization.
Some clients may be implemneted in way such that they download tons of events and then store them in a local databases, from which they then construct the feed that users see. Such clients may make edits potentially easier to deal with -- but this is hardly an answer to the point above, since such clients are already more complex to implement in the first place.
- What do you have against complex clients?
The point is not to say that all clients should be simple, but that it should be simple to write a client -- or at least as simple as physically possible.
You may not be thinking about it, but if you believe in the promise of Nostr then we should expect to see Nostr feeds in many other contexts other than on a big super app in a phone -- we should see Nostr notes being referenced from and injected in unrelated webpages, unrelated apps, hardware devices, comment sections and so on. All these micro-clients will have to implement some complicated edit-fetching logic now?
- But aren't we already fetching likes and zaps and other things, why not fetch edits too?
Likes, zaps and other similar things are optional. It's perfectly fine to use Nostr without seeing likes and/or zaps -- and, believe me, it does happen quite a lot. The point is basically that likes or zaps don't affect the content of the main post at all, while edits do.
- But edits are optional!
No, they are not optional. If edits become widespread they necessarily become mandatory. Any client that doesn't implement edits will be displaying false information to its users and their experience will be completely broken.
- That's fine, as people will just move to clients that support edits!
Exactly, that is what I expect to happen too, and this is why I am saying edits are a centralizing force that we should be fighting against, not embracing.
If you understand that edits are a centralizing force, then you must automatically agree that they aren't a desirable feature, given that if you are reading this now, with Nostr being so small, there is a 100% chance you care about decentralization and you're not just some kind of lazy influencer that is only doing this for money.
- All other social networks support editing!
This is not true at all. Bluesky has 10x more users than Nostr and doesn't support edits. Instagram doesn't support editing pictures after they're posted, and doesn't support editing comments. Tiktok doesn't support editing videos or comments after they're posted. YouTube doesn't support editing videos after they're posted. Most famously, email, the most widely used and widespread "social app" out there, does not support edits of any kind. Twitter didn't support edits for the first 15 years of its life, and, although some people complained, it didn't hurt the platform at all -- arguably it benefitted it.
If edits are such a straightforward feature to add that won't hurt performance, that won't introduce complexity, and also that is such an essential feature users could never live without them, then why don't these centralized platforms have edits on everything already? There must be something there.
- Eventually someone will implement edits anyway, so why bother to oppose edits now?
Once Nostr becomes big enough, maybe it will be already shielded from such centralizing forces by its sheer volume of users and quantity of clients, maybe not, we will see. All I'm saying is that we shouldn't just push for bad things now just because of a potential future in which they might come.
- The market will decide what is better.
The market has decided for Facebook, Instagram, Twitter and TikTok. If we were to follow what the market had decided we wouldn't be here, and you wouldn't be reading this post.
- OK, you have convinced me, edits are not good for the protocol. But what do we do about the users who just want to fix their typos?
There are many ways. The annotations spec, for example, provides a simple way to append things to a note without being a full-blown edit, and they fall back gracefully to normal replies in clients that don't implement the full annotations spec.
Eventually we could have annotations that are expressed in form of simple (human-readable?) diffs that can be applied directly to the post, but fall back, again, to comments.
Besides these, a very simple idea that wasn't tried yet on Nostr yet is the idea that has been tried for emails and seems to work very well: delaying a post after the "submit" button is clicked and giving the user the opportunity to cancel and edit it again before it is actually posted.
Ultimately, if edits are so necessary, then maybe we could come up with a way to implement edits that is truly optional and falls back cleanly for clients that don't support them directly and don't hurt the protocol very much. Let's think about it and not rush towards defeat.
-
@ a367f9eb:0633efea
2024-11-05 08:48:41Last week, an investigation by Reuters revealed that Chinese researchers have been using open-source AI tools to build nefarious-sounding models that may have some military application.
The reporting purports that adversaries in the Chinese Communist Party and its military wing are taking advantage of the liberal software licensing of American innovations in the AI space, which could someday have capabilities to presumably harm the United States.
In a June paper reviewed by Reuters, six Chinese researchers from three institutions, including two under the People’s Liberation Army’s (PLA) leading research body, the Academy of Military Science (AMS), detailed how they had used an early version of Meta’s Llama as a base for what it calls “ChatBIT”.
The researchers used an earlier Llama 13B large language model (LLM) from Meta, incorporating their own parameters to construct a military-focused AI tool to gather and process intelligence, and offer accurate and reliable information for operational decision-making.
While I’m doubtful that today’s existing chatbot-like tools will be the ultimate battlefield for a new geopolitical war (queue up the computer-simulated war from the Star Trek episode “A Taste of Armageddon“), this recent exposé requires us to revisit why large language models are released as open-source code in the first place.
Added to that, should it matter that an adversary is having a poke around and may ultimately use them for some purpose we may not like, whether that be China, Russia, North Korea, or Iran?
The number of open-source AI LLMs continues to grow each day, with projects like Vicuna, LLaMA, BLOOMB, Falcon, and Mistral available for download. In fact, there are over one million open-source LLMs available as of writing this post. With some decent hardware, every global citizen can download these codebases and run them on their computer.
With regard to this specific story, we could assume it to be a selective leak by a competitor of Meta which created the LLaMA model, intended to harm its reputation among those with cybersecurity and national security credentials. There are potentially trillions of dollars on the line.
Or it could be the revelation of something more sinister happening in the military-sponsored labs of Chinese hackers who have already been caught attacking American infrastructure, data, and yes, your credit history?
As consumer advocates who believe in the necessity of liberal democracies to safeguard our liberties against authoritarianism, we should absolutely remain skeptical when it comes to the communist regime in Beijing. We’ve written as much many times.
At the same time, however, we should not subrogate our own critical thinking and principles because it suits a convenient narrative.
Consumers of all stripes deserve technological freedom, and innovators should be free to provide that to us. And open-source software has provided the very foundations for all of this.
Open-source matters When we discuss open-source software and code, what we’re really talking about is the ability for people other than the creators to use it.
The various licensing schemes – ranging from GNU General Public License (GPL) to the MIT License and various public domain classifications – determine whether other people can use the code, edit it to their liking, and run it on their machine. Some licenses even allow you to monetize the modifications you’ve made.
While many different types of software will be fully licensed and made proprietary, restricting or even penalizing those who attempt to use it on their own, many developers have created software intended to be released to the public. This allows multiple contributors to add to the codebase and to make changes to improve it for public benefit.
Open-source software matters because anyone, anywhere can download and run the code on their own. They can also modify it, edit it, and tailor it to their specific need. The code is intended to be shared and built upon not because of some altruistic belief, but rather to make it accessible for everyone and create a broad base. This is how we create standards for technologies that provide the ground floor for further tinkering to deliver value to consumers.
Open-source libraries create the building blocks that decrease the hassle and cost of building a new web platform, smartphone, or even a computer language. They distribute common code that can be built upon, assuring interoperability and setting standards for all of our devices and technologies to talk to each other.
I am myself a proponent of open-source software. The server I run in my home has dozens of dockerized applications sourced directly from open-source contributors on GitHub and DockerHub. When there are versions or adaptations that I don’t like, I can pick and choose which I prefer. I can even make comments or add edits if I’ve found a better way for them to run.
Whether you know it or not, many of you run the Linux operating system as the base for your Macbook or any other computer and use all kinds of web tools that have active repositories forked or modified by open-source contributors online. This code is auditable by everyone and can be scrutinized or reviewed by whoever wants to (even AI bots).
This is the same software that runs your airlines, powers the farms that deliver your food, and supports the entire global monetary system. The code of the first decentralized cryptocurrency Bitcoin is also open-source, which has allowed thousands of copycat protocols that have revolutionized how we view money.
You know what else is open-source and available for everyone to use, modify, and build upon?
PHP, Mozilla Firefox, LibreOffice, MySQL, Python, Git, Docker, and WordPress. All protocols and languages that power the web. Friend or foe alike, anyone can download these pieces of software and run them how they see fit.
Open-source code is speech, and it is knowledge.
We build upon it to make information and technology accessible. Attempts to curb open-source, therefore, amount to restricting speech and knowledge.
Open-source is for your friends, and enemies In the context of Artificial Intelligence, many different developers and companies have chosen to take their large language models and make them available via an open-source license.
At this very moment, you can click on over to Hugging Face, download an AI model, and build a chatbot or scripting machine suited to your needs. All for free (as long as you have the power and bandwidth).
Thousands of companies in the AI sector are doing this at this very moment, discovering ways of building on top of open-source models to develop new apps, tools, and services to offer to companies and individuals. It’s how many different applications are coming to life and thousands more jobs are being created.
We know this can be useful to friends, but what about enemies?
As the AI wars heat up between liberal democracies like the US, the UK, and (sluggishly) the European Union, we know that authoritarian adversaries like the CCP and Russia are building their own applications.
The fear that China will use open-source US models to create some kind of military application is a clear and present danger for many political and national security researchers, as well as politicians.
A bipartisan group of US House lawmakers want to put export controls on AI models, as well as block foreign access to US cloud servers that may be hosting AI software.
If this seems familiar, we should also remember that the US government once classified cryptography and encryption as “munitions” that could not be exported to other countries (see The Crypto Wars). Many of the arguments we hear today were invoked by some of the same people as back then.
Now, encryption protocols are the gold standard for many different banking and web services, messaging, and all kinds of electronic communication. We expect our friends to use it, and our foes as well. Because code is knowledge and speech, we know how to evaluate it and respond if we need to.
Regardless of who uses open-source AI, this is how we should view it today. These are merely tools that people will use for good or ill. It’s up to governments to determine how best to stop illiberal or nefarious uses that harm us, rather than try to outlaw or restrict building of free and open software in the first place.
Limiting open-source threatens our own advancement If we set out to restrict and limit our ability to create and share open-source code, no matter who uses it, that would be tantamount to imposing censorship. There must be another way.
If there is a “Hundred Year Marathon” between the United States and liberal democracies on one side and autocracies like the Chinese Communist Party on the other, this is not something that will be won or lost based on software licenses. We need as much competition as possible.
The Chinese military has been building up its capabilities with trillions of dollars’ worth of investments that span far beyond AI chatbots and skip logic protocols.
The theft of intellectual property at factories in Shenzhen, or in US courts by third-party litigation funding coming from China, is very real and will have serious economic consequences. It may even change the balance of power if our economies and countries turn to war footing.
But these are separate issues from the ability of free people to create and share open-source code which we can all benefit from. In fact, if we want to continue our way our life and continue to add to global productivity and growth, it’s demanded that we defend open-source.
If liberal democracies want to compete with our global adversaries, it will not be done by reducing the freedoms of citizens in our own countries.
Last week, an investigation by Reuters revealed that Chinese researchers have been using open-source AI tools to build nefarious-sounding models that may have some military application.
The reporting purports that adversaries in the Chinese Communist Party and its military wing are taking advantage of the liberal software licensing of American innovations in the AI space, which could someday have capabilities to presumably harm the United States.
In a June paper reviewed by Reuters, six Chinese researchers from three institutions, including two under the People’s Liberation Army’s (PLA) leading research body, the Academy of Military Science (AMS), detailed how they had used an early version of Meta’s Llama as a base for what it calls “ChatBIT”.
The researchers used an earlier Llama 13B large language model (LLM) from Meta, incorporating their own parameters to construct a military-focused AI tool to gather and process intelligence, and offer accurate and reliable information for operational decision-making.
While I’m doubtful that today’s existing chatbot-like tools will be the ultimate battlefield for a new geopolitical war (queue up the computer-simulated war from the Star Trek episode “A Taste of Armageddon“), this recent exposé requires us to revisit why large language models are released as open-source code in the first place.
Added to that, should it matter that an adversary is having a poke around and may ultimately use them for some purpose we may not like, whether that be China, Russia, North Korea, or Iran?
The number of open-source AI LLMs continues to grow each day, with projects like Vicuna, LLaMA, BLOOMB, Falcon, and Mistral available for download. In fact, there are over one million open-source LLMs available as of writing this post. With some decent hardware, every global citizen can download these codebases and run them on their computer.
With regard to this specific story, we could assume it to be a selective leak by a competitor of Meta which created the LLaMA model, intended to harm its reputation among those with cybersecurity and national security credentials. There are potentially trillions of dollars on the line.
Or it could be the revelation of something more sinister happening in the military-sponsored labs of Chinese hackers who have already been caught attacking American infrastructure, data, and yes, your credit history?
As consumer advocates who believe in the necessity of liberal democracies to safeguard our liberties against authoritarianism, we should absolutely remain skeptical when it comes to the communist regime in Beijing. We’ve written as much many times.
At the same time, however, we should not subrogate our own critical thinking and principles because it suits a convenient narrative.
Consumers of all stripes deserve technological freedom, and innovators should be free to provide that to us. And open-source software has provided the very foundations for all of this.
Open-source matters
When we discuss open-source software and code, what we’re really talking about is the ability for people other than the creators to use it.
The various licensing schemes – ranging from GNU General Public License (GPL) to the MIT License and various public domain classifications – determine whether other people can use the code, edit it to their liking, and run it on their machine. Some licenses even allow you to monetize the modifications you’ve made.
While many different types of software will be fully licensed and made proprietary, restricting or even penalizing those who attempt to use it on their own, many developers have created software intended to be released to the public. This allows multiple contributors to add to the codebase and to make changes to improve it for public benefit.
Open-source software matters because anyone, anywhere can download and run the code on their own. They can also modify it, edit it, and tailor it to their specific need. The code is intended to be shared and built upon not because of some altruistic belief, but rather to make it accessible for everyone and create a broad base. This is how we create standards for technologies that provide the ground floor for further tinkering to deliver value to consumers.
Open-source libraries create the building blocks that decrease the hassle and cost of building a new web platform, smartphone, or even a computer language. They distribute common code that can be built upon, assuring interoperability and setting standards for all of our devices and technologies to talk to each other.
I am myself a proponent of open-source software. The server I run in my home has dozens of dockerized applications sourced directly from open-source contributors on GitHub and DockerHub. When there are versions or adaptations that I don’t like, I can pick and choose which I prefer. I can even make comments or add edits if I’ve found a better way for them to run.
Whether you know it or not, many of you run the Linux operating system as the base for your Macbook or any other computer and use all kinds of web tools that have active repositories forked or modified by open-source contributors online. This code is auditable by everyone and can be scrutinized or reviewed by whoever wants to (even AI bots).
This is the same software that runs your airlines, powers the farms that deliver your food, and supports the entire global monetary system. The code of the first decentralized cryptocurrency Bitcoin is also open-source, which has allowed thousands of copycat protocols that have revolutionized how we view money.
You know what else is open-source and available for everyone to use, modify, and build upon?
PHP, Mozilla Firefox, LibreOffice, MySQL, Python, Git, Docker, and WordPress. All protocols and languages that power the web. Friend or foe alike, anyone can download these pieces of software and run them how they see fit.
Open-source code is speech, and it is knowledge.
We build upon it to make information and technology accessible. Attempts to curb open-source, therefore, amount to restricting speech and knowledge.
Open-source is for your friends, and enemies
In the context of Artificial Intelligence, many different developers and companies have chosen to take their large language models and make them available via an open-source license.
At this very moment, you can click on over to Hugging Face, download an AI model, and build a chatbot or scripting machine suited to your needs. All for free (as long as you have the power and bandwidth).
Thousands of companies in the AI sector are doing this at this very moment, discovering ways of building on top of open-source models to develop new apps, tools, and services to offer to companies and individuals. It’s how many different applications are coming to life and thousands more jobs are being created.
We know this can be useful to friends, but what about enemies?
As the AI wars heat up between liberal democracies like the US, the UK, and (sluggishly) the European Union, we know that authoritarian adversaries like the CCP and Russia are building their own applications.
The fear that China will use open-source US models to create some kind of military application is a clear and present danger for many political and national security researchers, as well as politicians.
A bipartisan group of US House lawmakers want to put export controls on AI models, as well as block foreign access to US cloud servers that may be hosting AI software.
If this seems familiar, we should also remember that the US government once classified cryptography and encryption as “munitions” that could not be exported to other countries (see The Crypto Wars). Many of the arguments we hear today were invoked by some of the same people as back then.
Now, encryption protocols are the gold standard for many different banking and web services, messaging, and all kinds of electronic communication. We expect our friends to use it, and our foes as well. Because code is knowledge and speech, we know how to evaluate it and respond if we need to.
Regardless of who uses open-source AI, this is how we should view it today. These are merely tools that people will use for good or ill. It’s up to governments to determine how best to stop illiberal or nefarious uses that harm us, rather than try to outlaw or restrict building of free and open software in the first place.
Limiting open-source threatens our own advancement
If we set out to restrict and limit our ability to create and share open-source code, no matter who uses it, that would be tantamount to imposing censorship. There must be another way.
If there is a “Hundred Year Marathon” between the United States and liberal democracies on one side and autocracies like the Chinese Communist Party on the other, this is not something that will be won or lost based on software licenses. We need as much competition as possible.
The Chinese military has been building up its capabilities with trillions of dollars’ worth of investments that span far beyond AI chatbots and skip logic protocols.
The theft of intellectual property at factories in Shenzhen, or in US courts by third-party litigation funding coming from China, is very real and will have serious economic consequences. It may even change the balance of power if our economies and countries turn to war footing.
But these are separate issues from the ability of free people to create and share open-source code which we can all benefit from. In fact, if we want to continue our way our life and continue to add to global productivity and growth, it’s demanded that we defend open-source.
If liberal democracies want to compete with our global adversaries, it will not be done by reducing the freedoms of citizens in our own countries.
Originally published on the website of the Consumer Choice Center.
-
@ 17538dc2:71ed77c4
2024-12-30 22:45:10Merry Christmas, and Happy New Year! Here's an overview of keeping tabs on interoperability on nostr.
What is nostrability
Nostrability is: -the practical documentation of broken things on nostr between two or more apps, and -a place to advocate for positive interoperability updates to apps
Why does this matter?
If the hop and/or interaction between apps sucks, then nostr users will not have an amazing and unique experience. Nostr will lose to well funded incumbents.
How did this start?
Will was upset that he had to troubleshoot other dev's apps.
What nostrability does not aim for
All apps implement all NIPs.
Where can I read in detail
https://github.com/nostrability/nostrability
Timeline
Nov '23 Added placeholder to github. Jan '24 First issues documented. Jan '24 First nostrability two app bug is fixed Coracle cannot send DMs to Damus (thank you Hodlbod!). '24 Gave intro to nostrability talk at BBB. Presentation link. Aug '24 Galaxy devs educated elsat at NostrCI discussion at Nostriga. (n.b. where's the video??) Oct '24 Humbled by and grateful for OpenSats acknowledgment and funding. Thank you to all nostr enjoyers & devs who gave me their precious time, and to my advocates & supporters - you know who you are 🙏.
What are specific issues discussed?
Over a hundred open issues, and a couple of dozen resolved issues. Many of these were reported by extremetly very normal nostr users, and devs.
Example topics (too many to list in a single article) range from: -contact list wipes, mute list wipes (Kieran pls fix!!) -zaps not working between apps -missing notes -broken profiles -old profile information -q tags, a tags, missing replies and/or parent notes etc.. -to proposed onboarding best practices -outbox tracker positive interop -highlights -non-nostr interoperability: e.g. bluesky bridgyfed profile info -spillover NIP/other controversy such as edited notes -and migrating to nostr best practices
Learnings
- Lone wolf, limited resource devs are the norm. Most devs focus on their one app, or their multiple apps.
- Some devs are extremely generous with their time when it comes to interop. Proof of work is in the git repo.
- There is a lot of space for building amazing interoperable experiences - this remains frontier territory on the design, product, and dev side. Which will be the first experience to blow people out of the water? Is it zaps, DVMs, or something not yet put together?
- I empathize that without basic things "just working", and/or basic features missing it may be difficult to allocate resources to interoperability.
- Even devs with teams may struggle to allocate resources to interoperability.
- Bug reporting and crappy experience reporting matters! This is important for single apps, and even more so for multi-app interaction. Devs may not get around to fixing something right away. However, if nostriches don't share their negative experience, devs will have less impetus to improve an experience.
2025 plans
- Continue documenting broken things.
- Interview devs to better understand how I can suit nostrability to dev's single app workflows, as to more effectively close broken things, and better advocate for positive interoperability updates across apps.
- Help test nostrCI automated interop testing methodology with galaxy dev of nostr.watch & NIP-66 Sandwich, so that nostrability can be automated per particular test cases.
Dev and nostrich feedback
Let me know how I can make nostrability more useful for yall. Tag me on nostr, create issues on nostrability 💪.
!(image)[https://media.tenor.com/hF5RhwXuG_kAAAAC/arnold-schwarzenegger-terminator.gif]
-
@ ebdee929:513adbad
2024-12-28 14:46:21Blue light is not inherently bad, just bad in the wrong context.
Blue light provides wakefulness, stimulation, and sets our internal body clock (circadian rhythm).
When we go outside in the sun, we get bathed in blue lightblue light is not inherently bad, just bad in the wrong context.
Blue light sets the human rhythm.
However, sunlight never gives us blue light without the rest of the visible rainbow + infrared.
Light from screens & LED bulbs do not contain any infrared, and has a unnaturally high proportion of blue light.
LEDs = unbalanced & blue light dominant
Light from artificial sources is especially disruptive at night time, where the high blue light component can interfere with melatonin production and sleep quality at a greater rate than lower energy colors of light. Blue Light has a Dark Side
This doesn't mean that red light is completely innocent of disrupting sleep either
It is both the spectrum of light AND the intensity of light that contributes to sleep disruption. See this tweet from Huberman.
We took all of this into account when building the DC-1 to be the world's first blue light free computer.
The DC-1 has a reflective screen that:
• emits ZERO light during the day
• can be used easily outside in direct sunlight
& a backlight that:
• can be 100% blue light free
• has a broad spectrum of light
• can be seen at very low brightness
Our Live Paper™ display technology feels like a magic piece of paper
During the day, that piece of paper is illuminated by sunlight. At night, that piece of paper is illuminated by candle light.
(backlight is converging with a candle light spectrum)
The two sources of natural light are sunlight & fire.
We are trying to reproduce this experience for the most enjoyable, healthy, and least invasive technology experience for humanity.
Root cause problem solving by emulating nature.
"But can't I just put a red light screen filter on my MacBook?"
Absolutely you can, and we advocate for it
Software screen filters are great, but anyone who has changed their screen to full “red mode” to get rid of the blue light knows the downsides to this…
You can barely see anything and you end up having to crank up the brightness in order to see any contrast.
This is because of the highly isolated nature of LED emissive screens, you can only isolate a very narrow band of colors.
Going full red is not something your eyes have ever been used to seeing.
You need a broad spectrum light solution, and that is what we have in our amber backlight while still being blue light free.
This means you can have a better visual experience, turn down the brightness, and get minimal sleep/circadian disruption.
What about FLICKER?
Nearly all LEDs flicker. Especially when changing in brightness due to Pulsed Width Modulation (PWM) LED driver control
Our LED backlight uses DC dimming & is expert verified flicker-free.
This can only be achieved through hardware changes, not software screen filters.
& Blue Light Blocking Glasses?
They need to be tinted orange/red to block all of the blue light.
Thus the same issues as screen filters (bad visual experience, not solving flicker) + average joe would never wear them.
We still love blue blockers, they just aren't a root cause solution.
We made a computer that is healthier and less stimulating, with a low barrier to entry
Whether you are a staunch circadian health advocate or just like the warm vibes of amber mode and being outside...the DC-1 just feels good because it doesn't make you feel bad :)
Learn more here and thanks for reading.
-
@ bf47c19e:c3d2573b
2025-01-08 16:43:01Originalni tekst na danas.rs
11.01.2021 / Autor: Aleksandar Milošević
Ima više od osam godina otkako sam prvi put čuo za to nešto što se zvalo bitkoin.
Libertarijanski san: „Decentralizovana“ valuta koju ne kontroliše nijedna država; na koju nijedna centralna banka ne može da utiče; koju je zahvaljujući „blokčejn“ tehnologiji nemoguće falsifikovati i koja nudi anonimnost kakvu poznaje samo keš.
Valuta čija je ukupna količina unapred fiksirana pa joj je rast vrednosti usađen u DNK.
I to još valuta koju je moguće dobiti besplatno, ali po zasluzi, jer bitkoini nastaju tako što vaš kompjuter reši komplikovani matematički zadatak iza kojeg se „krije“ jedan od ovih magičnih novčića.
To što je čitav sistem osmislio misteriozni matematički genije poznat kao Satoši Nakamoto, koji možda postoji, a možda i ne postoji i što se ceo finansijski establišment obrušio na čitavu bitkoin-maniju kombinacijom podsmeha i represivnih pretnji, moglo je samo da ubrza moju tadašnju odluku da kupim XFX ATI RADEON HD 5870 grafičku karticu za nekih 200 evra (maksimum koji sam od skromne novinarske plate mogao sebi da oprostim) i priključim se drugoj velikoj zlatnoj groznici, nekih 150 godina nakon one originalne, kalifornijske.
Ipak, kao što se da pretpostaviti iz činjenice da danas pišem ovaj tekst umesto da na nekom tropskom ostrvu vežbam skokove u vodu, sudbina nije htela da se obogatim rudareći bitkoine.
Ispostavilo se, naime, da moja moćna grafička karta ne odgovara mojoj dosta nesposobnoj matičnoj ploči, pa sam uz pomoć najgore „cost-benefit“ analize u istoriji biznisa zaključio da je bolje da prodam grafičku sa 20 evra gubitka i zaboravim na sve, nego da zarad svoje igrarije menjam čitav kompjuter.
Ta greška koštala me je nekih 700.000 dolara.
Toliko bih, žalosno je, danas imao da sam propalu investiciju u pogrešan hardver pretvorio u novotariju zvanu kriptovaluta, po tadašnjem kursu od 10 dolara za novčić, umesto što sam „zaboravio na sve“.
Bitkoin je, ispostavilo se, postao prilično velika stvar.
S kursom od 40.000 dolara za jedan bitkoin, s međunarodnim bankama koje spekulišu ovom valutom, s nuklearnim naučnicima hapšenim jer su ruski državni superkompjuter upregli da za njih rudari bitkoin, sa novinskim izveštajima o ljudima koji idu u zemlje s jeftinom strujom da u njima instaliraju čitava skladišta puna računara za traženje bitkoina, pa čak i sa poslednjim pričama koje krive upravo bitkoin za to što je u Pakistanu pao napon struje za 200 miliona ljudi i što je 500 miliona Evropljana zamalo ostalo bez svetla, nema nikakve sumnje da je bitkoin nešto veliko.
A opet, to nešto veliko i dalje uporno ostaje – ništa.
Ma koliko neverovatna cena od 40.000 dolara delovala zavodljivo, bitkoin entuzijasti su već jednom, pre tačno dve godine, sve to već doživeli, kada je ova valuta prvi put u meteorskom usponu za samo par nedelja dostigla 20.000 dolara, da bi se onda jednako naglo i jednako neobjašnjivo survala nazad, ostavljajući mnoge sa velikom i nimalo virtuelnom rupom u džepu.
Osnovni problem bitkoina, uzrok njegove karakteristične nestabilnosti – ogromnih skokova i jednako spektakularnih padova – jeste to što niko ne zna za šta je on koristan.
Ma kako uzbudljivo delovala čitava priča o novcu koji je van kontrole vlade, koji nudi anonimnost transakcija i koji je navodno nemoguće falsifikovati, činjenica je da prosečnoj osobi ništa od toga nije potrebno.
Tačnije, bitkoin – sem u uskom krugu slučajeva – ne nudi ništa što već ne možete da dobijete sa svojom valutom, a da vam je potrebno.
Za anonimnost je većini dovoljan keš, rizik od falsifikata je dovoljno mali da je zanemarljiv, a kontrola države i nezavisnost od monetarnih vlasti su priče koje su ljudima eventualno intelektualno zanimljive, ali nikog neće naterati da u praksi krene da koristi neku virtuelnu valutu.
Zato je bitkoin ostao novac ponajviše upotrebljavan za nezakonite transakcije – otkup podataka od hakera, prodaju droge i tome slično – gde su anonimnost i elektronski transfer novca bitniji od svega.
Zašto onda raste cena bitkoinu?
Zato što svi kupuju bitkoine nadajući se da će im cena skočiti i da će zaraditi.
Kako raste tražnja tako raste cena i očekivanje se ispunjava.
Onda kad tražnja nestane, a to će se desiti kad svi koji su upravo sad čuli za bitkoin pokupuju virtuelne novčiće videvši koliki je rast cene u poslednjim danima, cena će krenuti da pada.
Jer – bitkoini nikom nisu potrebni i niko ne želi da ih zadrži. Sve što svi žele je da ih kupe, da im cena „iz nekog razloga skoči“ i da ih onda zamene za „pravi novac“.
U toj igri, koja se stalno ponavlja kako naiđe novi talas publiciteta, neko naravno mora i da izgubi.
Bitkoin neće postići stabilnost i neće uspeti da iskaže svoju „deflatornu“ prirodu u koju se svi uzdaju da im trajno podiže vrednost novčića koje poseduju, sve dok se ne bude pronašla njegova svrha kao valute.
Dok dovoljno veliki broj ljudi ne bude hteo da drži i koristi bitkoine za ono za šta je svaka valuta namenjena – za kupovinu roba i usluga.
Droga, oružje, ucene i ostale oblasti kriminalne ekonomije nisu dovoljni da bi se takva stabilnost postigla.
Glavni problem bitkoina je zato njegova praznina.
Bitkoin nije zlato našeg doba. Pre je blato.
-
@ 9349d012:d3e98946
2024-11-05 00:42:37Chef's notes
2 cups pureed pumpkin 2 cups white sugar 3 eggs, beaten 1/2 cup olive oil 1 tablespoon cinnamon 1 1/2 teaspoon baking powder 1 teaspoon baking soda 1/2 teaspoon salt 2 1/4 cups flour 1/4 cup chopped pecans
Preheat oven to 350 degrees Fahrenheit. Coat a bread pan with olive oil. Mix all ingredients minus nuts, leaving the flour for last, and adding it in 2 parts. Stir until combined. Pour the batter into the bread pan and sprinkle chopped nuts down the middle of the batter, lenghtwise. Bake for an hour and ten minutes or until a knife insert in the middle of the pan comes out clean. Allow bread to cool in the pan for five mintes, then use knife to loosen the edges of the loaf and pop out of the pan. Rest on a rack or plate until cool enough to slice. Spread bread slices with Plugra butter and serve.
https://cookeatloveshare.com/pumpkin-bread/
Details
- ⏲️ Prep time: 30 minutes
- 🍳 Cook time: 1 hour and ten minutes
- 🍽️ Servings: 6
Ingredients
- See Chef's Notes
Directions
- See Chef's Notes
-
@ 09fbf8f3:fa3d60f0
2024-11-02 08:00:29> ### 第三方API合集:
免责申明:
在此推荐的 OpenAI API Key 由第三方代理商提供,所以我们不对 API Key 的 有效性 和 安全性 负责,请你自行承担购买和使用 API Key 的风险。
| 服务商 | 特性说明 | Proxy 代理地址 | 链接 | | --- | --- | --- | --- | | AiHubMix | 使用 OpenAI 企业接口,全站模型价格为官方 86 折(含 GPT-4 )| https://aihubmix.com/v1 | 官网 | | OpenAI-HK | OpenAI的API官方计费模式为,按每次API请求内容和返回内容tokens长度来定价。每个模型具有不同的计价方式,以每1,000个tokens消耗为单位定价。其中1,000个tokens约为750个英文单词(约400汉字)| https://api.openai-hk.com/ | 官网 | | CloseAI | CloseAI是国内规模最大的商用级OpenAI代理平台,也是国内第一家专业OpenAI中转服务,定位于企业级商用需求,面向企业客户的线上服务提供高质量稳定的官方OpenAI API 中转代理,是百余家企业和多家科研机构的专用合作平台。 | https://api.openai-proxy.org | 官网 | | OpenAI-SB | 需要配合Telegram 获取api key | https://api.openai-sb.com | 官网 |
持续更新。。。
推广:
访问不了openai,去
低调云
购买VPN。官网:https://didiaocloud.xyz
邀请码:
w9AjVJit
价格低至1元。
-
@ 06639a38:655f8f71
2024-11-01 22:32:51One year ago I wrote the article Why Nostr resonates in Dutch and English after I visited the Bitcoin Amsterdam 2023 conference and the Nostrdam event. It got published at bitcoinfocus.nl (translated in Dutch). The main reason why I wrote that piece is that I felt that my gut feeling was tellinng me that Nostr is going to change many things on the web.
After the article was published, one of the first things I did was setting up this page on my website: https://sebastix.nl/nostr-research-and-development. The page contains this section (which I updated on 31-10-2024):
One metric I would like to highlight is the number of repositories on Github. Compared to a year ago, there are already more than 1130 repositories now on Github tagged with Nostr. Let's compare this number to other social media protocols and decentralized platforms (24-10-2024):
- Fediverse: 522
- ATProto: 159
- Scuttlebot: 49
- Farcaster: 202
- Mastodon: 1407
- ActivityPub: 444
Nostr is growing. FYI there are many Nostr repositories not hosted on Github, so the total number of Nostr reposities is higher. I know that many devs are using their own Git servers to host it. We're even capable of setting up Nostr native Git repositories (for example, see https://gitworkshop.dev/repos). Eventually, Nostr will make Github (and other platforms) absolute.
Let me continue summarizing my personal Nostr highlights of last year.
Organising Nostr meetups
This is me playing around with the NostrDebug tool showing how you can query data from Nostr relays. Jurjen is standing behind me. He is one of the people I've met this year who I'm sure I will have a long-term friendship with.OpenSats grant for Nostr-PHP
In December 2023 I submitted my application for a OpenSats grant for the further development of the Nostr-PHP helper library. After some months I finally got the message that my application was approved... When I got the message I was really stoked and excited. It's a great form of appreciation for the work I had done so far and with this grant I get the opportunity to take the work to another higher level. So please check out the work done for so far:Meeting Dries
One of my goosebumps moments I had in 2022 when I saw that the founder and tech lead of Drupal Dries Buytaert posted 'Nostr, love at first sight' on his blog. These types of moments are very rare moment where two different worlds merge where I wouldn't expect it. Later on I noticed that Dries would come to the yearly Dutch Drupal event. For me this was a perfect opportunity to meet him in person and have some Nostr talks. I admire the work he is doing for Drupal and the community. I hope we can bridge Nostr stuff in some way to Drupal. In general this applies for any FOSS project out there.
Here is my recap of that Drupal event.Attending Nostriga
A conference where history is made and written. I felt it immediately at the first sessions I attended. I will never forget the days I had at Nostriga. I don't have the words to describe what it brought to me.
I also pushed myself out of my comfort zone by giving a keynote called 'POSSE with Nostr - how we pivot away from API's with one of Nostr superpowers'. I'm not sure if this is something I would do again, but I've learned a lot from it.
You can find the presentation here. It is recorded, but I'm not sure if and when it gets published.Nostr billboard advertisement
This advertisment was shown on a billboard beside the A58 highway in The Netherlands from September 2nd till September 16th 2024. You can find all the assets and more footage of the billboard ad here: https://gitlab.com/sebastix-group/nostr/nostr-ads. My goal was to set an example of how we could promote Nostr in more traditional ways and inspire others to do the same. In Brazil a fundraiser was achieved to do something similar there: https://geyser.fund/project/nostrifybrazil.
Volunteering at Nostr booths growNostr
This was such a great motivating experience. Attending as a volunteer at the Nostr booth during the Bitcoin Amsterdam 2024 conference. Please read my note with all the lessons I learned here.
The other stuff
- The Nostr related blog articles I wrote past year:
- Run a Nostr relay with your own policies (02-04-2024)
- Why social networks should be based on commons (03-01-2024)
- How could Drupal adopt Nostr? (30-12-2023)
- Nostr integration for CCHS.social (21-12-2023)
- https://ccns.nostrver.se
CCNS stands for Community Curated Nostr Stuff. At the end of 2023 I started to build this project. I forked an existing Drupal project of mine (https://cchs.social) to create a link aggregation website inspired by stacker.news. At the beginning of 2024 I also joined the TopBuilder 2024 contest which was a productive period getting to know new people in the Bitcoin and Nostr space. - https://nuxstr.nostrver.se
PHP is not my only language I use to build stuff. As a fullstack webdeveloper I also work with Javascript. Many Nostr clients are made with Javascript frameworks or other more client-side focused tools. Vuejs is currently my Javascript framework I'm the most convenient with. With Vuejs I started to tinker around with Nuxt combined with NDK and so I created a starter template for Vue / Nuxt developers. - ZapLamp
This is a neat DIY package from LNbits. Powered by an Arduino ESP32 dev board it was running a 24/7 livestream on zap.stream at my office. It flashes when you send a zap to the npub of the ZapLamp. - https://nosto.re
Since the beginning when the Blossom spec was published by @hzrd49 and @StuartBowman I immediately took the opportunity to tinker with it. I'm also running a relay for transmitting Blossom Nostr eventswss://relay.nosto.re
. - Relays I maintain
I really enjoy to tinker with different relays implementations. Relays are the fundamental base layer to let Nostr work.
I'm still sharing my contributions on https://nostrver.se/ where I publish my weekly Nostr related stuff I worked on. This website is built with Drupal where I use the Nostr Simple Publish and Nostr long-form content NIP-23 modules to crosspost the notes and long-form content to the Nostr network (like this piece of content you're reading).
The Nostr is the people
Just like the web, the web is people: https://www.youtube.com/watch?v=WCgvkslCzTo
the people on nostr are some of the smartest and coolest i’ve ever got to know. who cares if it doesn’t take over the world. It’s done more than i could ever ask for. - @jb55
Here are some Nostriches who I'm happy to have met and who influenced my journey in Nostr in a positive way.
- Jurjen
- Bitpopart
- Arjen
- Jeroen
- Alex Gleason
- Arnold Lubach
- Nathan Day
- Constant
- fiatjaf
- Sync
Coming year
Generally I will continue doing what I've done last year. Besides the time I spent on Nostr stuff, I'm also very busy with Drupal related work for my customers. I hope I can get the opportunity to work on a paid client project related to Nostr. It will be even better when I can combine my Drupal expertise with Nostr for projects paid by customers.
Building a new Nostr application
When I look at my Nostr backlog where I just put everything in with ideas and notes, there are quite some interesting concepts there for building new Nostr applications. Filtering out, I think these three are the most exciting ones:
- nEcho, a micro app for optimizing your reach via Nostr (NIP-65)
- Nostrides.cc platform where you can share Nostr activity events (NIP-113)
- A child-friendly video web app with parent-curated content (NIP-71)
Nostr & Drupal
When working out a new idea for a Nostr client, I'm trying to combine my expertises into one solution. That's why I also build and maintain some Nostr contrib modules for Drupal.
- Nostr Simple Publish
Drupal module to cross-post notes from Drupal to Nostr - Nostr long-form content NIP-23
Drupal module to cross-post Markdown formatted content from Drupal to Nostr - Nostr internet identifier NIP-05
Drupal module to setup Nostr internet identifier addresses with Drupal. - Nostr NDK
Includes the Javascript library Nostr Dev Kit (NDK) in a Drupal project.
One of my (very) ambitious goals is to build a Drupal powered Nostr (website) package with the following main features:
- Able to login into Drupal with your Nostr keypair
- Cross-post content to the Nostr network
- Fetch your Nostr content from the Nostr content
- Serve as a content management system (CMS) for your Nostr events
- Serve as a framework to build a hybrid Nostr web application
- Run and maintain a Nostr relay with custom policies
- Usable as a feature rich progressive web app
- Use it as a remote signer
These are just some random ideas as my Nostr + Drupal backlog is way longer than this.
Nostr-PHP
With all the newly added and continues being updated NIPs in the protocol, this helper library will never be finished. As the sole maintainer of this library I would like to invite others to join as a maintainer or just be a contributor to the library. PHP is big on the web, but there are not many PHP developers active yet using Nostr. Also PHP as a programming language is really pushing forward keeping up with the latest innovations.
Grow Nostr outside the Bitcoin community
We are working out a submission to host a Nostr stand at FOSDEM 2025. If approved, it will be the first time (as far as I know) that Nostr could be present at a conference outside the context of Bitcoin. The audience at FOSDEM is mostly technical oriented, so I'm really curious what type of feedback we will receive.
Let's finish this article with some random Nostr photos from last year. Cheers!
-
@ 00cfe60d:2819cc65
2025-01-08 16:36:40Lets start with the money talk, at its core, a good form of money is created from two key ingredients: time and energy.
**Money = Time + Energy ** This simple idea explains why money has value. Time is something we can never get back, and energy is what powers everything we do, both mentally and physically. Together, they create value.
Why Energy is So Important Energy is what keeps life going. It’s essential for everything we use and do every day. For example:
- Food without energy to cook is raw and not very tasty.
- A car without energy doesn’t go anywhere.
- A person without energy feels tired and can’t work or play.
- Your work without energy gets nothing done.
- Football without energy means no running, no cheering, and no fun.
- A phone without energy is just a useless object.
- A house without energy is cold, dark, and uncomfortable.
- Transportation without energy means no moving buses, trains, or planes.
- The internet without energy means no websites, no games, and no communication.
- Nature without energy means plants don’t grow and animals can’t survive.
And what about money without energy? ** We often hear that “time is money” but if money is created without any time or energy, it becomes worthless. That’s why energy is so important in giving money its value.
Why Bitcoin is Different
Bitcoin is special because it follows the equation of money perfectly. It’s the best kind of money because it requires both time and energy to exist. Here’s how:
-
Time: Bitcoin’s network is designed to create new bitcoins at regular intervals, so time is built into the system.
-
Energy: Bitcoin is made using a process called Proof-of-Work, which uses real-world energy to produce and secure it. This ties its value to effort and cost.
Thanks to this process, Bitcoin is:
-
Scarce: There will only ever be 21 million bitcoins. It can’t be copied or faked.
-
Reliable: Its value is tied to real-world energy, making it solid and trustworthy.
-
Effort-Based: No one can create bitcoins out of thin air. It takes real work.
This makes Bitcoin an honest form of money, free from manipulation or shortcuts. It connects the digital and physical worlds through energy, just like gold was in the past, requiring time and energy to extract and maintain its value.
The Problem with Regular Money (Fiat Money)
On the other hand, fiat money, the kind printed by governments, doesn’t follow the same rules. It’s made without effort, just by pressing a button. This leads to big problems:
-
Inflation: More money is printed, making the money you already have worth less.
-
Manipulation: Governments and banks can change the rules whenever they want.
-
Unfairness: People closest to the money printers benefit the most, while everyone else pays the price.
-
Fiat money breaks the rule of time and energy. It’s just a symbol, not a true store of value.
**Henry Ford’s Energy Currency Idea ** Over 100 years ago, Henry Ford had a bold idea: What if money was based on energy? He believed energy was the ultimate resource because it’s measurable and valuable to everyone.
Bitcoin brings Ford’s vision to life. Its Proof-of-Work system ties money directly to energy. Bitcoin acts as a global, incorruptible energy currency that rewards effort and aligns money with real-world value.
Why Energy-Based Money Matters
Money that’s rooted in time and energy isn’t just an idea, it’s a principle we live by every day. To truly understand the value of energy and effort, let me share a personal story.
Every single day of the week, I train. I pour my energy and effort into CrossFit, pushing my body and mind to their limits. Last year, during a competition, I achieved something I’d never done before: 12 ring muscle-ups. Before that, my maximum was just three. Through consistent training, spending my time and energy at the gym, I earned that reward. It wasn’t easy, but it was worth it.
This is Proof-of-Work in action. Just like my training required time and energy to achieve results, Bitcoin requires time and energy to exist. Its
Proof-of-Work mechanism ensures:
- It can’t be faked or inflated.
- It rewards hard work and energy, not shortcuts or manipulation.
- It restores trust by linking value to real-world effort.
In a world where fiat money can be printed without effort, Bitcoin shines as a clear and honest form of money. Like the work I put into my training, Bitcoin ties time and energy to value, creating a system that’s fair, transparent, and built to last.
-
@ bf47c19e:c3d2573b
2025-01-08 16:26:02Originalni tekst na politika.rs
13.09.2021 / Autor: Aleksandar Apostolovski
Za svet virtuelne banalnosti u koji smo umarširali potrebna je i njegova moneta. Kakav svet takvo i sredstvo plaćanja.
Ni četnički jataci nisu kao što su nekada bili. Ne skrivaju se u zemunicama, ne spremaju masnu gibanicu – prste da poližeš – ne čekaju zapadne saveznike da se iskrcaju na Jadranu. Verovatno nemaju ni brade modne linije starog američkog benda „Zi Zi Top”.
Nepoznata sajber ilegalna grupa upala je u podrum kuće čiča Draže u Ivanjici. Zaista, prvorazredna vest. Instalirali su snažne procesore i mašine za rudarenje bitkoinima i daljinskim sistemom. Ko zna odakle. Možda sa Kariba, možda iz Kosjerića, možda iz Jajca – ako su ipak partizani. Trgovali su kriptovalutama. Umalo da tako rasture uličnu rasvetu tokom „Nušićijade”, pa su čelnici opštine sproveli internu istragu, tražeći ilegalce koji vrše diverziju nad elektroenergetskim sistemom grada i festivalom satire.
Upali su u Dražin dom, sišli u podrum i zatekli sofisticiranu opremu, snažne procesore i nekakve mašine za rudarenje po internetu. Kompjuterski komandosi, naravno, nisu bili prisutni. Sada ih juri policija. Potrošili su oko 55.000 kilovat-sati struje. Verovatno se skrivaju pod stripovskim kodnim imenima, poput hakera iz Niša koji su ojadili Teksašane, pa im je doakao FBI, jer Ameri možda trpe svoje prevarante koji muzu kockare na globalnom groblju kriptovaluta, ali ne dozvoljavaju da se u međunarodnu spekulativnu igru ubace mozgovi sa južne pruge, gde je dozvoljeno da se prži paprika, pravi ajvar i sluša melanholični džez na „Nišvilu”.
Jedan od članova niške hakerske grupe je Antonije Stojiljković, koji se krio iza lažnih imena „Toni Rivas” i „Džejkob Gold”, a u slobodno vreme bio je reper poznatiji kao „Zli Toni”. Stojiljković je izručen Americi zbog računarskih prevara. Dobrovoljno se prijavio kako bi se sklonio u Ameriku.
Ti momci su nudili bitkoin upola cene i stvorili takvu virtuelnu međunarodnu mrežu lažnih kompanija, menadžera, uz organizaciju video-konferencija, da su omađijali dobar deo internet investitora iz Teksasa, te je Federalni istražni biro morao da spasava čast kauboja koje su izradile Nišlije. Njihov vođa, izvesni Kristijan Krstić, prestao je da se javlja policiji, nestao je sa suprugom i ortakom Markom Pavlovićem bez traga, iako su pod istragom, što može da poremeti i diplomatske odnose između Srbije i SAD.
Taj Kristijan, ne onaj Kristijan koji se seli iz rijalitija u rijaliti, koristio je nadimke poput „Feliksa Logana” ili „Maršala Grahama” i na internet prevarama zaradio je više desetina miliona evra. Priča nije nimalo bezazlena. Veze „Zlog Tonija” dosežu, bar po dosadašnjem toku istrage, sve do klana Belivuka.
Ali, to će rešavati sudovi i policija, mada i podaci koji su procurili otkrivaju suštinu fame bitkoin i na hiljade kriptovaluta koje može stvoriti bilo koji maher, avanturista, šaljivdžija, klinac, multimilioner, tajne službe, trgovci oružjem, narko-bosovi, plaćene ubice ili Del Bojevi koji će iduće godine postati milioneri.
Virtuelni svet ne može postojati bez virtuelnih valuta, s tim što one nisu opipljive, iza njih ne stoje centralne banke i vlade. Dakle, nemate pojma ko ih je stvorio, nemate pojma s kime trgujete i ko su brokeri.
Vidim da na „Jutjubu”, u motelu „Stari Hrast” na Koridoru 10, neki momci plaćaju prebranac i vešalice bitkoinima, preko mobilnih telefona. U kafani primaju i etereume, digitalni novčić u usponu, odmah iza bitkoina. I za to čudo je potreban digitalni novčanik... Ovde ću se zaustaviti jer je za svet banalnosti u koji smo umarširali potrebna i njegova moneta. Kakav svet takvo i sredstvo plaćanja.
Kako su kompjuterski podaci svih vrsta, od pretraživača, društvenih mreža, aplikacija, do podataka kompanija, državnih i međunarodnih organizacija, i onih ličnih, koje upravo vi posedujete, postali nezamislivo ogromna baza koju je nemoguće uskladištiti, otvorena je berza za internet magacionere koji će, rudareći na internetu, postati kandidati za potencijalne šefove skladišta. Teoretski, možete izrudariti deo arhive CIA. Preporuka – ako saznate ko je ukokao Kenedija, ćutite ko zaliveni!
(Dragan Stojanović)
Da je Alija Sirotanović kojim slučajem rudario kao specijalci iz Dražinog podruma, postao bi Bil Gejts. Alija je znao da nema ’leba bez motike, odnosno krampa. Zato je ostao Sirotanović. Ovo je novo doba. Mašina krampuje u simuliranoj stvarnosti, a virtuelni homo sapijens upravlja procesorima. Bitkoin vrti gde burgija neće! Stvar ipak nije tako idilična. Te skalamerije troše ogromne količine električne energije i strahovito zagrevaju prostorije, pa je u Dražinom podrumu bilo nešto vrelije nego u sauni. Priča se da su najveći mešetari otperjali na Island da se prirodno rashlade. Sledeće stanište im je Grenland.
Kome god je stalo do računarskog kriptovalutnog avanturizma može da formira svoj mali rudnik, gde nema zlata ni dijamanata, ali ima koina, odnosno stotog dela bitkoina. Jedan trenutno vredi 50.000 dolara. Pitam se, ovako zastareo, gde su banke i menjačnice?
Sa ono malo informatičkog znanja – valjda ću uspeti nekako imejlom da pošaljem ovaj tekst – saznao sam da vrednost bitkoina vrtoglavo skače i pada na dnevnom nivou, a kako je njegov broj ograničen na globalnom nivou, a neformalni šef Federalnih rezervi bitkoina je donedavno bio jedan od najbogatijih ljudi sveta Ilon Mask, koji je na svom tviter nalogu svakodnevno formirao grafikon rasta i pada svojim opaskama, tu već naslućujem elemente bondovskog zapleta. Harizmatični superbogataš koji leti u svemir, poseduje kompaniju električnih automobila „Tesla”, upravljao je donedavno imaginarnom berzom i valutom, ali je nedavno odustao. Možda zato emigrira u kosmos?
Stvar zaista može izmaći kontroli ili će, možda, bitkoin postati naša sudbina, a mi rudari iz sauna? Salvador je pre nekoliko dana postao prva zemlja na svetu koja je usvojila bitkoin kao zakonsko sredstvo plaćanja, uz američki dolar, s planovima korišćenja vulkanske geotermalne energije za napajanje rudarenja digitalne valute. Postavili su i bankomate. Tamošnjem narodu, kao i meni, ništa nije jasno.
Međutim, broj bitkoina je ograničen i zato pomalo podseća na zlato. Ali kod zlata ipak ponešto razumem. Recimo, ako imam zlatnu polugu i neko me napadne, mogu da je koristim u samoodbrani, a onda je sklonim u trezor banke.
Mogu da učinim i nešto drugo, jednako glupo. Da stvorim sopstvenu kriptovalutu. Nazvaću je „Ser Oliver koin”. Cijena će joj, logično, biti prava sitnica. Trebaju mi saradnici. Kruži fama da se popriličan broj klinaca, mahom dvadesetogodišnjaka, pridružio kultu bitkoina. Tokom korone izgubili su poverenje u sve, naročito u nas matore. Optužuju nas za izdaju i predviđaju propast država i zvaničnih valuta, uz uspon dvoglave aždaje – saveza bogataša i političara.
Delimično su u pravu, ali nisu ukapirali ključnu stvar. Aždaja raste, a oni rudare. Na kraju će završiti još gore nego Alija Sirotanović. Likovi im neće biti na novčanicama, a kablovima će biti priključeni za superkompjuter. Njihov novi vlasnik, s kodnim imenom „Procesor”, plaćaće ih idiot-koinima. Tražili smo, gledaćemo.
-
@ 3f770d65:7a745b24
2024-10-29 17:38:20Amber
Amber is a Nostr event signer for Android that allows users to securely segregate their private key (nsec) within a single, dedicated application. Designed to function as a NIP-46 signing device, Amber ensures your smartphone can sign events without needing external servers or additional hardware, keeping your private key exposure to an absolute minimum. This approach aligns with the security rationale of NIP-46, which states that each additional system handling private keys increases potential vulnerability. With Amber, no longer do users need to enter their private key into various Nostr applications.
Amber is supported by a growing list of apps, including Amethyst, 0xChat, Voyage, Fountain, and Pokey, as well as any web application that supports NIP-46 NSEC bunkers, such as Nostr Nests, Coracle, Nostrudel, and more. With expanding support, Amber provides an easy solution for secure Nostr key management across numerous platforms.
Amber supports both native and web-based Nostr applications, aiming to eliminate the need for browser extensions or web servers. Key features include offline signing, multiple account support, and NIP-46 compatibility, and includes a simple UI for granular permissions management. Amber is designed to support signing events in the background, enhancing flexibility when you select the "remember my choice" option, eliminating the need to constantly be signing events for applications that you trust. You can download the app from it's GitHub page, via Obtainium or Zap.store.
To log in with Amber, simply tap the "Login with Amber" button or icon in a supported application, or you can paste the NSEC bunker connection string directly into the login box. For example, use a connection string like this: bunker://npub1tj2dmc4udvgafxxxxxxxrtgne8j8l6rgrnaykzc8sys9mzfcz@relay.nsecbunker.com.
Citrine
Citrine is a Nostr relay built specifically for Android, allowing Nostr clients on Android devices to seamlessly send and receive events through a relay running directly on their smartphone. This mobile relay setup offers Nostr users enhanced flexibility, enabling them to manage, share, and back up all their Nostr data locally on their device. Citrine’s design supports independence and data security by keeping data accessible and under user control.
With features tailored to give users greater command over their data, Citrine allows easy export and import of the database, restoration of contact lists in case of client malfunctions, and detailed relay management options like port configuration, custom icons, user management, and on-demand relay start/stop. Users can even activate TOR access, letting others connect securely to their Nostr relay directly on their phone. Future updates will include automatic broadcasting when the device reconnects to the internet, along with content resolver support to expand its functionality.
Once you have your Citrine relay fully configured, simply add it to the Private and Local relay sections in Amethyst's relay configuration.
Pokey
Pokey for Android is a brand new, real-time notification tool for Nostr. Pokey allows users to receive live updates for their Nostr events and enabling other apps to access and interact with them. Designed for seamless integration within a user's Nostr relays, Pokey lets users stay informed of activity as it happens, with speed and the flexibility to manage which events trigger notifications on their mobile device.
Pokey currently supports connections with Amber, offering granular notification settings so users can tailor alerts to their preferences. Planned features include broadcasting events to other apps, authenticating to relays, built-in Tor support, multi-account handling, and InBox relay management. These upcoming additions aim to make Pokey a fantastic tool for Nostr notifications across the ecosystem.
Zap.store
Zap.store is a permissionless app store powered by Nostr and your trusted social graph. Built to offer a decentralized approach to app recommendations, zap.store enables you to check if friends like Alice follow, endorse, or verify an app’s SHA256 hash. This trust-based, social proof model brings app discovery closer to real-world recommendations from friends and family, bypassing centralized app curation. Unlike conventional app stores and other third party app store solutions like Obtainium, zap.store empowers users to see which apps their contacts actively interact with, providing a higher level of confidence and transparency.
Currently available on Android, zap.store aims to expand to desktop, PWAs, and other platforms soon. You can get started by installing Zap.store on your favorite Android device, and install all of the applications mentioned above.
Android's openness goes hand in hand with Nostr's openness. Enjoy exploring both expanding ecosystems.
-
@ acbcec47:dd305bec
2024-12-27 13:49:37Prepare starter
- 1 part starter (~30g)
- 2 parts wholemeal rye flour (~60g)
- 2 parts warm water (~60g)
Stir well, then leave to stand warm and covered until the volume has almost doubled.
Once the starter has doubled in volume and a light cap has formed, it can be used for the dough.
Ingredients
- Flour (2/3 550/1100 wheat flour, 1/3 997 rye flour) = 600g
- Water: 60% of the flour quantity = 360g warm water
- Starter: 20% of the flour quantity = 120g starter
- Salt: 3% of the flour = 18g
Put the rest of the starter (about 30g) back in the fridge for the next batch. Knead everything well for 5 minutes, then leave to stand warm and covered.
Fermenting
First fermenting phase in one piece until the volume has almost doubled.
Then divide into portions ...
Shape and leave to rise on the baking tray for 1-2 hours.
Baking
- Preheat oven to 230°C (450°F)
- Just before baking, cut in the top of the rolls with a razor blade, so that they can extend
- Bake for 20 min with steam/cover at 210°C (410°F)
- Then remove the steam/cover and bake another 15-20 min at 180°C (360°F)
Enjoy ...
-
@ f1989a96:bcaaf2c1
2024-12-26 16:34:58Good morning, readers!
In Russia, the State Duma passed sweeping amendments granting officials the ability to equate “funding extremist activities” with “financing terrorism.” These changes allow officials to label anyone accused of spreading “fake news” or “discrediting” the military and authorities as “terrorists and extremists.” This development threatens activists and civil society organizations with intensified financial repression, including frozen accounts, restricted access to funds, and strict withdrawal limits.
Meanwhile, North Korea’s currency crisis continues to worsen, pushing citizens to abandon the North Korean won in favor of barter. As exchange rates for foreign currencies soar, merchants and money changers increasingly demand tangible goods like rice and fuel and no longer accept North Korean won for imported goods and foreign currencies.
In technology news, Tando, a Bitcoin payment app in Kenya, received significant attention at the 2024 Africa Bitcoin Conference for integrating the Bitcoin Lightning Network with M-PESA, Kenya’s mobile money system. This allows people to use Bitcoin to buy things across the country while merchants receive Kenyan shillings, bridging the gap between the local financial system and Bitcoin. \ \ Finally, we feature the latest episode of the Dissidents and Dictators podcast, featuring Togolese human rights activist Farida Nabourema sharing her first-hand experience growing up under the Gnassingbé dictatorship. She believes Bitcoin can enable greater transparency and offer a financial lifeline for citizens in Togo and across Africa.
Now, let’s dive right in!
Subscribe Here
GLOBAL NEWS
Russia | Sweeping Amendments Expand Financial Repression Against Dissidents
Russia’s State Duma made sweeping amendments to 48 federal laws, granting officials the power to equate “funding extremist activities” with “financing terrorism.” This move allows the regime to directly target individuals, activists, and nonprofit organizations suspected of spreading “fake news” or “discrediting” the military and regime. Once designated as a “terrorist” or “extremist,” a person or organization faces frozen bank accounts, restricted access to funds, and a withdrawal cap of just 10,000 rubles ($95) per month — a limit that extends to each dependent in their family. Compounding these hardships, employers often refuse to hire individuals on these government lists.
North Korea | Failing Currency Forces Return to Barter
North Korea’s currency crisis is forcing citizens to abandon the depreciating won currency in favor of barter. As exchange rates for foreign currencies like the US dollar and Chinese yuan hit record highs, merchants and money changers now demand commodities (such as rice and fuel) for foreign currencies and imported goods. One such example is trading around 2 kilograms of rice for a single dollar. This collapse leaves those without access to foreign currency in increasingly precarious financial positions and struggling to secure food and basic necessities. Even farmers, once partially compensated with valuable goods, now increasingly receive devalued cash, worsening nationwide food insecurity.
Nicaragua | Human Rights Abuses and Financial Repression Exposed
Under Daniel Ortega’s authoritarian rule, Nicaragua exemplifies the devastating intersection of financial repression and human rights abuses. New reports detail how the regime has confiscated over $250 million in assets, dissolved more than 5,200 NGOs, canceled pensions, and frozen bank accounts, leaving citizens financially vulnerable and silenced. Since Ortega’s return to power in 2007, and especially after the 2018 protests, his government has dismantled civil society, crushed political opposition, and eradicated independent media. Hundreds have been killed and exiled, and in 2023 and 2024 alone, 452 political opponents were stripped of their citizenship.
El Salvador | Bitcoin Adoption Limited as Government Comes to Terms With IMF
El Salvador finalized a $1.4 billion agreement with the International Monetary Fund (IMF) to support the government’s economic reform agenda at the cost of scaling back some of its Bitcoin policies. The deal will make accepting Bitcoin in the private sector voluntary, require all taxes to be paid in US dollars (as opposed to making it possible to pay in BTC), and see Chivo, the government-supported Bitcoin wallet, gradually unwound. In addition, the government will enhance “transparency, regulation, and supervision of digital assets” and establish a stronger Anti-Money Laundering and Counter-Financial Terrorism (AML/CFT) framework.
Malaysia | Parliament Passes Repressive Media Bills Amidst Financial Struggles
Earlier this year, Malaysia’s ringgit currency plunged to a 26-year low, driving up prices nationwide. As families struggled with a higher cost of living, officials passed an amendment granting law enforcement the power to freeze bank accounts suspected of fraud. Meanwhile, Malaysia’s parliament is passing two more bills to regulate media and online spaces, allowing officials to censor content and request user data from service providers without approval. Critics warn the vague language in these laws will likely be exploited to silence dissent and stifle public discourse. As financial hardships mount, Malaysia’s online spaces become increasingly controlled, eroding freedom of expression and financial autonomy.
BITCOIN NEWS
Tando | Bridging Bitcoin and Everyday Payments in Kenya
Tando, a new bitcoin payments app and HRF grantee, makes it easy to spend bitcoin anywhere in Kenya by integrating with M-PESA, Kenya’s mobile money system. Users simply download the Tando app, enter the merchant’s M-PESA number, and input the amount owed in Kenyan shillings. The app calculates the required amount of bitcoin and generates a Lightning invoice, which users pay through their own Bitcoin wallet. Tando then converts the sats to shillings and completes the transaction instantly (you can watch this one-minute live demo here). For Kenyans excluded from M-PESA due to Know-Your-Customer regulations, Tando provides a practical solution that bridges Bitcoin and local financial systems to make everyday transactions easier.
Yakihonne | Adds Support for Improved Encrypted Direct Messaging
YakiHonne, a Nostr client, champions free speech and facilitates Bitcoin payments across 170 countries. Recent updates have made the platform more user-friendly and secure. The updated text editor now supports multiple languages, including right-to-left scripts, enhancing accessibility for a global audience. Messaging capabilities have been upgraded to allow longer texts, and users can now activate Secure DMs (NIP 44) for encrypted messaging on Nostr. These improvements make YakiHonne an appealing communication platform for pro-democracy and human rights activists, offering secure messaging and the ability to receive payments in Bitcoin in countries ruled by authoritarian regimes.
Mostro | Making Bitcoin More Accessible and Private
Mostro, a private and peer-to-peer (P2P) Bitcoin exchange built on Nostr, made significant strides this year toward empowering human rights defenders and nonprofits with accessible, private, and censorship-resistant financial tools. Created by Venezuelan developer Francisco Calderon, the platform implemented advanced key management which allows users to rotate the keys used for every bitcoin trade. This adds a layer of privacy critical for those operating under authoritarian regimes. Additionally, Mostro adopted NIP-69, standardizing all peer-to-peer orders on Nostr, creating a larger liquidity pool, and making trades more accessible for users. Finally, Mostro will soon launch a mobile app (currently in the testing phase), helping democratize Bitcoin access by providing individuals with a user-friendly mobile interface.
Foundation | Introduces Personal Security Platform
Foundation, a Bitcoin hardware wallet company, introduced Passport Prime, which they call “the world’s first Personal Security Platform.” Designed to protect users’ bitcoin and digital lives, Passport Prime offers a Bitcoin wallet, multi-factor authentication, secure file storage, and a Seed Vault to organize seed phrases. It does not require usernames, passwords, or email addresses, making it an interesting option for privacy-conscious users, particularly pro-democracy and human rights activists operating under authoritarian regimes. You can learn more about Passport Prime here.
BTrust Builders | Applications for 2024 ₿OSS Cohort Close Tomorrow
Applications for the 2025 ₿OSS Cohort, hosted by Btrust Builders in partnership with Chaincode Labs, close tomorrow, Dec. 27, 2024. This part-time, three-month, fully remote program is tailored to African developers seeking to contribute to Bitcoin open-source software (₿OSS), in order to increase the potential for use cases in a region where three-quarters of the governments are authoritarian regimes. The program is open to developers of all experience levels, and it provides hands-on technical training, career-building opportunities, and mentorship. If you’re a developer interested in this program, you can apply here.
RECOMMENDED CONTENT
Is Bitcoin a Lifeline for Africa with Farida Nabourema
In this episode of Dissidents and Dictators, an HRF podcast, Togolese human rights activist Farida Nabourema reveals her experience growing up under the Gnassingbé dictatorship—a single-family autocracy that has ruled Togo for over 50 years. Nabourema shares insights into the corruption and lack of trust that permeates Togo’s financial system and discusses how Bitcoin can enable greater transparency and offer a lifeline for citizens in Togo and across Africa, where authoritarian regimes stifle financial freedom. Watch the full episode here.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
Subscribe to newsletter\ Apply for a grant\ Support our work\ Visit our website
-
@ 1739d937:3e3136ef
2024-10-29 16:57:08This update marks a major milestone for the project. I know, with certainty, that MLS messaging over Nostr is going to work. That might sound a little crazy after so many months working on the project, and I was pretty confident, but until you’ve got running code, it’s all conjecture.
Late last week, I released a video of a working prototype of White Noise that shows the full flow; creating groups, inviting other users to join those groups, accepting invites, and sending messages back-and-forth. I’m thrilled that I’ve gotten this far but also appalled that it’s taken so long and disgusted at the state of the code in the app (I’ve been told I have unrelenting standards 😅).
If you missed the video last week...
nostr:note125cuk0zetc7sshw52v5zaq9apq3rq7e2x587tr2c96t7z7sjs59svwv0fj
What's Next?
In this update, I want to cover a few things about how I'm planning to proceed and how I’m splitting code out of the app into libraries that will help other developers implement MLS messaging in their own Nostr clients.
First off, many of you know that I've been building White Noise as a Rust app using the Tauri framework. The OpenMLS implementation is also written in Rust (with bindings for many other languages). So, when you hear me talking about library code, think Rust crates for now.
The first library, called openmls-nostr, is an extension/abstraction on top of the openmls implementation of the MLS spec that helps Nostr clients interact more easily with that implementation in a way that feels native to Nostr. Mostly this will be helping developers interact with MLS primitives and ensure that they’re creating, validating, and serializing these objects in the right way at the right times.
The second isn’t a new library as a big contribution to the already excellent rust-nostr library from nostr:npub1drvpzev3syqt0kjrls50050uzf25gehpz9vgdw08hvex7e0vgfeq0eseet. The methods that will go in rust-nostr are highly abstracted and based specifically on the requirements of NIP-104. Mostly this will be helping developers to take those MLS primitives and publish or query them as Nostr events at the right times and to/from the right relays.
Most of this code was originally written directly in the White Noise library so this week I've started to pull code for both of those libraries out and move it to its new home. While I’ve been at it, I've been writing some tests and trying to document things.
An unfortunate offshoot of this is that the usable builds of White Noise are going to take a touch longer. I promise it’s still a very high priority but at this point I need to clean a few things up based on what I've learned thus far.
Another thing that is slowing down release is that; behind the scenes of the dev work, I’ve been battling with Apple for nearly 2 months now to get a proper developer team set up so that we can publish the app via TestFlight for MacOS and iOS. I’ve also been recently learning the intricacies of Android publishing (oh my dear god there are so many devices, OS versions, etc.).
With that in mind, if you know anyone who can help get me up to speed on CI/CD, release pipelines, and multi-platform distribution please hit me up. I would love to learn more and hopefully shortcut some of the pain.
Thanks again so much for all the support over the last few months! It means a lot to me and is a huge part of what is keeping me going on this. 🙏
-
@ bf47c19e:c3d2573b
2025-01-08 16:03:01Originalni tekst na trzisnoresenje.blogspot.com
22.12.2017 / Autor: Slaviša Tasić
Ovoliki uspon Bitcoina neobjašnjiv je za ekonomiste. Ne znam da li je to problem za bitcoin ili za ekonomiste, ali činjenica je da se uspeh bitcoina ne uklapa u postojeće ekonomske koncepte bar kada se radi o njemu kao valuti (blockchain kao tehnološka podloga je druga stvar). Možda su tinejdžeri koji su kupovali bitcoin 2010. i sada postali milioneri ispali pametniji od ekonomista, ali ja i dalje ne vidim odgovor bitcoina na neka standardna konceptualna pitanja. Postoji apokrifna izjava pripisana nekom profesoru ekonomije: "OK, vidim da to radi u praksi -- ali čik da vidim da li radi u teoriji?" Ovo je nešto tog tipa.
O poreklu novca, od Aristotela nasuprot Platonu pa sve do danas, postoje dve teorije. Jedna je teorija robnog novca i po njoj je novac nastao kada su neke vredne stvari počele da se češće koriste u razmeni. Plemeniti metali, naročito srebro i zlato, najpogodniji za čuvanje, oblikovanje i seckanje tako su postali novac. Kada se kasnije pojavio papirni novac on je sve do prvih decenija 20. veka bio samo hartija od vrednosti koja donosiocu daje pravo na propisanu količinu zlata.
Druga teorija je kartalizam, po kojoj neku robu novcem ne čini njena unutrašnja vrednost ili robna podloga, već država onda kada odluči da tu robu prihvata za naplatu poreza. Zbog toga je prelaz na papirni novac tokom 20. veka bio tako bezbolan i papirne valute se danas bez problema prihvataju. Današnji papirni novac nije više sertifikat koji vam daje pravo na zlato, ali vrednost ima jer u krajnjoj liniji znate da njime uvek možete platiti državi za porez ili usluge.
Bitcoin se ne uklapa ni u jednu od ovih teorija. On nema imanentnu vrednost kao robni novac, niti se može koristiti za plaćanje državi. Jedini način za bitcoin da ima neku vrednost je da ga prihvataju druge privatne strane u transakcijama. To je potpuni novitet u istoriji novca, jer se po prvi put radi o privatnom dekretnom (proklamovanom ili fiat) novcu. Postojao je privatni novac sa robnom podlogom; postoji državni dekretni novac; ali nikad privatni dekretni novac.
Najveći problem sa bitcoinom kao valutom je nestabilnost. To što njegova vrednost vrtoglavo raste nikako nije argument u prilog njemu jer nestabilnost valute isključuje mogućnost smislenog ugovaranja u njoj. Pristalice bitcoina dobro znaju da je njegova ponuda automatski ograničena i to je čest argument u odbranu bitcoina kao valute i navodno u prilog njegove stabilnosti. Ja nisam siguran da ograničenost ponude igra tako veliku ulogu.
Prvo, iako je količina bitcoina ograničena, može se napraviti neograničeno mnogo kopija bitcoina ili boljih kripto valuta. Već sada postoji na hiljade njih. Šta ograničenost ponude bitcoina uopšte znači kada ima neograničeno mnogo alternativa?
Drugo, iako je ponuda ograničena, cenu novca, kao i svega drugog, određuju ponuda i tražnja. A tražnja je kao što vidimo veoma varijabilna. Tako na jednoj strani imamo kvaziograničenost ponude a na drugoj veliku neizvesnost tražnje. To sve ukazuje na ogromnu nestabilnost.
Kod klasičnih valuta, poput evra ili dinara, ponuda je ograničena politikom centralne banke. Mnogi će reći da to nije nikakva garancija, ali zapadne valute već 30 godina nemaju nikakvu inflaciju, a u proteklih desetak godina veći problem bila je deflacija. Tražnja - želja za držanjem novca - je kod državnih valuta takođe varijabilna, ali mnogo manje jer monopolski karakter ovih valuta i naplata poreza u njima garantuju njihovu upotrebu. I kod tradicionalnih valuta ne samo da je tražnja novca relativno stabilna, već u situacijama kada tražnja novca bude nestabilna, fleksibilnost njegove ponude postaje prednost a ne mana. Na primer, tražnja za švajcarskim francima je negde oko 2009. naglo porasla. Švajcarska centralna banka je na to reagovala ogromnim povećanjem ponude, tako da je franak sačuvao bazičnu stabilnost. Jeste ojačao ali u razumnoj meri - ne desetostruko ili stostruko kao što rade kriptovalute.
Zato ne vidim kako se oscilacije bitcoina mogu zaustaviti. Jasno je da kriptovalute imaju neku korisnost u transakcijama, makar to bilo i za ilegalne aktivnosti, ali kada je ponuda neograničena a tražnja neizvesna onda nema nikakvih smernica buduće vrednosti. Ne znam koliko se to čak i može nazvati balonom jer se uopšte nemamo na šta osloniti u proceni nekakve prave vrednosti -- nema nikakvog fundamentalnog razloga ni da cena bitcoina poraste na $19,000 niti da danas padne na $12,500. Jedina vrednost koja u teoriji ima smisla je nula ili vrlo blizu nule.
-
@ 3bf0c63f:aefa459d
2024-10-26 14:18:23kind:1
maximalism and the future of other stuff and Nostr decentralizationThese two problems exist on Nostr today, and they look unrelated at first:
- People adding more stuff to
kind:1
notes, such as making them editable, or adding special corky syntax thas has to be parsed and rendered in complicated UIs; - The discovery of "other stuff" content (i.e. long-form articles, podcasts, calendar events, livestreams etc) is hard due to the fact that most people only use microblogging clients and they often don't appear there for them.
Point 2 above has 3 different solutions:
- a. Just publish everything as
kind:1
notes; - b. Publish different things as different kinds, but make microblogging clients fetch all the event kinds from people you follow, then render them natively or use NIP-31, or NIP-89 to point users to other clients that would render them better;
- c. Publish different things as different kinds, and reference them in
kind:1
notes that would act as announcements to these other events, also relying on NIP-31 and NIP-89 for displaying references and recommending other clients.
Solution a is obviously very bad, so I won't address it.
For a while I have believed solution b was the correct one, and many others seem to tacitly agree with it, given that some clients have been fetching more and more event kinds and going out of their way to render them in the same feed where only
kind:1
notes were originally expected to be.I don't think clients doing that is necessarily bad, but I do think this have some centralizing effects on the protocol, as it pushes clients to become bigger and bigger, raising the barrier to entry into the
kind:1
realm. And also in the past I have talked about the fact that I disliked that some clients would display my long-form articles as if they were normalkind:1
notes and just dump them into the feeds of whoever was following me: nostr:nevent1qqsdk90k9k30vtzwpj6grxys9mvsegu5kkwd4jmpyhlmtjnxet2rvggprpmhxue69uhhyetvv9ujumn0wdmksetjv5hxxmmdqy8hwumn8ghj7mn0wd68ytnddaksygpm7rrrljungc6q0tuh5hj7ue863q73qlheu4vywtzwhx42a7j9n5hae35cThese and other reasons have made me switch my preference to solution c, as it gives the most flexibility to the publisher: whoever wants to announce stuff so it can be discovered can, whoever doesn't don't have to. And it allows microblogging clients the freedom to render just render tweets and having a straightforward barrier between what they can render and what is just a link to an external app or webapp (of course they can always opt to render the referenced content in-app if they want).
It also makes the case for microapps more evident. If all microblogging clients become superapps that can render recipe events perfectly why would anyone want to use a dedicated recipes app? I guess there are still reasons, but blurring the line between content kinds in superapps would definitely remove some of the reasons and eventually kill all the microapps.
That brings us back to point 1 above (the overcomplication of
kind:1
events): if solution c is what we're going to, that makeskind:1
events very special in Nostr, and not just another kind among others. Microblogging clients become the central plaza of Nostr, thus protecting their neutrality and decentralization much more important. Having a lot of clients with different userbases, doing things in slightly different ways, is essential for that decentralization.It's ok if Nostr ends up having just 2 recipe-sharing clients, but it must have dozens of microblogging clients -- and maybe not even full-blown microblogging clients, but other apps that somehow deal with
kind:1
events in multiple ways. It's ok if implementing a client for public audio-rooms is very hard and complicated, but at the same time it should be very simple to write a client that can render akind:1
note referencing an audio-room and linking to that dedicated client.I hope you got my point and agreed because this article is ended.
- People adding more stuff to
-
@ ec42c765:328c0600
2024-10-21 07:42:482024年3月
フィリピンのセブ島へ旅行。初海外。
Nostrに投稿したらこんなリプライが
nostr:nevent1qqsff87kdxh6szf9pe3egtruwfz2uw09rzwr6zwpe7nxwtngmagrhhqc2qwq5
nostr:nevent1qqs9c8fcsw0mcrfuwuzceeq9jqg4exuncvhas5lhrvzpedeqhh30qkcstfluj
(ビットコイン関係なく普通の旅行のつもりで行ってた。というか常にビットコインのこと考えてるわけではないんだけど…)
そういえばフィリピンでビットコイン決済できるお店って多いのかな?
海外でビットコイン決済ってなんかかっこいいな!
やりたい!
ビットコイン決済してみよう! in セブ島
BTCMap でビットコイン決済できるところを探す
本場はビットコインアイランドと言われてるボラカイ島みたいだけど
セブにもそれなりにあった!
なんでもいいからビットコイン決済したいだけなので近くて買いやすい店へ
いざタピオカミルクティー屋!
ちゃんとビットコインのステッカーが貼ってある!
つたない英語とGoogle翻訳を使ってビットコイン決済できるか店員に聞いたら
店員「ビットコインで支払いはできません」
(えーーーー、なんで…ステッカー貼ってあるやん…。)
まぁなんか知らんけどできないらしい。
店員に色々質問したかったけど質問する英語力もないのでする気が起きなかった
結局、せっかく店まで足を運んだので普通に現金でタピオカミルクティーを買った
タピオカミルクティー
話題になってた時も特に興味なくて飲んでなかったので、これが初タピオカミルクティーになった
法定通貨の味がした。
どこでもいいからなんでもいいから
海外でビットコイン決済してみたい
ビットコイン決済させてくれ! in ボラカイ島
ビットコインアイランドと呼ばれるボラカイ島はめちゃくちゃビットコイン決済できるとこが多いらしい
でもやめてしまった店も多いらしい
でも300もあったならいくつかはできるとこあるやろ!
nostr:nevent1qqsw0n6utldy6y970wcmc6tymk20fdjxt6055890nh8sfjzt64989cslrvd9l
行くしかねぇ!
ビットコインアイランドへ
フィリピンの国内線だぁ
``` 行き方: Mactan-Cebu International Airport ↓飛行機 Godofredo P. Ramos Airport (Caticlan International Airport, Boracay Airport) ↓バスなど Caticlan フェリーターミナル ↓船 ボラカイ島
料金: 飛行機(受託手荷物付き) 往復 21,000円くらい 空港~ボラカイ島のホテルまで(バス、船、諸経費) 往復 3,300円くらい (klookからSouthwest Toursを利用)
このページが色々詳しい https://smaryu.com/column/d/91761/ ```
空港おりたらSouthwestのバスに乗る
事前にネットで申し込みをしている場合は5番窓口へ
港!
船!(めっちゃ速い)
ボラカイついた!
ボラカイ島の移動手段
セブの移動はgrabタクシーが使えるがボラカイにはない。
ネットで検索するとトライシクルという三輪タクシーがおすすめされている。
(トライシクル:開放的で風がきもちいい)
トライシクルの欠点はふっかけられるので値切り交渉をしないといけないところ。
最初に300phpくらいを提示され、行き先によるけど150phpくらいまでは下げられる。
これはこれで楽しい値切り交渉だけど、個人的にはトライシクルよりバスの方が気楽。
Hop On Hop Off バス:
https://www.hohoboracay.com/pass.php
一日乗り放題250phpなので往復や途中でどこか立ち寄ったりを考えるとお得。
バスは現金が使えないので事前にどこかでカードを買うか車内で買う。
私は何も知らずに乗って車内で乗務員さんから現金でカードを買った。
バスは狭い島内を数本がグルグル巡回してるので20~30分に1本くらいは来るイメージ。
逆にトライシクルは待たなくても捕まえればすぐに乗れるところがいいところかもしれない。
現実
ボラカイ島 BTC Map
BTC決済できるとこめっちゃある
さっそく店に行く!
「bitcoin accepted here」のステッカーを見つける!
店員にビットコイン支払いできるか聞く!
できないと言われる!
もう一軒行く
「bitcoin accepted here」のステッカーを見つける
店員にビットコイン支払いできるか聞く
できないと言われる
5件くらいは回った
全部できない!
悲しい
で、ネットでビットコインアイランドで検索してみると
旅行日の一か月前くらいにアップロードされた動画があったので見てみた
要約 - ビットコイン決済はpouch.phというスタートアップ企業がボラカイ島の店にシステムを導入した - ビットコインアイランドとすることで観光客が10%~30%増加つまり数百~千人程度のビットコインユーザーが来ると考えた - しかし実際には3~5人だった - 結果的に200の店舗がビットコイン決済を導入しても使われたのはごく一部だった - ビットコイン決済があまり使われないので店員がやり方を忘れてしまった - 店は関心を失いpouchのアプリを消した
https://youtu.be/uaqx6794ipc?si=Afq58BowY1ZrkwaQ
なるほどね~
しゃあないわ
聖地巡礼
動画内でpouchのオフィスだったところが紹介されていた
これは半年以上前の画像らしい
現在はオフィスが閉鎖されビットコインの看板は色あせている
おもしろいからここに行ってみよう!となった
で行ってみた
看板の色、更に薄くなってね!?
記念撮影
これはこれで楽しかった
場所はこの辺
https://maps.app.goo.gl/WhpEV35xjmUw367A8
ボラカイ島の中心部の結構いいとこ
みんな~ビットコイン(の残骸)の聖地巡礼、行こうぜ!
最後の店
Nattoさんから情報が
なんかあんまりネットでも今年になってからの情報はないような…https://t.co/hiO2R28sfO
— Natto (@madeofsoya) March 22, 2024
ここは比較的最近…?https://t.co/CHLGZuUz04もうこれで最後だと思ってダメもとで行ってみた なんだろうアジア料理屋さん?
もはや信頼度0の「bitcoin accepted here」
ビットコイン払いできますか?
店員「できますよ」
え?ほんとに?ビットコイン払いできる?
店員「できます」
できる!!!!
なんかできるらしい。
適当に商品を注文して
印刷されたQRコードを出されたので読み取る
ここでスマートに決済できればよかったのだが結構慌てた
自分は英語がわからないし相手はビットコインがわからない
それにビットコイン決済は日本で1回したことがあるだけだった
どうもライトニングアドレスのようだ
送金額はこちらで指定しないといけない
店員はフィリピンペソ建ての金額しか教えてくれない
何sats送ればいいのか分からない
ここでめっちゃ混乱した
でもウォレットの設定変えればいいと気付いた
普段円建てにしているのをフィリピンペソ建てに変更すればいいだけだった
設定を変更したら相手が提示している金額を入力して送金
送金は2、3秒で完了した
やった!
海外でビットコイン決済したぞ!
ログ
PORK CHAR SIU BUN とかいうやつを買った
普通にめっちゃおいしかった
なんかビットコイン決済できることにビビッて焦って一品しか注文しなかったけどもっと頼めばよかった
ここです。みなさん行ってください。
Bunbun Boracay
https://maps.app.goo.gl/DX8UWM8Y6sEtzYyK6
めでたしめでたし
以下、普通の観光写真
セブ島
ジンベエザメと泳いだ
スミロン島でシュノーケリング
市場の路地裏のちょっとしたダウンタウン?スラム?をビビりながら歩いた
ボホール島
なんか変な山
メガネザル
現地の子供が飛び込みを披露してくれた
ボラカイ島
ビーチ
夕日
藻
ボラカイ島にはいくつかビーチがあって宿が多いところに近い南西のビーチ、ホワイトビーチは藻が多かった(時期によるかも)
北側のプカシェルビーチは全然藻もなく、水も綺麗でめちゃくちゃよかった
プカシェルビーチ
おわり!
-
@ 8947a945:9bfcf626
2024-10-17 08:06:55สวัสดีทุกคนบน Nostr ครับ รวมไปถึง watchersและ ผู้ติดตามของผมจาก Deviantart และ platform งานศิลปะอื่นๆนะครับ
ตั้งแต่ต้นปี 2024 ผมใช้ AI เจนรูปงานตัวละครสาวๆจากอนิเมะ และเปิด exclusive content ให้สำหรับผู้ที่ชื่นชอบผลงานของผมเป็นพิเศษ
ผมโพสผลงานผมทั้งหมดไว้ที่เวบ Deviantart และค่อยๆสร้างฐานผู้ติดตามมาเรื่อยๆอย่างค่อยเป็นค่อยไปมาตลอดครับ ทุกอย่างเติบโตไปเรื่อยๆของมัน ส่วนตัวผมมองว่ามันเป็นพิร์ตธุรกิจออนไลน์ ของผมพอร์ตนึงได้เลย
เมื่อวันที่ 16 กย.2024 มีผู้ติดตามคนหนึ่งส่งข้อความส่วนตัวมาหาผม บอกว่าชื่นชอบผลงานของผมมาก ต้องการจะขอซื้อผลงาน แต่ขอซื้อเป็น NFT นะ เสนอราคาซื้อขายต่อชิ้นที่สูงมาก หลังจากนั้นผมกับผู้ซื้อคนนี้พูดคุยกันในเมล์ครับ
นี่คือข้อสรุปสั่นๆจากการต่อรองซื้อขายครับ
(หลังจากนี้ผมขอเรียกผู้ซื้อว่า scammer นะครับ เพราะไพ่มันหงายมาแล้ว ว่าเขาคือมิจฉาชีพ)
- Scammer รายแรก เลือกผลงานที่จะซื้อ เสนอราคาซื้อที่สูงมาก แต่ต้องเป็นเวบไซต์ NFTmarket place ที่เขากำหนดเท่านั้น มันทำงานอยู่บน ERC20 ผมเข้าไปดูเวบไซต์ที่ว่านี้แล้วรู้สึกว่ามันดูแปลกๆครับ คนที่จะลงขายผลงานจะต้องใช้ email ในการสมัครบัญชีซะก่อน ถึงจะผูก wallet อย่างเช่น metamask ได้ เมื่อผูก wallet แล้วไม่สามารถเปลี่ยนได้ด้วย ตอนนั้นผมใช้ wallet ที่ไม่ได้ link กับ HW wallet ไว้ ทดลองสลับ wallet ไปๆมาๆ มันทำไม่ได้ แถมลอง log out แล้ว เลข wallet ก็ยังคาอยู่อันเดิม อันนี้มันดูแปลกๆแล้วหนึ่งอย่าง เวบนี้ค่า ETH ในการ mint 0.15 - 0.2 ETH … ตีเป็นเงินบาทนี่แพงบรรลัยอยู่นะครับ
-
Scammer รายแรกพยายามชักจูงผม หว่านล้อมผมว่า แหม เดี๋ยวเขาก็มารับซื้องานผมน่า mint งานเสร็จ รีบบอกเขานะ เดี๋ยวเขารีบกดซื้อเลย พอขายได้กำไร ผมก็ได้ค่า gas คืนได้ แถมยังได้กำไรอีก ไม่มีอะไรต้องเสีนจริงมั้ย แต่มันเป้นความโชคดีครับ เพราะตอนนั้นผมไม่เหลือทุนสำรองที่จะมาซื้อ ETH ได้ ผมเลยต่อรองกับเขาตามนี้ครับ :
-
ผมเสนอว่า เอางี้มั้ย ผมส่งผลงานของผมแบบ low resolution ให้ก่อน แลกกับให้เขาช่วยโอน ETH ที่เป็นค่า mint งานมาให้หน่อย พอผมได้ ETH แล้ว ผมจะ upscale งานของผม แล้วเมล์ไปให้ ใจแลกใจกันไปเลย ... เขาไม่เอา
- ผมเสนอให้ไปซื้อที่ร้านค้าออนไลน์ buymeacoffee ของผมมั้ย จ่ายเป็น USD ... เขาไม่เอา
- ผมเสนอให้ซื้อขายผ่าน PPV lightning invoice ที่ผมมีสิทธิ์เข้าถึง เพราะเป็น creator ของ Creatr ... เขาไม่เอา
- ผมยอกเขาว่างั้นก็รอนะ รอเงินเดือนออก เขาบอก ok
สัปดาห์ถัดมา มี scammer คนที่สองติดต่อผมเข้ามา ใช้วิธีการใกล้เคียงกัน แต่ใช้คนละเวบ แถมเสนอราคาซื้อที่สูงกว่าคนแรกมาก เวบที่สองนี้เลวร้ายค่าเวบแรกอีกครับ คือต้องใช้เมล์สมัครบัญชี ไม่สามารถผูก metamask ได้ พอสมัครเสร็จจะได้ wallet เปล่าๆมาหนึ่งอัน ผมต้องโอน ETH เข้าไปใน wallet นั้นก่อน เพื่อเอาไปเป็นค่า mint NFT 0.2 ETH
ผมบอก scammer รายที่สองว่า ต้องรอนะ เพราะตอนนี้กำลังติดต่อซื้อขายอยู่กับผู้ซื้อรายแรกอยู่ ผมกำลังรอเงินเพื่อมาซื้อ ETH เป็นต้นทุนดำเนินงานอยู่ คนคนนี้ขอให้ผมส่งเวบแรกไปให้เขาดูหน่อย หลังจากนั้นไม่นานเขาเตือนผมมาว่าเวบแรกมันคือ scam นะ ไม่สามารถถอนเงินออกมาได้ เขายังส่งรูป cap หน้าจอที่คุยกับผู้เสียหายจากเวบแรกมาให้ดูว่าเจอปัญหาถอนเงินไม่ได้ ไม่พอ เขายังบลัฟ opensea ด้วยว่าลูกค้าขายงานได้ แต่ถอนเงินไม่ได้
Opensea ถอนเงินไม่ได้ ตรงนี้แหละครับคือตัวกระตุกต่อมเอ๊ะของผมดังมาก เพราะ opensea อ่ะ ผู้ใช้ connect wallet เข้ากับ marketplace โดยตรง ซื้อขายกันเกิดขึ้น เงินวิ่งเข้าวิ่งออก wallet ของแต่ละคนโดยตรงเลย opensea เก็บแค่ค่า fee ในการใช้ platform ไม่เก็บเงินลูกค้าไว้ แถมปีนี้ค่า gas fee ก็ถูกกว่า bull run cycle 2020 มาก ตอนนี้ค่า gas fee ประมาณ 0.0001 ETH (แต่มันก็แพงกว่า BTC อยู่ดีอ่ะครับ)
ผมเลยเอาเรื่องนี้ไปปรึกษาพี่บิท แต่แอดมินมาคุยกับผมแทน ทางแอดมินแจ้งว่ายังไม่เคยมีเพื่อนๆมาปรึกษาเรื่องนี้ กรณีที่ผมทักมาถามนี่เป็นรายแรกเลย แต่แอดมินให้ความเห็นไปในทางเดียวกับสมมุติฐานของผมว่าน่าจะ scam ในเวลาเดียวกับผมเอาเรื่องนี้ไปถามในเพจ NFT community คนไทนด้วย ได้รับการ confirm ชัดเจนว่า scam และมีคนไม่น้อยโดนหลอก หลังจากที่ผมรู้ที่มาแล้ว ผมเลยเล่นสงครามปั่นประสาท scammer ทั้งสองคนนี้ครับ เพื่อดูว่าหลอกหลวงมิจฉาชีพจริงมั้ย
โดยวันที่ 30 กย. ผมเลยปั่นประสาน scammer ทั้งสองรายนี้ โดยการ mint ผลงานที่เขาเสนอซื้อนั่นแหละ ขึ้น opensea แล้วส่งข้อความไปบอกว่า
mint ให้แล้วนะ แต่เงินไม่พอจริงๆว่ะโทษที เลย mint ขึ้น opensea แทน พอดีบ้านจน ทำได้แค่นี้ไปถึงแค่ opensea รีบไปซื้อล่ะ มีคนจ้องจะคว้างานผมเยอะอยู่ ผมไม่คิด royalty fee ด้วยนะเฮ้ย เอาไปขายต่อไม่ต้องแบ่งกำไรกับผม
เท่านั้นแหละครับ สงครามจิตวิทยาก็เริ่มขึ้น แต่เขาจนมุม กลืนน้ำลายตัวเอง ช็อตเด็ดคือ
เขา : เนี่ยอุส่ารอ บอกเพื่อนในทีมว่าวันจันทร์ที่ 30 กย. ได้ของแน่ๆ เพื่อนๆในทีมเห็นงานผมแล้วมันสวยจริง เลยใส่เงินเต็มที่ 9.3ETH (+ capture screen ส่งตัวเลขยอดเงินมาให้ดู)ไว้รอโดยเฉพาะเลยนะ ผม : เหรอ ... งั้น ขอดู wallet address ที่มี transaction มาให้ดูหน่อยสิ เขา : 2ETH นี่มัน 5000$ เลยนะ ผม : แล้วไง ขอดู wallet address ที่มีการเอายอดเงิน 9.3ETH มาให้ดูหน่อย ไหนบอกว่าเตรียมเงินไว้มากแล้วนี่ ขอดูหน่อย ว่าใส่ไว้เมื่อไหร่ ... เอามาแค่ adrress นะเว้ย ไม่ต้องทะลึ่งส่ง seed มาให้ เขา : ส่งรูปเดิม 9.3 ETH มาให้ดู ผม : รูป screenshot อ่ะ มันไม่มีความหมายหรอกเว้ย ตัดต่อเอาก็ได้ง่ายจะตาย เอา transaction hash มาดู ไหนว่าเตรียมเงินไว้รอ 9.3ETH แล้วอยากซื้องานผมจนตัวสั่นเลยไม่ใช่เหรอ ถ้าจะส่ง wallet address มาให้ดู หรือจะช่วยส่ง 0.15ETH มาให้ยืม mint งานก่อน แล้วมากดซื้อ 2ETH ไป แล้วผมใช้ 0.15ETH คืนให้ก็ได้ จะซื้อหรือไม่ซื้อเนี่ย เขา : จะเอา address เขาไปทำไม ผม : ตัดจบ รำคาญ ไม่ขายให้ละ เขา : 2ETH = 5000 USD เลยนะ ผม : แล้วไง
ผมเลยเขียนบทความนี้มาเตือนเพื่อนๆพี่ๆทุกคนครับ เผื่อใครกำลังเปิดพอร์ตทำธุรกิจขาย digital art online แล้วจะโชคดี เจอของดีแบบผม
ทำไมผมถึงมั่นใจว่ามันคือการหลอกหลวง แล้วคนโกงจะได้อะไร
อันดับแรกไปพิจารณาดู opensea ครับ เป็นเวบ NFTmarketplace ที่ volume การซื้อขายสูงที่สุด เขาไม่เก็บเงินของคนจะซื้อจะขายกันไว้กับตัวเอง เงินวิ่งเข้าวิ่งออก wallet ผู้ซื้อผู้ขายเลย ส่วนทางเวบเก็บค่าธรรมเนียมเท่านั้น แถมค่าธรรมเนียมก็ถูกกว่าเมื่อปี 2020 เยอะ ดังนั้นการที่จะไปลงขายงานบนเวบ NFT อื่นที่ค่า fee สูงกว่ากันเป็นร้อยเท่า ... จะทำไปทำไม
ผมเชื่อว่า scammer โกงเงินเจ้าของผลงานโดยการเล่นกับความโลภและความอ่อนประสบการณ์ของเจ้าของผลงานครับ เมื่อไหร่ก็ตามที่เจ้าของผลงานโอน ETH เข้าไปใน wallet เวบนั้นเมื่อไหร่ หรือเมื่อไหร่ก็ตามที่จ่ายค่า fee ในการ mint งาน เงินเหล่านั้นสิ่งเข้ากระเป๋า scammer ทันที แล้วก็จะมีการเล่นตุกติกต่อแน่นอนครับ เช่นถอนไม่ได้ หรือซื้อไม่ได้ ต้องโอนเงินมาเพิ่มเพื่อปลดล็อค smart contract อะไรก็ว่าไป แล้วคนนิสัยไม่ดีพวกเนี้ย ก็จะเล่นกับความโลภของคน เอาราคาเสนอซื้อที่สูงโคตรๆมาล่อ ... อันนี้ไม่ว่ากัน เพราะบนโลก NFT รูปภาพบางรูปที่ไม่ได้มีความเป็นศิลปะอะไรเลย มันดันขายกันได้ 100 - 150 ETH ศิลปินที่พยายามสร้างตัวก็อาจจะมองว่า ผลงานเรามีคนรับซื้อ 2 - 4 ETH ต่องานมันก็มากพอแล้ว (จริงๆมากเกินจนน่าตกใจด้วยซ้ำครับ)
บนโลกของ BTC ไม่ต้องเชื่อใจกัน โอนเงินไปหากันได้ ปิดสมุดบัญชีได้โดยไม่ต้องเชื่อใจกัน
บบโลกของ ETH "code is law" smart contract มีเขียนอยู่แล้ว ไปอ่าน มันไม่ได้ยากมากในการทำความเข้าใจ ดังนั้น การจะมาเชื่อคำสัญญาจากคนด้วยกัน เป็นอะไรที่ไม่มีเหตุผล
ผมไปเล่าเรื่องเหล่านี้ให้กับ community งานศิลปะ ก็มีทั้งเสียงตอบรับที่ดี และไม่ดีปนกันไป มีบางคนยืนยันเสียงแข็งไปในทำนองว่า ไอ้เรื่องแบบเนี้ยไม่ได้กินเขาหรอก เพราะเขาตั้งใจแน่วแน่ว่างานศิลป์ของเขา เขาไม่เอาเข้ามายุ่งในโลก digital currency เด็ดขาด ซึ่งผมก็เคารพมุมมองเขาครับ แต่มันจะดีกว่ามั้ย ถ้าเราเปิดหูเปิดตาให้ทันเทคโนโลยี โดยเฉพาะเรื่อง digital currency , blockchain โดนโกงทีนึงนี่คือหมดตัวกันง่ายกว่าเงิน fiat อีก
อยากจะมาเล่าให้ฟังครับ และอยากให้ช่วยแชร์ไปให้คนรู้จักด้วย จะได้ระวังตัวกัน
Note
- ภาพประกอบ cyber security ทั้งสองนี่ของผมเองครับ ทำเอง วางขายบน AdobeStock
- อีกบัญชีนึงของผม "HikariHarmony" npub1exdtszhpw3ep643p9z8pahkw8zw00xa9pesf0u4txyyfqvthwapqwh48sw กำลังค่อยๆเอาผลงานจากโลกข้างนอกเข้ามา nostr ครับ ตั้งใจจะมาสร้างงานศิลปะในนี้ เพื่อนๆที่ชอบงาน จะได้ไม่ต้องออกไปหาที่ไหน
ผลงานของผมครับ - Anime girl fanarts : HikariHarmony - HikariHarmony on Nostr - General art : KeshikiRakuen - KeshikiRakuen อาจจะเป็นบัญชี nostr ที่สามของผม ถ้าไหวครับ
-
@ bf47c19e:c3d2573b
2025-01-08 16:01:15Originalni tekst na trzisnoresenje.blogspot.com
06.10.2014 / Autor: Slaviša Tasić
Od kako je bitcoin postao popularan vodi se rasprava među zagovornicima slobodnog tržišta oko njegovo gpravog statusa: da li je to budući novac, efikasan sistem zaobilaženja državne kontrole i garant slobode pojedinca, ili pak fikcija i pomodarstvo iza koje nema ničeg stvarnog?
Teorijski centar debate je pitanje da li je bitcoin "zapravo" novac ili ne. Jedna grupa tvrdi da jeste, pozivajući se na to da je nastao hiljadama dobrovoljnih akata potrošača na tržištu i time uspostavljen kao konvencija. Ko ste vi, teoretičari iz fotelje, da u ime naroda koji prihvata bitcoin definišete šte je "pravi" novac a šta nije? Druga škola tvrdi da je to irelevantno, da je takozvana vrednost bitcoina fiktivna i naduvana, i da će uskoro pući, jer nema nikakve realne pozadine: svaki novac kroz istoriju je uvek morao da ima podlogu nećeg realnog, najčešće plemenitog metala neke vrste, novac nikad ne nastaje nečijom naredbom ili proizvoljnom odlukom.
Vrlo često se u ovom kontekstu pominje Misesova čuena "teorema regresije". Ona kaže da je novac univerzalno razmensko sredstvo koje svoju vrednost crpe iz prethodne upotrebne vrednosti materijala od kojeg je sačinjeno. Recimo, zlato i srebro imaju vrednost kao nakit i luksuzna roba koju ljudi traže iz ne-monetarnih razloga, a njihova vrednost kao novca se onda izvodi iz te prethodne evaluacije njegove ne monetarne upotrebne "vrednosti". Tehnički rečeno, tražnja za zlatom kao monetarnim dobrom izvedena je iz tražnje za zlatom kao nemonetarnim dobrom.
Problem sa bitcoinom je što na prvi pogled on nema nikakvu ne-monetarnu vrednost. Nije zasnovan ni na kakvom fizičkom materijalu ili robi, već predstavlja kompjuterski algoritam. Bitcoin je beskoristan za bilo šta drugo osim kao sredstvo plaćanja. Ako je tome tako, onda postoje samo dve mogućnosti: ili bitcoin ne može da bude novac, ili je teorija o realnoj, nemonetarnoj osnovi novca netačna.
Izgleda da ni jedno ni drugo nije slučaj. Bitcoin jeste sredstvo razmene, iako još uvek nije novac, budući da nije univerzalno prihvaćen (što ne znači da ne može ili da neće biti prihvaćen), ali bitcoin istovremeno JESTE zasnovan na nečem realnom, tj ima vrednost i mimo svoje uloge kao novca. Ta prethodna vrednost bitcoina je njegova uloga kao efikasnog sistema plaćanja. Kao što Jeffrey Tucker naglašava u svom novom tekstu, Bitcoin je 2008 uveden kao sistem plaćanja koji bi omogućio efikasni transfer resursa između pojedinaca u raznim delovima sveta uz potpuno zaobilaženje zvaničnog finansijskog sistema. Programski dokument osnivača Bitcoina nije uopšte spominjao novac nego samo sistem plaćanja koji omogućava pouzdanost, anonimonst i operisanje izvan zvaničnih finansijkih tokova. Tehnički detalji su ovde.
Bitcoin kao sistem je lansiran 9 januara 2009, ali u tom trenutku njegova vrednost je bila nula! Sve do oktobra 2009 potenicjalni klijenti su mogli da dobiju besplatno koliko god hoće bitcoina da eksperimentišu. Ljudi su vršili prve transakcije, proveravali da li je sistem pouzdan, da li radi onako kako je obećano itd. Taj proces eksperminetisanja je trajao oko deset meseci. U tom periodu Bitcoin kao novac nije imao nikakvu tržišnu vrednost. Pre tačno pet godina, 5 oktobra 2009 postavljena je prva tržišna cena. Ona je bila 1390 bitcoina za jedan američki dolar, odnosno jedan bitcoin je vredeo manje od desetog dela penija. U tom trenutku publika je bila još uvek skeptična, što se pokazalo u vrlo niskoj ceni, ali kako je vreme prolazilo cena je rasla jer je evaluacija sistema, sa protokom vremena i daljim potvrđivanjem njegove vrednosti i pouzdanosti, kao i ulaskom mnogo šireg kurga ljudi u igru, postajala sve viša. Međutim, to je sve sa teorijske tačke gledišta irelevantno; ključna stvar je da je početna evaluacija bitcoina, prva tržišna cena objavljena 5 oktobra 2009 bila zapravo izraz evaluacije sistema plaćanja koja je vršena mesecima nezavisno od samog novca (tj njegove potencijalne vrednosti). Bitcoin kao novac "regresira" u mizesovskom smislu na bitcoin kao sistem plaćanja.
Dakle, bitcoin nije fiat novac. On predstavlja potencijalnu valutu koja je izvedena iz tržišne vrednosti specifičnog sistema plaćanja koji klijentima omogućava značajne prednosti koje drugi sistemi ne pružaju. I stoga oza njega stoji "realna vrednost" u istom smislu u kome nešto "realno" stoji iza zlata i srebra kao novca, ili iza modernih fiat valuta izvedenih iz zlata i srebra. Ja ne verujem da bi bitcoin imao velike šanse protiv zlata i srebra na slobodnom tržištu valuta, ali u ovom trenutku ne postoji slobodno tržište valuta, tj onaj ko pokuša da trguje u zlatu završiće u zatvoru. U takvim okolnostima, virtuelnost bitcoina predstavlja komparativnu prednost u odnosu na svaku vrstu robnog novca uključujući i zlato: vlasnik ne poseduje nikakvu fizičku supstancu koju vlada može da mu konfiskuje. Naravno, to bi moglo da se promeni ukoliko vlade ocene da je bitcoin značajna opasnost i krene u tehnološki rat protiv njega. U tom slučaju bi i cena verovatno pala.
-
@ 8947a945:9bfcf626
2024-10-17 07:33:00Hello everyone on Nostr and all my watchersand followersfrom DeviantArt, as well as those from other art platforms
I have been creating and sharing AI-generated anime girl fanart since the beginning of 2024 and have been running member-exclusive content on Patreon.
I also publish showcases of my artworks to Deviantart. I organically build up my audience from time to time. I consider it as one of my online businesses of art. Everything is slowly growing
On September 16, I received a DM from someone expressing interest in purchasing my art in NFT format and offering a very high price for each piece. We later continued the conversation via email.
Here’s a brief overview of what happened
- The first scammer selected the art they wanted to buy and offered a high price for each piece. They provided a URL to an NFT marketplace site running on the Ethereum (ETH) mainnet or ERC20. The site appeared suspicious, requiring email sign-up and linking a MetaMask wallet. However, I couldn't change the wallet address later. The minting gas fees were quite expensive, ranging from 0.15 to 0.2 ETH
-
The scammers tried to convince me that the high profits would easily cover the minting gas fees, so I had nothing to lose. Luckily, I didn’t have spare funds to purchase ETH for the gas fees at the time, so I tried negotiating with them as follows:
-
I offered to send them a lower-quality version of my art via email in exchange for the minting gas fees, but they refused.
- I offered them the option to pay in USD through Buy Me a Coffee shop here, but they refused.
- I offered them the option to pay via Bitcoin using the Lightning Network invoice , but they refused.
- I asked them to wait until I could secure the funds, and they agreed to wait.
The following week, a second scammer approached me with a similar offer, this time at an even higher price and through a different NFT marketplace website.
This second site also required email registration, and after navigating to the dashboard, it asked for a minting fee of 0.2 ETH. However, the site provided a wallet address for me instead of connecting a MetaMask wallet.
I told the second scammer that I was waiting to make a profit from the first sale, and they asked me to show them the first marketplace. They then warned me that the first site was a scam and even sent screenshots of victims, including one from OpenSea saying that Opensea is not paying.
This raised a red flag, and I began suspecting I might be getting scammed. On OpenSea, funds go directly to users' wallets after transactions, and OpenSea charges a much lower platform fee compared to the previous crypto bull run in 2020. Minting fees on OpenSea are also significantly cheaper, around 0.0001 ETH per transaction.
I also consulted with Thai NFT artist communities and the ex-chairman of the Thai Digital Asset Association. According to them, no one had reported similar issues, but they agreed it seemed like a scam.
After confirming my suspicions with my own research and consulting with the Thai crypto community, I decided to test the scammers’ intentions by doing the following
I minted the artwork they were interested in, set the price they offered, and listed it for sale on OpenSea. I then messaged them, letting them know the art was available and ready to purchase, with no royalty fees if they wanted to resell it.
They became upset and angry, insisting I mint the art on their chosen platform, claiming they had already funded their wallet to support me. When I asked for proof of their wallet address and transactions, they couldn't provide any evidence that they had enough funds.
Here’s what I want to warn all artists in the DeviantArt community or other platforms If you find yourself in a similar situation, be aware that scammers may be targeting you.
My Perspective why I Believe This is a Scam and What the Scammers Gain
From my experience with BTC and crypto since 2017, here's why I believe this situation is a scam, and what the scammers aim to achieve
First, looking at OpenSea, the largest NFT marketplace on the ERC20 network, they do not hold users' funds. Instead, funds from transactions go directly to users’ wallets. OpenSea’s platform fees are also much lower now compared to the crypto bull run in 2020. This alone raises suspicion about the legitimacy of other marketplaces requiring significantly higher fees.
I believe the scammers' tactic is to lure artists into paying these exorbitant minting fees, which go directly into the scammers' wallets. They convince the artists by promising to purchase the art at a higher price, making it seem like there's no risk involved. In reality, the artist has already lost by paying the minting fee, and no purchase is ever made.
In the world of Bitcoin (BTC), the principle is "Trust no one" and “Trustless finality of transactions” In other words, transactions are secure and final without needing trust in a third party.
In the world of Ethereum (ETH), the philosophy is "Code is law" where everything is governed by smart contracts deployed on the blockchain. These contracts are transparent, and even basic code can be read and understood. Promises made by people don’t override what the code says.
I also discuss this issue with art communities. Some people have strongly expressed to me that they want nothing to do with crypto as part of their art process. I completely respect that stance.
However, I believe it's wise to keep your eyes open, have some skin in the game, and not fall into scammers’ traps. Understanding the basics of crypto and NFTs can help protect you from these kinds of schemes.
If you found this article helpful, please share it with your fellow artists.
Until next time Take care
Note
- Both cyber security images are mine , I created and approved by AdobeStock to put on sale
- I'm working very hard to bring all my digital arts into Nostr to build my Sats business here to my another npub "HikariHarmony" npub1exdtszhpw3ep643p9z8pahkw8zw00xa9pesf0u4txyyfqvthwapqwh48sw
Link to my full gallery - Anime girl fanarts : HikariHarmony - HikariHarmony on Nostr - General art : KeshikiRakuen
-
@ bf47c19e:c3d2573b
2025-01-08 15:51:21Originalni tekst na trzisnoresenje.blogspot.com
15.12.2023 / Autor: Slaviša Tasić
Ovako sam pisao u aprilu kad je Bitcoin vredeo $50-100 dolara:
"Koja je budućnost Bitcoina? Većina mu predviđa propast, ali već smo videli da ima neprijatelje sa obeju strana i obe imaju svoje razloge. ... Ali ekonomski gledano, sada kad je Bitcoin došao dovde, meni se čini da može još mnogo rasti."
...
"Zato mislim da ekonomski Bitcoin više nema problem. Sa ovako ograničenom ponudom, a uz održanje sadašnje tražnje ili njen rast, njegove vrednost može i još mnogo da poraste."
U međuvremenu je otišao na preko $1,000. Ali mislite da sam kupio neki Bitcoin? Nisam, teško je baviti se takvim sitnicama kad morate da pišete blog.
Evo šta sada mislim o Bitcoinu.
Najvažnije je razumeti zašto Bitcoin uopšte ima vrednost. To što ima neku vrednost i nije tako iznenađujuće. Valute su istorijski spontano nastajale najčešće od nečega što ima istinsku vrednost, bronze, srebra ili zlata. Ali nije neviđeno ni da novac bez intristične vrednosti bude široko prihvaćen. Poznat je slučaj ostrva kamenog novca, gde je novac bilo kamenje, neka vrsta krečnjaka (vidi sliku ispod). Stanovnici jednog polinezijskog ostrva su koristili ovaj kamen kao novac zbog samo jedne osobine -- zato što nije postojao na ostrvu. Da biste nabavili takvo kamenje morali ste ići na drugo ostrvo, što je bilo skupo i naporno. I to je jedina osobina koja je krečnjak činila novcem, nisu ga koristili ni za šta drugo.
Štaviše, da ne bi kotrljali kamenje pri svakoj kupovini, trgovali su samo pravima na odrđeni kamen, a da se kamen uopšte nije morao pomeriti s mesta. To je suštinski isto kao današnje elektronsko bankarstvo, ali to je druga priča.
Bitcoin je nešto najbliže tome. Kad se uspostavi konvencija, onda novac ne mora imati imanentnu vrednost. Konvencija je, iz garantovanu retkost dovoljan uslov da nešto uspe kao novac. Kao i krečnjak na tom ostrvu, Bitcoin je suštinski bezvredan, ali 1) ne može se naći lako (ima retkost) i 2) postoji konvencija da se prihvata kao novac -- prihvatate ga jer znate da će ga i drugi prihvatiti.
Ali koliko je Bitcoin zaista redak? Sam Bitcoin jeste, jer mu je ponuda programski ograničena. Ali sada vidimo uspon drugih kripto valuta -- Litecoin, Peercoin, i drugi. Bitcoin je redak, ali svako može da napravi nešto jako slično bitcoinu i zvati ga drugačije. To se uveliko i dešava, za sada bez efekta na vrednost Bitcoina.
Za sada Bitcoin ima rastuću snagu konvencije, ili ekonomskim rečnikom, za njega radi efekat mreže. Efekat mreže postoji kada svaki dodatni korisnik povećava vrednost dobra -- vi koristite tastaturu sa početnim slovima QWERTY zato što svi drugi koriste istu tastaturu pa je glupo da počinjete nešto drugo; otvorili ste Facebook nalog ne zato što je Facebook tehnološki najbolje urađen nego zato što svi drugi imaju Facebook pa se tako nalkaše povezujete; nemate Google Plus jer niko drugi nema Google Plus što ga čini beskorisnim, i tako dalje. Uspostavljene mreže je jako teško srušiti, one se perpetuiraju i rastu na principu začaranog kruga.
Kad se jednom uspostave, mreže kao Facebook ili Bitcoin imaju ugrađenu prednost i teško ih je srušiti. Ali znate li ko je još imao efekat mreže u svoju korist? Imao je Windows i imao je MySpace. Windows se još drži ali nije ni blizu moći od pre desetak godina, a MySpace je potpuno propao -- a ljudi su 2008. MySpaceu predviđali večni monopol zbog efekta mreže. Poenta je, efekat mreže je prednost ali nikome ne garantuje monopol, pa čak ni opstanak.
Situacija sa Bitcoinom je ovakva. Sa pojavom drugih valuta retkost je izgubio. Nije bitno što nema Bitcoina, Bitcoin je samo ime. Ima ili može biti neograničeno mnogo kriptovaluta istog tipa i to je ono što je važno. Konvenciju odnosno efekat mreže Bitcoin još uvek ima, štaviše tu je i dalje u usponu. Ali to mu ne garantuje dugoročni uspeh. Kad se ta dva saberu, mislim da Bitcoin nema dobrih dugoročnih izgleda. Da sam onda u aprilu kupio Bitcoine, sada bih prodao.
-
@ bf47c19e:c3d2573b
2025-01-08 15:23:03Originalni tekst na trzisnoresenje.blogspot.com
03.04.2013 / Autor: Slaviša Tasić
Posle kiparske epizode naglo je došlo do rasta njegove vrednosti. Bitcoin je virtuelna valuta koju ne kontroliše niko. Umesto toga, emitovanje Bitcoina ograničeno je komplikovanim programom. Kao i kod zlata, svako može da iskopa novčiće, ali kopanje je naporno i neizvesno -- jedina je razlika što se posao ne obavlja fizički već kompjuterski. Program je postavljen tako da količina iskopanih Bitcoina raste po stalno opadajućoj stopi, dok se na kraju, za nekih stotinak godina, asimptotski ne približi konačnom nivou.
Za bliže objašnjenje Bitcoina i više o tekućim dešavanima pročešljajte Nedeljni komentar, a meni ceo fenomen postaje vrlo interesantan iz nekoliko razloga.
Prvo, Bitcoin ima mnogo neprijatelja. Neprijatelji su pristalice državnog novca, jer je ovo privatni, decentralizovani novac, čije štampanje ne kontrolišu stručnjaci za monetarnu politiku već se obavlja po automatskom programu. Tokovi novca se teško kontrolišu i neke centralne banke su već "izrazile zabrinutost" zbog rastuće uloge ove valute.
Ali, neprijatelji su i libertarijanski ekonomisti kojima je bliži zlatni standard. U njihovu viziju se ne uklapa to što Bitcoin očigledno nema pravu materijalnu vrednost. Bitcoin je nešto kao privatni fiat novac -- dosada neviđeni fenomen. Po njima tako nešto ne može da postoji i zato mu od samog početka predviđaju propast, ali ih bar za ovih par godina njegovog postojanja stvarnost demantuje.
Dalje, nastanak i dosadašnji uspeh Bitcoina se kosi sa bilo kojom postojećom teorijom i štaviše, za njegov uspeh gotovo da uopšte nema racionalnog objašnjenja. Najveća tajna slobodne razmene, bilo da je to tržište ili drugi oblici slobodne i dobrovoljne saradnje, je to što iz neorganizovane akcije slobodnih pojedinaca može doći do ishoda kojima se ne možemo unapred nadati, koji prevazilaze našu moć imaginacije i koje čak i ex post teško možemo racionalno objasniti. (To je Hayekova najvažnija ideja, a ne njegov libertarijanizam po sebi).
Bitcoin je izgledao a i dalje većini ekonomista i medija izgleda nemoguće, jer iako je njegova ponuda ograničena programom, tražnja za njim je stvar pukog verovanja. Kod zlata i srebra, tražnja postoji jer ti metali imaju i stvarnu vrednost. Kod državnog novca, tražnja postoji jer vam država kaže da morate da koristite taj novac, ali i svojim autoritetom garantuje da će svi ostali prihvatati taj novac. Kod Bitcoina vam niko ne garantuje ništa. Kako je to počelo da se koristi, kako su ljudi, posebno oni u početku, prihvatali da prodaju stvari za Bitcoine, ili da razmenjuju svoje evre i dolare za Bitcoine, meni uopšte nije jasno. Sada je lakše, valuta je donekle uspostavljena, više je prodavaca koji je prihvataju, znate da ima dovoljno onih koji je koriste i zato ima nekih osnova za verovanje da će se to nastaviti. Ali da je tako nešto moglo da počne, da nastane ni iz čega, je gotovo neshvatljivo.
Koja je budućnost Bitcoina? Većina mu predviđa propast, ali već smo videli da ima neprijatelje sa obeju strana i obe imaju svoje razloge. Propast je pre svega moguća usled državne intervencije. Možda će tako nešto jednostavno biti zabranjeno i proganjano. Kad je američka Komisija za hartije od vrednosti mogla da ugasi jako korisnu onlajn kladionicu Intrade (čije smo kvote na razne događaje u svetu ovde često linkovali), navodno iz razloga finansijske sigurnosti, onda je vrlo moguće da i Bitcoin dođe na red.
Ali ekonomski gledano, sada kad je Bitcoin došao dovde, meni se čini da može još mnogo rasti. Tačno je da tražnja za njim počiva na cikličnom verovanju, na verovanju svakog korisnika da će svi drugi nastaviti da primaju Bitcoin, ali: prvo, već nas je jednom iznanadilo da je Bitcoin samo na osnovu tog verovanja došao od nule do današnjih preko 100$ za Bitcoin. Drugo, ne zaboravite da ni ostale valute nisu baš toliko drugačije. Tražnja za državnim novcen se, bez obzira na državne garancije, dobrim delom zasniva na istoj slobodnoj veri da će i drugi prihvatati taj novac. Zlato ima materijalnu vrednost, ali ta vrednost, za industrijsku upotrebu ili nakit, je obično dosta manja od njegove sadašnje cene. Nisu se u poslenjih nekoliko godina industrijska upotreba i atraktivnost zlatnog nakita promenili, već su se promenila očekivanja vrednosti zlata, koja takođe zavise od vaše pretpostavke da će i ostali nastaviti da kupuju i drže zlato.
Zato mislim da ekonomski Bitcoin više nema problem. Sa ovako ograničenom ponudom, a uz održanje sadašnje tražnje ili njen rast, njegove vrednost može i još mnogo da poraste. Mnogo realniji scenario raspada je panika posle najave država da će zabraniti njegovu upotrebu uz neki izgovor kao što su finansijska stabilnost ili sprečavanje pranja novca. Ali čak i ako se to dogodi ostaće fascinantno da je ovakva inicijativa uopšte uspela -- protivno zakonima slabašne ljudske logike.
-
@ 2f4550b0:95f20096
2025-01-08 15:11:46Leadership is rarely a smooth ride. For every moment of success, there are setbacks and challenges that test even the most seasoned leaders. The key to sustained success isn’t avoiding difficulties but rather how effectively one can navigate through them. Resilience, the ability to bounce back from adversity, is not just a personal asset; it’s a leadership imperative.
I remember an experience earlier in my career that underscored the power of resilience in leadership. I was leading a team on a high-stakes project. We had invested countless hours, fine-tuned every detail, and had finally reached the presentation phase. Then, disaster struck: the technology we relied on for the demo failed at the last minute. The team’s morale plummeted. I saw the disappointment in their faces, and I could feel the weight of their expectations on me.
At that moment, I had a choice: I could either give in to frustration and let the team spiral, or I could model resilience and lead them through the crisis. I took a deep breath and reminded myself that setbacks are temporary and often lead to growth. We brainstormed solutions on the spot, restructured our approach, and within hours had a makeshift presentation that was just as impactful as our original plan. In the end, we delivered it successfully—and I learned one of the most valuable lessons in leadership: resilience doesn’t mean avoiding failure, but rather how we respond when things don’t go as planned.
This experience taught me that resilient leadership hinges on a few essential principles:
- Maintain a Positive Outlook: As a leader, your mindset directly influences your team. When faced with setbacks, staying calm and optimistic can help anchor the group. A positive perspective allows you to focus on solutions instead of dwelling on problems.
- Adapt and Problem-Solve: Resilience is about adaptability. Things don’t always go according to plan, and being able to quickly pivot and think creatively in the face of adversity is crucial. Resilient leaders encourage their teams to embrace change, adapt, and find alternative solutions.
- Support Your Team: Leaders cannot be resilient alone. Resilience thrives in a supportive environment. Offer your team encouragement, communicate openly, and make sure they know they have your support. By fostering a culture of mutual trust, you’ll enable everyone to recover and grow stronger together.
- Learn from Setbacks: Every challenge presents an opportunity to learn. Resilient leaders view failures as stepping stones to improvement. Reflecting on what went wrong and why, allows leaders and teams to strengthen their strategies moving forward.
In leadership, setbacks are inevitable. What sets great leaders apart is their ability to bounce back. With resilience, you can navigate through challenges with confidence and lead your team toward continued success.
-
@ e88a691e:27850411
2024-10-11 13:17:16An opinionated guide to Sauna.
Introduction
Updated from the Sauna, October 7th 2024
After years of experimenting with different sauna types, I’ve developed strong opinions on the subject. The purpose of this article is to share these opinions with anyone who is interested in them and, hopefully, help others get more out of their sauna experience.
I’m certain my opinions will offend some, including all the people who (in my view) are doing it wrong. I know that saunas are important to many cultures around the world and that my strongly held opinions may offend some of those cultures.
Mind you, although I grew up in South America, I do have a fair amount of slavic blood in me. When I was a child, my grandfather regularly took me with him to the shvitz. One of my fondest memories from this time was the “Scottish Bath”, which involves standing against the sauna wall, execution-style, so that someone can spray you with freezing water from a high pressure hose. I’ve never heard of this outside of South American and can’t attest to whether it has any real Scottish origins.
The various health claims about using a sauna are beyond the scope of this article. All I have to say is that, like many things in my life, like Bitcoin, the meat/keto diet, and fasting, I find sauna to be yet another cheat code to life: it’s a simple thing that just makes life a lot better. If you want a good primer on scientific health benefits of sauna, I recommend starting with this article by Rhonda Patric. She goes in depth.
To be clear, it should go without saying that I am not a medical expert or professional. None of the opinions below are, or should be interpreted as, medical advice. There are many people for whom sauna use is not recommended. It would be prudent for any sauna user to consult with his or her doctor before entering a sauna.
Thanks to S. for taking the time to do a very helpful first review of this article. And thanks to The Wife for helping make my words legible and helping me make time to sauna–I don’t know which sacrifice was bigger.
Banya or Nothing
When I talk about saunas, I’m talking about a sauna with a stove, either wood or electric, that allows for steam. I call this “Banya style”. To be clear, I’m distinguishing between saunas and steam baths. Steam baths have their own place, but they aren’t my thing and I don’t consider them saunas.
A breakdown of the main types of saunas may be helpful, so you know which to avoid:
- Wet saunas, which are typically cedar rooms with wood burning or electric stoves onto which you throw liquid to create steam (I call this “Banya style”);
- Dry saunas, which are typically cedar rooms with wood burning or electric stoves without added steam (like Korean style saunas); and
- Infrared saunas, which, unlike traditional saunas, don’t heat the surrounding air. Instead, they use infrared panels to warm your body directly.
In my opinion, it’s Banya style or nothing. I’m not a huge fan of dry saunas, and I don’t even bother with infrared saunas. Infrared is a fiat-shitcoin. I want steam!
How to Sauna
Sauna Etiquette
If you read no other part of this already-too-long-article, read this.
Saunas are social places. There are proper ways of being in a sauna with others, and there are ways to do it wrong. You don’t want to be the person who ruins it for everyone. Here are some important etiquette tips:
Silence vs. Chatting: It’s not a question of whether you have to stay silent in a sauna or if it’s ok to talk. It depends on the circumstances and who else is around. If you’re using a sauna that isn’t your own, ask the staff about the preferred custom. The noise level in a sauna differs depending on the group in the sauna at a particular time. If you do want to chat with others, there’s nothing wrong with that. But, pay attention to whether there are others in the sauna who'd prefer it quiet. And definitely do NOT be obnoxiously loud – yes, I’m looking at you bachelor(ette) group who just discovered the Russian Banya.
Coming and Going: People rotate in and out of the sauna at different paces, so there will be people coming and going during your shvitz. But there are ways to come and go that are considerate and proper.
Keep the f-ing door closed (which was the working title of this article). Once you leave, don’t come back inside moments later. Doing so disturbs your fellow sauna users, lets out the all-important steam, and prevents the sauna from reaching an appropriate temperature.
If you’re in the sauna with a group of friends, try to coordinate your comings and goings so you’re all on the same cycle.
If you can only last 5 min at a sauna, don’t go in too often at the risk of ruining it for others (assuming it’s not your own private sauna).
Be fast when closing the sauna door when you come or leave. Otherwise, you will get dirty looks from others and may even hear mumbles of “quick quick, fast fast” from a Gray Beard. And you will deserve it.
Never open the door right after someone puts water on the stove to make steam. It’s all about the steam. Don’t waste it.
Controlling the heat: if you can’t handle the heat in the sauna, don’t just turn the heat down, because it ruins it for others. Instead, go to a lower bench or get out and take your break. Saunas are meant to be hot. That’s the whole point.
Personal Hygiene: Shower before you go into the sauna. Don’t wear perfume, smelly deodorant, or fragrant lotions. Smells get amplified in a sauna. Have a towel under you, don't leave your drippings behind. Best yet, make a Z with your towel, this covers your butt and down under your feet.
Clothing: sauna is not a place for wearing clothing. It is a place to get back to nature. If you are shy, just wrap a towel around yourself. People ask if I don't feel awkward, the answer is no. Who cares, humans naked is not novel. In many countries, it is strictly forbidden to wear clothing or bring anything but a towel into the sauna. It's understandable that may not be possible in North American public saunas on mix gender "family" days. If you have to wear something, then wear something 100% cotton or marino wool. You don't want plastic being backed into your genitals. One more thing, leave the watch out as it gets hot and will burn you. Also, flip-flops/sandals, stay outside.
Some saunas sell body scrubs and masks for you to apply before or in the sauna. Note that once in the heat, these can get goopy and drippy and may melt into your eyes and mouth. So (in this opinionated guides’ wife’s opinion), they are better in theory than reality.
Adding Oils and scents: As discussed below, it can be nice to add certain oils and other scents to the steam. But if there are others in the sauna, ask first before you do.
Where and how to sit: Hot air rises. So, the higher benches are hotter and the lower benches are cooler. If you are a newbie, pick a lower bench so you don’t have to leave as quickly and open the door unnecessarily.
It’s great to lay down in the sauna, but if it gets crowded, sit up to make room for others.
When moving around to find your seat, don’t walk on the benches in your sandals. Leave your sandals outside the sauna or on the sauna floor.
Sauna Temperature
In most proper Russian style Banyas you will find temperatures of 80-95 degrees celsius, which, in my opinion, is the best range. Thats near your body. "Offical" on the dial will he 100-120C. But sometimes you want to take it a little easier or last a little longer in the sauna. In these cases, 65-85 at body, dial at 80-100. degrees celsius will do.
However, if your sauna is below 85 degrees celsius on the dial, you might as well just go hide under your bed sheets and not waste your time.
At some saunas in hotels, gyms, or spas, you may not be allowed to set the sauna as high as you’d like (see below). There are many tricks to circumvent these frustrating restrictions, but my legal counsel has advised me not to go into any details here.
Sauna Duration
The amount of time you spend in the sauna is a matter of personal preference and depends on the number of cycles you do (more on cycles, below).
For your first round, my opinion is that most people should try to last 15 minutes in the sauna. If a sauna is at the proper temperature, most people will struggle to stay inside any longer. If you can stay inside for 20-30 minutes, your sauna is probably too cold and/or there is not enough steam. Many saunas have hourglasses inside to keep time, and I’ve never seen a sauna hourglass with more than 15 minutes, which should be a good hint.
My preferred is;
Cold Plunge => Sauna 15 min => Cold Plunge => Hydrate with Salt & Water, Rest 5-10min => Sauna 15min => Cold Plunge => Hydrate with Salt & Water, Rest 5-10min => Sauna 15min => Cold Plunge => Hydrate with Salt & Water, Rest
if you can rest in the sun even better (no sunscreen poison please). You can add alcohol drinks to the hydration if you feel comfortable with that. But only add food after the last cycle.
For subsequent rounds, hydration starts to play a bigger role in how long you stay inside. Most people seem to last longer on their first round than on their second or third. If you can do 15 minutes on your second round, great. But 5-10 minutes is also fine.
Sauna Cycles
The traditional Russian Banya method (and in this writer’s opinion, the best method) is to do sauna cycles. Go into the sauna and just stay as long as you can take it (up to 15 minutes or so). Then take a cold shower and/or cold plunge (see below). Then robe-up and go relax with water, tea or beer. Once you start feeling “normal” again, repeat. For me, three cycles is the sweet spot. I’ll do more cycles if I’m spending the day at the Banya facility. If I’m at home, where I often sauna every other day, I find just one or two cycles does the trick. Sometimes I add a cycle or two on the weekend.
Occasionally, I like to go into the sauna as it’s warming up and before it reaches optimum heat (i.e. at around 60 degree celsius). This way, I can stay longer in the sauna for my first round (about 30-40 minutes). If I take this approach, I generally only do one more short round after my cold plunge.
Cold showers and plunges
In my experience, you want to take a cold shower or a cold plunge (or both, plunge is better) after the sauna cycle.After you come out of the sauna, immediately jump into cold plunge for a bit, i don't like to stay too long. Some Banya facilities will have a bucket filled with cold water that you can pull with a string to let the water pour over you, pull a couple times. The banyas may also have a cold pool of water into which you can plunge for a bit.
If I’m at my country place, after I get out of the sauna I jump into the cold lake. If it’s winter, I like to roll in the snow, which is satisfying. Some cultures would say that it’s not a real sauna experience unless you roll in at least one foot of snow.
After your cold shower or plunge, put on a warm robe and go relax before going back into the sauna. I like to relax for 5-20 minutes, depending on how much time I have. This allows the body’s temperature to decrease slowly. I do not recommend going directly back into the sauna after your cold plunge. If you don’t give yourself enough time after the cold plunge, you will overheat and won’t last very long when you return to the sauna.
Position
There really are no rules here. The way you position yourself in the sauna depends on your mood and preference, and there are many options. For example, you can sauna seated with your legs hanging down or with your knees up. You can lie down if there’s room. My favorite position is to lie down on my back with my legs up against the wall and, assuming the ceiling is low enough, with my feet stretched against the ceiling. This is a great way to stretch the hamstrings (check out stretching under “Sauna Activities”, below).
Choosing whether to sit on a higher bencher or lower bench is the best way to control the temperature you experience without adjusting the room temperature itself. You will notice the heat in the sauna increases exponentially every inch you go up. If you are struggling to stay in the sauna but don’t want to get out just yet, try moving down to a lower bench to last a little longer. Lying on the floor is the coolest spot and a great place for kids to start getting exposed to saunas.
There is no shame in going to lower benches or even the floor, there is only shame in opening the door before 15min
Getting Steamy
Without steam, the sauna would just be a sad, hot oven (I’m looking at you, infrared sauna).
The steam in the sauna has many benefits but most importantly it increases the thermal coupling of your body to the air and it feels great.
The amount of steam in the sauna is a matter of personal taste. You don’t want to make it into a steam room (remember, steam rooms are NOT saunas). But, you do want the sauna to be very moist. I find that two to four ladles of water in a mid-size sauna every five to seven minutes does the trick. Keep it between 50-60% humidity.
I keep a bucket of water in the sauna at all times so that I can continue to ladle water as I shvitz. Make sure to get a wood bucket and a metal ladle with a wooden handle. Wood ladles will crack, and if the handle is metal, it’ll burn you when you grab it.
If, when you enter the sauna, it’s already been on for a while, the wood is likely to already be wet and the sauna full of steam, so you may not need to add too much water. However, if you’ve just turned on the sauna and the wood walls are dry, you will need to ladle more water to make the air moist enough. If the sauna is too moist for comfort, open the door and let it dry out a bit (obviously, only do this in a private sauna).
Essential oils and even beer can all be added to the water to create scented steam. I recommend starting your sauna with just water, and add the scent as you get going.
You can try all sorts of different essential oils. I’ve tried everything from oak and cedar to tangerine and cinnamon (gag) essential oil. In the end, there are really only two oils that are worth it, in my opinion. The first is eucalyptus. I’ve experimented with different types of eucalyptus oil, and the variety you use makes a difference. My favorite is eucalyptus globulus. I also like diluted pine tar oil.
When you settle on your essential oil, add a healthy dose of the oil to the ladle filled with water. Never put the oil onto the oven directly. It’ll just burn.
In a few Russian facilities, I’ve seen Gray Beards pour Russian beer onto the oven and it was actually quite nice. It’s almost like being in a cozy bakery while you sweat
Some people like to place a salt brick or compressed solid blocks in their sauna from time to time. Put the salt block on the stove and pour water over it. The steam takes on a saltiness that feels nice. If a salt block is not available, you can get a cast iron teapot, fill it up with salt water, and place it on top of the stove.
And for my most important steam tip, I recommend using the “towel spin”. This is an effective and underrated technique to help circulate steam in the sauna. After creating steam, take your towel above your head and spin it around hard, like a ceiling fan. This movement works like a convection oven and spreads and equalizes the heat and steam throughout the room. It might make the folks sitting lower down in the sauna a little hotter, but that's what they’re there for, isn’t it?
Hydration
Being hydrated is important to having a positive sauna experience. You will lose a lot of your body’s water in the sauna. Ideally, start to hydrate well up to an hour before your sauna. I like to add a pinch of salt to my water to encourage water retention.
Do not bring any drinks into the sauna (the exception being a dedicated steam-beer, see above). Have your water or beverage when you’re outside the sauna, resting. If you find you need to drink water inside the sauna in order to cool yourself down, then it’s time for you to get out and allow your body a cool-down.
When you’re outside the sauna, don’t immediately down a glass of super cold water because you will cool down your internal body too fast. Personally, I like to drink warm tea after my first two cycles. After my second cycle, I enjoy a beer (pre-keto days), soup, or vodka drink. When non-keto, I do enjoy adult drinks in the cycles.
If you are doing a sauna while on a multi-day fast, you need to have water and salt, at a minimum. Otherwise, you will deplete your natural reserve of electrolytes and not be able to think straight.
Sauna Frequency
When it comes to frequency, if you are not in the equatorial heat do it every day. I now do mornings and end of day if I can. so 2x 2-3x cycles. In the summer, living in a hot & humid location, I sauna a lot less frequently. My desire to sauna is greatly diminished because I spend a lot of time in the sun and heat.
What to wear
Sauna Hat: I highly recommend wearing a Russian/Finish style wool hat when you’re inside the sauna. It may seem counterintuitive, but wearing a hat keeps your head cooler. An overheated head is not good for your brain. Wearing the hat stops you from overheating and lets you stay longer in the sauna. The temperature in a sauna is significantly hotter the higher in the room you are, and one’s head is at the top of the body (for most people). So protect your brain in style with a felt sauna hat. If you don’t have a felt sauna hat, buy one. They are easily found online. But in the meantime, you can wrap a dry towel around your head. Don’t forget to take your sauna hat off as you relax between cycles so your head can cool down.
Clothing: These days, many public saunas will have family days, men-only days, and women-only days. For obvious reasons, you’re only allowed to sauna naked if you’re attending one of the single-sex days.
If you’re at home, there’s no good reason to wear shorts or a bathing suit. Sauna naked. It's a lot more pleasant.
If you do wear clothing in the sauna, be careful with items with materials like metal or plastic attached. Things like pins, buttons, or string-ends will get very hot and probably burn you. Remember to take off any heat-conductive jewelry and leave your smart watch outside, as the heat will ruin its battery.
Don’t wear your robe inside the sauna. A robe is what you wear outside when relaxing or eating. If you wear it inside, you’ll overheat (and look like an idiot). Go ahead and sweat out that body shame robe-free. You can bring a towel into the sauna to sit on, if you want.
Shoes or sandals are highly recommended in public facilities. I mean, there are many people walking around wet. Ew. But keep your sandals outside the sauna itself, or on the sauna floor.
Sauna activities.
Don’t overthink it. Sitting in a sauna is activity enough, in my opinion. But there are some sauna activities you can do:
Veniks/Viht beating: these are bundles of leaves (commonly birch, oak, or eucalyptus) that are pre-soaked in hot water. Someone with both strength and capacity to exert themselves in the heat will beat your whole body with the leaves. This exfoliates your skin and also gets the plant oils to permeate your skin. And it’s very relaxing. If you’re at a sauna facility, don’t just grab any bundle you see lying around - that belongs to someone else and veniks aren’t shared. You have to bring your own or buy them at the front desk.
Stretching: this is a great activity to do in the sauna, but make sure to go very easy. Your muscles will be super warm and you don’t want to overdo it and hurt yourself.
Exercise or Sex: your heart better be in good shape if you try out these high intensity activities in the sauna. If you engage in the latter, you better be in your own home sauna. With respect to the former, I think doing some leg-ups can be very satisfying.
Phone use: If you’re at home, it’s nice to use your sauna time to shit-post on Twitter or read an article, if you feel like it. Just keep your phone close to the colder, lower parts near the floor or it’ll overheat and shut down. You can also place the phone outside of the air vent and play a podcast! The Bitcoin.review is great ;)
Napping: I don’t recommend this. If you fall asleep or pass out, you will probably die due to overheating or dehydration.
Chatting: Saunas are great places for conversations (subject to the caveats I address above). Note that nowadays, microphone modules are both very tiny and can withstand high temperatures, so it’s no longer recommended to reenact mafia movie sauna scenes.
Eating and Drinking: As discussed above, never have food or drink inside the sauna. But when you finish your sauna, take advantage of whatever snacks the facility offers. For Russian joints, the soups, fish roe and dry salty fish snacks are great. Again, don’t eat before your sauna; wait until you’re done. Some places will have bottled salty-ish lake water, and beer seems to be a good source of salts and re-hydration. Vodka drinks are nice sometimes, too. My favorites are vodka with beet juice and horseradish, vodka with pickle juice, or just a chilled shot of Zubrowka (vodka infused with bison grass). Teas are also very enjoyable post-sauna. I prefer non-caffeinated berry teas. Some Banyas even offer free tea to patrons.
Ready to Sweat It Out?
Thanks to this fantastic guide to sauna, you’re now feeling confident and excited to seek out a solid sauna. So where do you go?
Where to Find a Sauna
Spas: Spas are not the best place to have an optimal sauna experience. Saunas at spas are typically not hot enough and spas have annoying staff whose job it is to enforce idiotic rules and practices that prevent you from having a real sauna experience.
Gyms & Hotels: These are some of the worst places to sauna. For liability reasons, these saunas tend to be too cold and there are often mechanisms that prevent you from raising the temperature. Here, you’ll often see saunas with glass doors, which may look chic, but are inefficient and stupid because they don’t seal properly and leak steam. Gyms and hotels are high traffic areas, so people who don’t know what they are doing are constantly coming and going from the sauna, which, as we discussed, is a sauna no-no. If you still want to try the sauna at your gym or hotel, I recommend going in naked. It’ll deter people from joining you and ruining the little steam you managed to get going.
Traditional bath houses (Banyas): These usually offer a great experience because they deliver a super hot sauna, good cold baths and plunges, delicious food and drinks, and knowledgeable staff.
Home: Yes, you can build a great sauna in your own home! You can create a small space in your basement, turn a closet or cold room into a sauna, or just add an outdoor hut or barrel sauna in your backyard. This is the best way for you to control the whole experience and do it often. As with anything, the easier it is to access, the more you will do it.
Build it. They will Come
Many people have asked me for details about sauna building. If you’re ready to build your own personal home sauna, here are some important considerations.
Materials
Saunas are insulated rooms, most commonly finished with cedar tung and groove slats. Cedar is used because it doesn’t rot with moisture. You don’t want treated wood as it will release all the bad stuff that keeps the wood from rotting into the air when heated. Cedar interior is often placed over a vapor barrier, followed by insulation and then the outer wall. Many outdoor saunas are not insulated. They simply have a single layer of cedar 2x6 planks functioning as both the interior and exterior. Non-insulated saunas need much more heating power in the winter.
Structure
For indoor saunas, you may want to find a bricklayer to build something for you. Traditional facilities often have brick-lined rooms and very large wood-burning stoves.
You can buy prefab outdoor saunas, which are often sheds or barrels. After experimenting with both, I’ve concluded that barrel saunas are inferior, even though that’s what I have at my country property. This is because barrels have concave ceilings and inner walls. This means the benches are lower and the curve makes the topmost part of the ceiling (and the hottest part) the furthest from you, or inaccessible. The spinning towel trick really helps in the barrel.
When it comes to buying a sauna, go with the most traditional structure possible. They are based on thousands of years of evolution and knowledge.
Portable tent saunas are fun, but impractical because you have to set them up before each use.
Bench height inside the sauna is important. I think the top-most bench should be very near the ceiling. This way, when you’re lying down, you can use the ceiling to stretch the hamstrings. As a rule of thumb, bench length should allow you to lie down completely. It is also nice to have at least one lower bench for visitors or less intense sauna days.
Sauna Ovens
There are two main types of sauna ovens: wood burning and electrical (with gas heating being available, but not common). If the location you are building allows for it, go with electrical. It’s practical and easy to get going quickly. This means you will use it more often. Wood burning saunas are romantic and smell great, but it is a lot more work to get a fire going, especially in the winter.
Opt for oven sizes that are recommended or above recommended for the size of the sauna. A larger oven means more thermic inertia, more rocks for steam, and therefore less time to warm up the room. Bigger is better. The Scandinavians make the best quality ovens.
Oven controllers
There are two types of temperature control devices: the analog cooking-style or the digital type. I think, due to liability and safety, all ovens have a timer that max out at one hour.
The digital oven controllers are fantastic and I have one in the city in my basement sauna.
However, you have to consider your environment. For me, temperatures in the winter can reach below -30C and in the summer, over 40C. This massive range can take a toll on outdoor equipment and materials. For this reason, I opted for an analog controller for my outdoor sauna in the country, since the weather will likely ruin the electronics of the digital controller.
I would avoid ovens with analog pre-heat timers. They are great in theory, but the implementation is utter garbage. The timer won’t be precise and it’ll just lead to frustration, for example, when you thought you set the oven to start in three hours, but it actually started in two hours and already turned off.
Important Sauna Gear
Windows are nice to have, especially if you have a view to enjoy. Opt for at least a cedar door with a little window. Do not go with modern glass door styles. They are crap. They have gaps, no insulation, and let in too much light.
Saunas need thermometers and hygrometers (to measure humidity). The thermometers should be rated for saunas and be visible inside. This is both for safety and bragging rights.
I think having an hourglass inside your sauna is a must. Being able to know for sure how long you’ve been inside is important, since your sense of timing inside the sauna may be off depending on the state of your mind and body on a given day. You shouldn’t wear a watch inside the sauna, since it’ll overheat or break. Having a clock visible from the inside is also a good idea, especially if you sauna often and have a wife and kids who you don’t want to leave you.
Air circulation is an often-overlooked but important part of a sauna design. Saunas should not have stale air. The best sauna design creates natural “real convection” by placing an air intake under the oven wall and another at the top opposite wall. This allows fresh air to enter the sauna while in use. Be sure to add regulators, since you don’t want to cool the sauna or expel all steam. Without regulators you may get too much or too little air in. With too much air, you may cool the sauna down too much and/or lose too much steam.
Nice Things to Have
Lights are optional but welcome additions. It can be unpleasant to have no lighting at all, especially in an outdoor sauna on a cold, dark night. Lights should be warm-temperature and low power. I recommend an oven light, since they don’t sweat the heat (get it?) and are often low power.
Put a baking tray under your oven–thank me later.
Wood “pillows” for your head are nice and don’t get sweat-stained and stinky, like a fabric pillow.
Keep some extra felt hats near your sauna so when you or your guests forget their hat, you still have easy access to one.
I like to keep a couple of essential oils on the floor of the sauna, for easy access. If you keep the oils too high in the sauna, they’ll get too hot and spoil.
I place some duck boards over floor tiles in the sauna to prevent cold feet.
I also like to keep a small, natural broom inside the sauna to sweep up any dirt or leaves that come into the sauna on people’s feet.
Final words
As you can tell, I have some strong opinions when it comes to the proper way to enjoy a sauna. My hope is that my musings will help you to maximize your own sauna experience.. If you follow this guide, I’m certain you will benefit from and enjoy the sauna as much as I do and, just maybe, you too will develop your own strongly held opinions that will most definitely offend me.
Thanks for reading, please close the F-ing door.
ps, you can get a Bitcoin Honey Badger Sauna Hat here
- EOF
-
@ 8d34bd24:414be32b
2025-01-08 14:34:15I’ve known that there are references to Jesus in the Old Testament. They just don’t use the name Jesus.
Then God said, “Let Us make man in Our image, according to Our likeness; and let them rule over the fish of the sea and over the birds of the sky and over the cattle and over all the earth, and over every creeping thing that creeps on the earth.” (Genesis 1:26) {emphasis mine}
Notice the references to God in the plural. These are clues to the trinitarian (3 persons in one God) nature of God.
There are also examples of theophanies (preincarnate Jesus) in the Old Testament. These theophanies are frequently referred to as “the angel of the Lord” or “the angel of God.”
But the angel of the Lord called to him from heaven and said, “Abraham, Abraham!” And he said, “Here I am.” He said, “Do not stretch out your hand against the lad, and do nothing to him; for now I know that you fear God, since you have not withheld your son, your only son, from Me.” (Genesis 22:11-12) {emphasis mine}
In this case we know that the “angel of the Lord” is not just an angel because he says, “I know that you fear God, since you have not withheld your son, your only son, from Me,” equating Himself, “Me,” with God. In most cases when an angel appears, the people drop face down in worship, but the angel corrects them and tells them not to worship. When the angel is Jesus, He accepts the worship and in many cases sacrifices as well.
The angel of the Lord appeared to him and said to him, “The Lord is with you, O valiant warrior.” Then Gideon said to him, “O my lord, if the Lord is with us, why then has all this happened to us? … So Gideon said to Him, “If now I have found favor in Your sight, then show me a sign that it is You who speak with me. Please do not depart from here, until I come back to You, and bring out my offering and lay it before You.” And He said, “I will remain until you return.”
Then Gideon went in and prepared a young goat and unleavened bread from an ephah of flour; he put the meat in a basket and the broth in a pot, and brought them out to him under the oak and presented them. The angel of God said to him, “Take the meat and the unleavened bread and lay them on this rock, and pour out the broth.” And he did so. Then the angel of the Lord put out the end of the staff that was in his hand and touched the meat and the unleavened bread; and fire sprang up from the rock and consumed the meat and the unleavened bread. Then the angel of the Lord vanished from his sight. When Gideon saw that he was the angel of the Lord, he said, “Alas, O Lord God! For now I have seen the angel of the Lord face to face.” (Judges 6:12=13a, 17-22) {emphasis mine}
As you can see, Gideon offered an offering. An offering to anyone other than God would be idolatry. Gideon offers a “a young goat and unleavened bread from an ephah of flour,” which is a proper sin offering to God. The angel did not eat the offering, but told Gideon to “Take the meat and the unleavened bread and lay them on this rock … Then the angel of the Lord put out the end of the staff that was in his hand and touched the meat and the unleavened bread; and fire sprang up from the rock and consumed the meat and the unleavened bread. Then the angel of the Lord vanished from his sight.” Gideon’s offering was taken as a burnt offering to God and to angel of the Lord, who is Jesus.
With all of this, look at the verse I read last night:
Who has ascended into heaven and descended?\ Who has gathered the wind in His fists?\ Who has wrapped the waters in His garment?\ Who has established all the ends of the earth?\ What is His name or His son’s name?\ Surely you know! (Proverbs 30:4) {emphasis mine}
Surely this is a passage about Jesus.
This verse says, “Who has ascended into heaven and descended?” The New Testament says about Jesus, “No one has ascended into heaven, but He who descended from heaven: the Son of Man.” (John 3:13)
This verse says, “Who has gathered the wind in His fists?” The New Testament says about Jesus,
And there arose a fierce gale of wind, and the waves were breaking over the boat so much that the boat was already filling up. Jesus Himself was in the stern, asleep on the cushion; and they woke Him and said to Him, “Teacher, do You not care that we are perishing?” And He got up and rebuked the wind and said to the sea, “Hush, be still.” And the wind died down and it became perfectly calm. (Mark 4:37-39) {emphasis mine}
This verse says, “Who has wrapped the waters in His garment?” The New Testament says about Jesus,
And in the fourth watch of the night He came to them, walking on the sea. When the disciples saw Him walking on the sea, they were terrified, and said, “It is a ghost!” And they cried out in fear. But immediately Jesus spoke to them, saying, “Take courage, it is I; do not be afraid.”
Peter said to Him, “Lord, if it is You, command me to come to You on the water.” And He said, “Come!” And Peter got out of the boat, and walked on the water and came toward Jesus. (Matthew 14:25-29) {emphasis mine}
This verse says, “Who has established all the ends of the earth?” The New Testament says about Jesus,
In the beginning was the Word, and the Word was with God, and the Word was God. He was in the beginning with God. All things came into being through Him, and apart from Him nothing came into being that has come into being. (John 1:1-3) {emphasis mine}
This verse says, “What is His name or His son’s name?” The New Testament says about Jesus,
After being baptized, Jesus came up immediately from the water; and behold, the heavens were opened, and he saw the Spirit of God descending as a dove and lighting on Him, and behold, a voice out of the heavens said, “This is My beloved Son, in whom I am well-pleased. (Matthew 3:16-17) {emphasis mine}
This verse says, “Surely you know!” As New Testament believers we know the Son of God, Jesus Christ. The Bible was pointing to the Son of God long before He came to earth as a baby.
Who has ascended into heaven and descended?\ Who has gathered the wind in His fists?\ Who has wrapped the waters in His garment?\ Who has established all the ends of the earth?\ What is His name or His son’s name?\ Surely you know! (Proverbs 30:4) {emphasis mine}
It doesn’t matter how many times we have already read the Bible. Every time we read it, we can discover new insight and knowledge of God, His eternal plans, and His commands for our lives. God is good.
Trust Jesus.
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ e6817453:b0ac3c39
2024-10-06 11:21:27Hey folks, today we're diving into an exciting and emerging topic: personal artificial intelligence (PAI) and its connection to sovereignty, privacy, and ethics. With the rapid advancements in AI, there's a growing interest in the development of personal AI agents that can work on behalf of the user, acting autonomously and providing tailored services. However, as with any new technology, there are several critical factors that shape the future of PAI. Today, we'll explore three key pillars: privacy and ownership, explainability, and bias.
1. Privacy and Ownership: Foundations of Personal AI
At the heart of personal AI, much like self-sovereign identity (SSI), is the concept of ownership. For personal AI to be truly effective and valuable, users must own not only their data but also the computational power that drives these systems. This autonomy is essential for creating systems that respect the user's privacy and operate independently of large corporations.
In this context, privacy is more than just a feature—it's a fundamental right. Users should feel safe discussing sensitive topics with their AI, knowing that their data won’t be repurposed or misused by big tech companies. This level of control and data ownership ensures that users remain the sole beneficiaries of their information and computational resources, making privacy one of the core pillars of PAI.
2. Bias and Fairness: The Ethical Dilemma of LLMs
Most of today’s AI systems, including personal AI, rely heavily on large language models (LLMs). These models are trained on vast datasets that represent snapshots of the internet, but this introduces a critical ethical challenge: bias. The datasets used for training LLMs can be full of biases, misinformation, and viewpoints that may not align with a user’s personal values.
This leads to one of the major issues in AI ethics for personal AI—how do we ensure fairness and minimize bias in these systems? The training data that LLMs use can introduce perspectives that are not only unrepresentative but potentially harmful or unfair. As users of personal AI, we need systems that are free from such biases and can be tailored to our individual needs and ethical frameworks.
Unfortunately, training models that are truly unbiased and fair requires vast computational resources and significant investment. While large tech companies have the financial means to develop and train these models, individual users or smaller organizations typically do not. This limitation means that users often have to rely on pre-trained models, which may not fully align with their personal ethics or preferences. While fine-tuning models with personalized datasets can help, it's not a perfect solution, and bias remains a significant challenge.
3. Explainability: The Need for Transparency
One of the most frustrating aspects of modern AI is the lack of explainability. Many LLMs operate as "black boxes," meaning that while they provide answers or make decisions, it's often unclear how they arrived at those conclusions. For personal AI to be effective and trustworthy, it must be transparent. Users need to understand how the AI processes information, what data it relies on, and the reasoning behind its conclusions.
Explainability becomes even more critical when AI is used for complex decision-making, especially in areas that impact other people. If an AI is making recommendations, judgments, or decisions, it’s crucial for users to be able to trace the reasoning process behind those actions. Without this transparency, users may end up relying on AI systems that provide flawed or biased outcomes, potentially causing harm.
This lack of transparency is a major hurdle for personal AI development. Current LLMs, as mentioned earlier, are often opaque, making it difficult for users to trust their outputs fully. The explainability of AI systems will need to be improved significantly to ensure that personal AI can be trusted for important tasks.
Addressing the Ethical Landscape of Personal AI
As personal AI systems evolve, they will increasingly shape the ethical landscape of AI. We’ve already touched on the three core pillars—privacy and ownership, bias and fairness, and explainability. But there's more to consider, especially when looking at the broader implications of personal AI development.
Most current AI models, particularly those from big tech companies like Facebook, Google, or OpenAI, are closed systems. This means they are aligned with the goals and ethical frameworks of those companies, which may not always serve the best interests of individual users. Open models, such as Meta's LLaMA, offer more flexibility and control, allowing users to customize and refine the AI to better meet their personal needs. However, the challenge remains in training these models without significant financial and technical resources.
There’s also the temptation to use uncensored models that aren’t aligned with the values of large corporations, as they provide more freedom and flexibility. But in reality, models that are entirely unfiltered may introduce harmful or unethical content. It’s often better to work with aligned models that have had some of the more problematic biases removed, even if this limits some aspects of the system’s freedom.
The future of personal AI will undoubtedly involve a deeper exploration of these ethical questions. As AI becomes more integrated into our daily lives, the need for privacy, fairness, and transparency will only grow. And while we may not yet be able to train personal AI models from scratch, we can continue to shape and refine these systems through curated datasets and ongoing development.
Conclusion
In conclusion, personal AI represents an exciting new frontier, but one that must be navigated with care. Privacy, ownership, bias, and explainability are all essential pillars that will define the future of these systems. As we continue to develop personal AI, we must remain vigilant about the ethical challenges they pose, ensuring that they serve the best interests of users while remaining transparent, fair, and aligned with individual values.
If you have any thoughts or questions on this topic, feel free to reach out—I’d love to continue the conversation!
-
@ c11cf5f8:4928464d
2025-01-08 14:31:14Here we are again with our monthly Magnificent Seven, the summary giving you a hit of what you missed in the ~AGORA territory.
Top-Performing Ads
This month, the most engaging ones are:
00
[SELL] STACKER NEWS Merch: T-Shirts & Cap [32100 sats + shipping] by me :)01
Beeswax Dinner Candles For Sale by @kr02
I'd Buy ~bitcoin Territory At The Right Price by @0xbitcoiner03
Bitcoin Watches by @jakoyoh62904
SN merch live on amazon by @stack_harder05
A couple programming bounties payable in BTC (Javascript/Typescript, C++) by @springfield_data_recovery06
[SELL] Accepting SATs ~ Genuine Authentic SHAQ (Shaquille O'Neal) Autograph by @watchmancbiz07
PlebBook 📖 - (Update: Jan 2025 - Earn Sats in AGORA) by @PlebLab08
HereComes Bitcoin SATSCARD™ - Summer of Bitcoin by @Design_r09
[OFFER] 12K sats for any item in The Bullish Shop (BOLT12 only) by @thebullishbitcoiner10
Bitcoin Shirt on Walmart 👀 by @96dffdc39e
Cowboys Credits Buyers
Yes, this Jan 3rd CCs have been deployed, a unique SN feature that enable everyone to play around and upvote/reward interesting contents and stackers. Has been an interesting number of stackers enetring the market and setting the rate
- @siggy47 Will Pay Sats For Cowboy Credits https://stacker.news/items/837713/r/AG Make him an offer. His territories rent are due.
- @ek [BUY] 100 cowboy credits for one satoshi https://stacker.news/items/837469/r/AG Sender must pay the 30% sybil fee, so the sender has to pay 100/0.7=142 CCs to get 1 sat
- @Darth first ever CCs offer, and always with his third eye looking at the future, want too [SWAP] SN Cowboy credits https://stacker.news/items/723069/r/AG PS: posted in October 2024
Professional Services accepting Bitcoin
I
https://stacker.news/items/813013/r/AG @gpvansat's [OFFER][Graphic Design]
From the paste editions (It's important to keep these offers available) *
II
https://stacker.news/items/775383/r/AG @TinstrMedia - Color Grading (Styling) Your Pictures as a Service *III
https://stacker.news/items/773557/r/AG @MamaHodl, MATHS TUTOR 50K SATS/hour English global *IV
https://stacker.news/items/684163/r/AG @BTCLNAT's OFFER HEALTH COUNSELING [21 SAT/ consultation *V
https://stacker.news/items/689268/r/AG @mathswithtess [SELL] MATHS TUTOR ONLINE, 90k sats per hour. Global but English only.In case you missed
Here some interesting post, opening conversations and free speech about markets and business on the bitcoin circular economy:
- Buy Kratum With Bitcoin https://stacker.news/items/806578/r/AG by @siggy47
- How Is Shipping Handled? https://stacker.news/items/832303/r/AG by @siggy47
- Building a List of 'Buy It For Life' Products https://stacker.news/items/809655/r/AG by @kr
- Sender must pay the 30% sybil fee, so the sender has to pay 100/0.7=142 CCs to get 1 sat https://stacker.news/items/811292/r/AG by @Fabs
- How to (Ethically) Get Rid of Your Unwanted Stuff https://stacker.news/items/829228/r/AG by @mo
- The Calgary Sat Market - A driven community of Bitcoiners, making magic together https://stacker.news/items/811666/r/AG by @supratic
- ɅGOᏒɅ 🏜️ First Year Recap: A Thriving 2024 for Stacker News P2P Marketplace https://stacker.news/items/821255/r/AG by @AGORA
🏷️ Spending Sunday is back!
Share your most recent Bitcoin purchases of just check what other stackers are buying with their sats! Read more https://stacker.news/items/837629/r/AG
Just a reminder for you all
This territory aims to connect stackers and curious buyers for IRL P2P Bitcoin deals. Have fun checking what else stackers are shilling globally in the ~AGORA. This is a great time for you to make some space un-dusting some stuff that has been sitting there for too long and get some sats for it!
Create your Ads now!
Looking to start something new? Hit one of the links below to free your mind:
- 💬 TOPIC for conversation,
- [⚖️ SELL] anything! or,
- if you're looking for something, hit the [🛒 BUY]!
- [🧑💻 HIRE] any bitcoiner skill or stuff from bitcoiners
- [🖇 OFFER] any product or service and stack more sats
- [🧑⚖️ AUCTION] to let stackers decide a fair price for your item
- [🤝 SWAP] if you're looking to exchange anything with anything else
- [🆓 FREE] your space, make a gift!
- [⭐ REVIEW] any bitcoin product or LN service you recently bought or subscribed to
Or contact @AGORA team on nostr DM and we can help you publish a personalized post.
.
#nostr
#stuff4sats
#sell
#buy
#plebchain
#grownostr
#asknostr
originally posted at https://stacker.news/items/842103
-
@ 2063cd79:57bd1320
2025-01-08 14:26:43Unit-Bias
Bitcoin hat in der öffentlichen Wahrnehmung und bei Menschen, die sich weniger mit dem Thema befassen, einen sogenannten Unit-Bias, also eine durch Unwissenheit hervorgerufene Voreingenommenheit gegenüber der Einheit "Bitcoin". Das bedeutet, dass viele unerfahrene Anleger//innen und Nutzer//innen der Meinung sind, dass der Besitz eines ganzen bitcoins psychologisch wichtig oder überhaupt nur als solcher möglich ist. Anders ausgedrückt, glauben viele Menschen, sie müssen Bitcoin als Ganzes kaufen, also einen ganzen "physischen" bitcoin, statt kleinerer Bruchstücke. Das lässt den Vermögenswert für die meisten zu teuer aussehen.
Dies ist für Bitcoin insofern ein Problem, als dass viele Menschen sich durch ihre Voreingenommenheit gar nicht mit Bitcoin beschäftigen ("kann ich mir nicht leisten") oder das Gefühl haben, Bitcoin sei zu teuer und deshalb gibt es kein Wertsteigerungspotential mehr ("der Zug ist abgefahren, ich hätte vor sechs Jahren investieren sollen"). Schlimmer noch, als sich nicht mit Bitcoin zu beschäftigen, ist sich dann stattdessen alternativen, "erschwinglicheren" Kryptowährungen zuzuwenden. Dieser Unit-Bias ist allerdings nichts anderes als ein Marketing-, bzw. ein Bildungsproblem. Denn wie wir wissen kann man Bitcoin in 100 Millionen Untereinheiten brechen und in kleinsten Mengen erwerben, verschicken und verkaufen. Doch haben Außenstehende von Begriffen wie Lightning oder Sats meistens noch nie gehört.
Untereinheiten
Doch auch innerhalb der Bitcoin-Szene ist die Unterteilung von Bitcoin in Untereinheiten nicht ganz unumstritten. Denn viele Nutzer//innen sind sich uneinig darüber, was der beste Weg ist, Bitcoins Untereinheiten zu bezeichnen und sogar darzustellen. Dies zeigt sich z.B. darin, dass Apps oft entweder Bitcoin oder Fiat anzeigen, manche Apps aber auch Beträge in Sats darstellen. Dies verlangt aber oft eigene Einstellungen innerhalb der App oder viele Klicks, die die Bedienung und Darstellung eher unhandlich gestalten.
Es gibt verschiedene Lösungsansätze, die dem/der Nutzer//in die ungewohnte Rechnung mit acht Nachkommastellen erleichtern sollen. Denn viele Anwender//innen denken beim Blick in ihre Wallets oft noch in lokalen Fiat-Werten, also in ganzen Einheiten (z.B. Euro oder Dollar) und Hundertsteln (z.B. Cents).
Einige Wallets versuchen diesen Spagat komplett zu umgehen, indem sie vermeiden, Beträge in Fiat darzustellen. Doch auch hier bleibt immer noch das Problem der unhandlichen Darstellung von acht Nachkommastellen, weshalb einige Anbieter einfach zwei Eingabemöglichkeiten bieten und den Betrag in Bitcoin oder Sats automatisch umrechnen.
Doch selbst das Zeichen für Sats ist nicht final geklärt. Es gibt viele verschiedene Vorschläge und Meinungen dazu, welches Symbol genutzt werden sollte. Die meisten Apps, Rechnungen und Sticker schreiben einfach das Wort "Sats" oder "sats" aus. Allerdings ist dies ein Problem, da außerhalb der Bitcoin-Szene niemand weiß, was ein Sat ist. Die meisten Menschen werden mittlerweile von Bitcoin gehört haben, auch wenn sie nicht wissen, wie es funktioniert, was es bedeutet, oder wie man damit umgeht. Doch auch das B Logo mit den Dollarstrichen (₿) werden die meisten Menschen zuordnen können.
Sats hingegen ist ein sehr nischiger Begriff und seine Verwendung noch unbekannter. Oft wird das Blitzsymbol (3 auf der unteren Grafik) verwendet, um Lightning darzustellen und auch das Symbol mit den drei horizontalen Strichen und zwei vertikalen Punkten (4 auf der unteren Grafik), das entfernt an das Dollar-Zeichen erinnern soll ($), erfreut sich immer größerer Beliebtheit. Das Problem dabei ist nur, dass es sich in geschriebener Form nicht, oder nur unzulänglich darstellen lässt: 丰 🤡
Es war lange logisch und notwendig, ganze Bitcoins zur Aufzählung und Bezahlung zu verwenden, da bei der Einführung von Bitcoin sein Geldwert sehr gering war. Es bestand also absolut keine Notwendigkeit dazu, in kleineren Einheiten als Bitcoin zu denken. Einfaches Beispiel: letzte Woche, am 22. Mai, jährte sich der Bitcoin-Pizza-Day zum 13. Mal, also jener Tag an dem Laszlo Hanyecz für zwei Pizza 10.000 bitcoins bezahlte und damit die erste offline Transaktion mit Bitcoin tätigte. 10.000 bitcoins entsprachen zu diesem Zeitpunkt also knapp $40, oder andersrum $1 entsprach 250 bitcoins Es gab also immer noch keine Notwendigkeit, kleinere Einheiten von Bitcoin zu verwenden. Diese Notwendigkeit ergab sich erst, als der Bitcoin und der Dollar Parität erlangten (1 Bitcoin = $1) und spätestens, als Bitcoin die Marke von $100 durchbrach, wurde rechnen in Bitcoin schwieriger.
Fortan überlegte man sich, Bitcoin in kleineren Einheiten darzustellen. Die zwei Möglichkeiten sind der Bit und der Sat. Ein einzelner bitcoin kann in 1.000.000 Bits oder bis zu 100.000.000 Sats unterteilt werden, also 100 Sats = 1 Bit = 0,000001 Bitcoin.
Ein weiterer Grund, weshalb eine Stückelung in bitcoin (der Begriff für einen ganzen physischen bitcoin) schwierig und verwirrend ist, und deshalb viele nach einer alternativen Bezeichnung für Untereinheiten suchten, ist dass darüber hinaus "Bitcoin" zur Beschreibung von zwei Dingen verwendet werden kann: dem monetären Netzwerk (Bitcoin - großes B) und dem monetären Vermögenswert (bitcoin - kleines B).
Bitcoin, der Vermögenswert, ist für diejenigen, die noch nichts damit zu tun hatten, sowohl verwirrend als auch fremd. Denn wie bereits erwähnt, führt der Unit-Bias dazu, dass viele Menschen denken, dass sie es sich nicht leisten können, Bitcoin zu kaufen, oder dass sie den Anschluss verpasst haben. Die Verwendung einer Bepreisung in Bruchteilen würde die Verwirrung über die Benennung des Netzwerks und des Vermögenswerts verringern, aber auch die psychologische Hürde für den Einstieg in Bitcoin senken. Vorausgesetzt, die Benennung ist logisch und intuitiv.
Bits vs. Sats
Wie schon erwähnt, gibt es zwei gängige Untereinheiten von Bitcoin, 1 Bit (= 0,000001 Bitcoin) und 1 Sat (0,00000001 Bitcoin). Seit jeher gibt es Diskussionen darüber, welche der beiden Einheiten für den täglichen Gebrauch die vernünftigere und intuitivere ist.
Die Verwendung von Bits zur Aufzählung von Bitcoin hat einige Vorteile. Ein Bit stellt ein „Bit“ eines Bitcoins dar, also der grundlegendsten und kleinsten Informationseinheit in der Informatik. Den meisten Menschen fällt es einfacher, das Wort „Bit“ mit Bitcoin zu assoziieren und daher verstehen sie eher, dass ein Bit ein Teil eines Bitcoins ist. Ein „Sat“ bedeutet für den Durchschnittsmenschen, wie oben beschrieben, nichts.
Adam Back (CEO von Blockstream und Bitcoin-Legende) ist wahrscheinlich der bekannteste Befürworter von Bits > Sats. Er argumentiert von verschiedenen Richtungen, dass z.B. Bits eine rechnerisch einfachere Variante ist, Untereinheiten von Bitcoin darzustellen, als Sats.
Weiter argumentiert er mit der historischen Entwicklung von Bitcoin, dem Protokoll und seiner Referenz-Implementierung. In den Anfangsjahren wurde in der Bitcoin Core Wallet mit Bits gearbeitet. Außerdem argumentiert er, dass die Verbindung zwischen Bitcoin der Haupteinheit und Bits oder Sats als Untereinheit zumindest semantisch gebrochen werden sollte. Da Bitcoin (im Fall eines weiter steigenden Kurses) als Recheneinheit immer unpraktischer wird, sollte man als mentales Modell auf das Rechenpaar Bits und Sats zurückgreifen - analog zur Darstellung von Dollars und Cents oder Euros und Cents. Dabei stellen die zwei Nachkommastellen eines in Bits angegebenen Preises die Sats dar.
Ganz einfaches Beispiel: Ein Kasten Bier kostet heute etwas 20€, also 0,00079758 Bitcoin. Einfacher dargestellt: 797,58 Bits, also 797 Bits und 58 Sats. “Ein Bitcoin ist zu teuer, aber Sats sind zu viele, klingen billig und verwirrend.” Es ist schwer in Sats zu denken und selbst wenn der Preis von Bitcoin 1 M US Dollar erreicht, ist ein Bit immer noch eine greifbare und günstige Einheit: 1 Bit = 1 US Dollar.
Eines von Adams Hauptargumenten ist, dass Sat als Untereinheit nicht funktioniert, weil es Dust gibt. Das Problem mit Dust besteht darin, dass es nicht möglich ist, Bitcoin unter einem bestimmten Schwellenwert auszugeben. Sein Argument ist, dass der Nutzen einer Einheit abhanden kommt, wenn diese Einheit als kleinste Recheneinheit nicht ausgegeben werden kann. Zugegeben, niemand kann mehr etwas für einen Cent kaufen, aber zumindest ist es technisch nicht unmöglich. Allerdings ist es unmöglich, 1 oder sogar 10 Sats über das Bitcoin-Netzwerk zu senden, ohne Layer-2-Skalierungstechnologien zu verwenden.
Dust
Unter Bitcoin-Dust versteht man eine sehr kleine Menge Bitcoin, typischerweise in kleinen ein- bis zweistelligen Sats-Beträgen, doch auch kommen immer öfter dreistellige Beträge vor. Sie werden Dust oder „Staub“ genannt, weil diese Beträge so gering sind, dass sie oft als unbedeutend und unpraktisch für die Verwendung bei regulären Transaktionen angesehen werden.
Es gibt keine offizielle Definition dafür wie groß/klein ein Betrag sein muss, um als Dust zu gelten, da jede Softwareimplementierung (Client, Wallet, etc.) einen anderen Schwellenwert annehmen kann. Die Bitcoin Core Referenzimplementierung definiert Dust als jede Transaktionsausgabe, die niedriger ist als die aktuellen Transaktionsgebühren.
Dust entsteht meist unbeabsichtigt bei Bitcoin-Transaktionen. Denn wenn Bitcoin von einer Adresse an eine andere gesendet wird, fällt oft eine Transaktionsgebühr an. Um Spam zu verhindern und die Sicherheit des Netzwerks zu gewährleisten, gibt es bei Bitcoin eine Mindestgröße für jede Transaktion. Dieses Limit ist der Mindestbetrag an Bitcoin, der als Ausgabe in eine Transaktion einbezogen werden kann. Der Rest ist Dust.
Oder einfacher ausgedrückt, wenn die Mindestgröße für eine Bitcoin-On-Chain-Transaktion 500 Sats (5 Bits) beträgt und ich noch 800 Sats (8 Bits) in meiner Wallet habe, kann ich nach dem Versenden von 600 Sats (6 Bits) die übrigen 200 Sats (2 Bits) nicht mehr ausgeben. Diese verbleibenden 2 Bits sind Dust.
Dust stellt aus mehreren Gründen eine Herausforderung für das Bitcoin-Netzwerk und seine Benutzer//innen dar:
UTXO-Bloat: Bei jeder Transaktion werden nicht ausgegebene Transaktionsausgaben (UTXOs) erstellt, und Dust erhöht die Anzahl der UTXOs im System. Dies kann zu einer aufgeblähten Blockchain führen und sich negativ auf die Leistung und Skalierbarkeit des Netzwerks auswirken.
Wallet-Management: Im Laufe der Zeit kann sich in Wallets viel Dust ansammeln, und die Verwaltung solch kleiner Beträge kann für Benutzer//innen unpraktisch sein. Bei vielen Wallets ist ein Mindestguthaben erforderlich, und die Dust-Mengen sind möglicherweise zu gering, um diese Anforderung zu erfüllen. Viele Nutzer//innen wechseln häufig zwischen Wallets und transferirien ihre Vermögen vorher auf die neuen Wallets, bei solchen Wechseln bleiben Dust-Beträge zurück und gelten langfristig als verloren.
Ein weiteres Problem besteht darin, dass Dust nicht genau definiert werden kann. Die Transaktionsgebühren hängen wesentlich von zwei Faktoren ab: Den Gebühren in sat/vB, welche von der Auslastung des Mempools abhängen und zu Zeiten von hoher Auslastung dementsprechend hoch sind, und zum anderen vom UTXO-Set des/der jeweiligen Nutzer//in. Denn wie wir wissen, werden Transaktionen aus einer oder mehreren UTXOs zusammengesetzt, je mehr UTXOs dabei benötigt werden, um den gewünschten Betrag zu versenden, desto höher sind die Kosten für diese Transaktion, da sich das Gewicht (in vBytes) erhöht. Diese beiden Faktoren können die Gebühren in Einzelfällen so strukturieren, dass größere Mengen Dust anfallen, als in anderen Fällen.
Datenschutzbedenken: Da jede Transaktion in der Blockchain gespeichert wird, können selbst winzige Mengen Dust mit der Identität oder dem Transaktionsverlauf einer Person verknüpft werden, was die Privatsphäre gefährdet. Diese Funktion wird von Angreifern in sogenannten Dust-Attacks ausgenutzt. Denn böswillige Angreifer haben schnell erkannt, dass Nutzer//innen die winzigen Dust-Beträge, die in ihren Wallet-Adressen angezeigt werden, nicht viel Aufmerksamkeit schenken oder gar bemerken. Angreifer schicken also Kleinstbeträge an eine große Anzahl von Adressen, um dann im nächsten Schritt in einer kombinierten Analyse dieser Adressen und der Beträge, versuchen herauszufinden, welche Adressen zur gleichen Wallet gehören. Dabei ist es das Ziel, diese so identifizierbaren Adressen und Wallets schließlich den jeweiligen Eigentümer//innen zuzuordnen, um diese dann durch ausgefeilte Phishing-Angriffe oder Cyber-Erpressungen zu attackieren.
Um diese Probleme zu lösen, können Nutzer//innen Dust konsolidieren, indem sie mehrere Dust-UTXOs in einer einzigen Transaktion mit einem höheren Wert kombinieren. Einige Wallets und Dienste bieten Funktionen an, mit denen Benutzer//innen ihren Dust effektiv verwalten und konsolidieren können.
Abschließende Gedanken
Der Unit-Bias ist absolut vorhanden. Ich persönlich begegne ihm immer wieder in Gesprächen mit Bitcoin-Interessierten, die sich mit der Materie noch nicht lange auseinandergesetzt haben. Die Verwunderung ist oft sehr groß, dass bitcoins nicht als Ganzes gekauft werden müssen. Die Verwendung einer Untereinheit sowohl in Wallets, als auch bei der Bepreisung kann dabei helfen.
An die Verwendung von Sats als die kleinste Einheit von Bitcoin habe ich mich gewöhnt, allerdings tendiere ich mittlerweile persönlich zum Gebrauch von Bits. Die hervorgebrachten Argumente leuchten mir ein und ich bin überzeugt, dass Bits eine größere Akzeptanz außerhalb des Bitcoin-Inner-Circles hervorrufen können, als Sats. Darüber hinaus ist das Sats-Zeichen wirklich unpraktisch.
Ich befürworte hier einige Ideen, die das Paragrafzeichen zum Symbol für Sats erheben wollen.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ e6817453:b0ac3c39
2024-09-30 14:52:23In the modern world of AI, managing vast amounts of data while keeping it relevant and accessible is a significant challenge, mainly when dealing with large language models (LLMs) and vector databases. One approach that has gained prominence in recent years is integrating vector search with metadata, especially in retrieval-augmented generation (RAG) pipelines. Vector search and metadata enable faster and more accurate data retrieval. However, the process of pre- and post-search filtering results plays a crucial role in ensuring data relevance.
The Vector Search and Metadata Challenge
In a typical vector search, you create embeddings from chunks of text, such as a PDF document. These embeddings allow the system to search for similar items and retrieve them based on relevance. The challenge, however, arises when you need to combine vector search results with structured metadata. For example, you may have timestamped text-based content and want to retrieve the most relevant content within a specific date range. This is where metadata becomes critical in refining search results.
Unfortunately, most vector databases treat metadata as a secondary feature, isolating it from the primary vector search process. As a result, handling queries that combine vectors and metadata can become a challenge, particularly when the search needs to account for a dynamic range of filters, such as dates or other structured data.
LibSQL and vector search metadata
LibSQL is a more general-purpose SQLite-based database that adds vector capabilities to regular data. Vectors are presented as blob columns of regular tables. It makes vector embeddings and metadata a first-class citizen that naturally builds deep integration of these data points.
create table if not exists conversation ( id varchar(36) primary key not null, startDate real, endDate real, summary text, vectorSummary F32_BLOB(512) );
It solves the challenge of metadata and vector search and eliminates impedance between vector data and regular structured data points in the same storage.
As you can see, you can access vector-like data and start date in the same query.
select c.id ,c.startDate, c.endDate, c.summary, vector_distance_cos(c.vectorSummary, vector(${vector})) distance from conversation where ${startDate ? `and c.startDate >= ${startDate.getTime()}` : ''} ${endDate ? `and c.endDate <= ${endDate.getTime()}` : ''} ${distance ? `and distance <= ${distance}` : ''} order by distance limit ${top};
vector_distance_cos calculated as distance allows us to make a primitive vector search that does a full scan and calculates distances on rows. We could optimize it with CTE and limit search and distance calculations to a much smaller subset of data.
This approach could be calculation intensive and fail on large amounts of data.
Libsql offers a way more effective vector search based on FlashDiskANN vector indexed.
vector_top_k('idx_conversation_vectorSummary', ${vector} , ${top}) i
vector_top_k is a table function that searches for the top of the newly created vector search index. As you can see, we could use only vector as a function parameter, and other columns could be used outside of the table function. So, to use a vector index together with different columns, we need to apply some strategies.
Now we get a classical problem of integration vector search results with metadata queries.
Post-Filtering: A Common Approach
The most widely adopted method in these pipelines is post-filtering. In this approach, the system first retrieves data based on vector similarities and then applies metadata filters. For example, imagine you’re conducting a vector search to retrieve conversations relevant to a specific question. Still, you also want to ensure these conversations occurred in the past week.
Post-filtering allows the system to retrieve the most relevant vector-based results and subsequently filter out any that don’t meet the metadata criteria, such as date range. This method is efficient when vector similarity is the primary factor driving the search, and metadata is only applied as a secondary filter.
const sqlQuery = ` select c.id ,c.startDate, c.endDate, c.summary, vector_distance_cos(c.vectorSummary, vector(${vector})) distance from vector_top_k('idx_conversation_vectorSummary', ${vector} , ${top}) i inner join conversation c on i.id = c.rowid where ${startDate ? `and c.startDate >= ${startDate.getTime()}` : ''} ${endDate ? `and c.endDate <= ${endDate.getTime()}` : ''} ${distance ? `and distance <= ${distance}` : ''} order by distance limit ${top};
However, there are some limitations. For example, the initial vector search may yield fewer results or omit some relevant data before applying the metadata filter. If the search window is narrow enough, this can lead to complete results.
One working strategy is to make the top value in vector_top_K much bigger. Be careful, though, as the function's default max number of results is around 200 rows.
Pre-Filtering: A More Complex Approach
Pre-filtering is a more intricate approach but can be more effective in some instances. In pre-filtering, metadata is used as the primary filter before vector search takes place. This means that only data that meets the metadata criteria is passed into the vector search process, limiting the scope of the search right from the beginning.
While this approach can significantly reduce the amount of irrelevant data in the final results, it comes with its own challenges. For example, pre-filtering requires a deeper understanding of the data structure and may necessitate denormalizing the data or creating separate pre-filtered tables. This can be resource-intensive and, in some cases, impractical for dynamic metadata like date ranges.
In certain use cases, pre-filtering might outperform post-filtering. For instance, when the metadata (e.g., specific date ranges) is the most important filter, pre-filtering ensures the search is conducted only on the most relevant data.
Pre-filtering with distance-based filtering
So, we are getting back to an old concept. We do prefiltering instead of using a vector index.
WITH FilteredDates AS ( SELECT c.id, c.startDate, c.endDate, c.summary, c.vectorSummary FROM YourTable c WHERE ${startDate ? `AND c.startDate >= ${startDate.getTime()}` : ''} ${endDate ? `AND c.endDate <= ${endDate.getTime()}` : ''} ), DistanceCalculation AS ( SELECT fd.id, fd.startDate, fd.endDate, fd.summary, fd.vectorSummary, vector_distance_cos(fd.vectorSummary, vector(${vector})) AS distance FROM FilteredDates fd ) SELECT dc.id, dc.startDate, dc.endDate, dc.summary, dc.distance FROM DistanceCalculation dc WHERE 1=1 ${distance ? `AND dc.distance <= ${distance}` : ''} ORDER BY dc.distance LIMIT ${top};
It makes sense if the filter produces small data and distance calculation happens on the smaller data set.
As a pro of this approach, you have full control over the data and get all results without omitting some typical values for extensive index searches.
Choosing Between Pre and Post-Filtering
Both pre-filtering and post-filtering have their advantages and disadvantages. Post-filtering is more accessible to implement, especially when vector similarity is the primary search factor, but it can lead to incomplete results. Pre-filtering, on the other hand, can yield more accurate results but requires more complex data handling and optimization.
In practice, many systems combine both strategies, depending on the query. For example, they might start with a broad pre-filtering based on metadata (like date ranges) and then apply a more targeted vector search with post-filtering to refine the results further.
Conclusion
Vector search with metadata filtering offers a powerful approach for handling large-scale data retrieval in LLMs and RAG pipelines. Whether you choose pre-filtering or post-filtering—or a combination of both—depends on your application's specific requirements. As vector databases continue to evolve, future innovations that combine these two approaches more seamlessly will help improve data relevance and retrieval efficiency further.
-
@ ed84ce10:cccf4c2a
2025-01-08 12:33:06Hackathon Summary
The YQuantum 2024 Hackathon concluded with significant participation and numerous project submissions, establishing itself as a vibrant platform for innovation. Out of 300 registrants, the on-site participants formed teams and worked on developing 28 BUIDLs, engaging in challenges across diverse tracks sponsored by prominent quantum computing organizations, such as QuEra Computing, IBM Quantum, Classiq, DoraHacks, SandboxAQ, and Capgemini/The Hartford/Quantinuum.
Participants developed groundbreaking solutions in quantum computing, driven by prize incentives, including quantum cloud credits, internships, networking opportunities, and potential speaking engagements. The grand prizes recognized exceptional projects, with the first place receiving $2000, presentation opportunities before Yale researchers, and participation in the Yale Innovation Summit.
The hackathon successfully fostered a collaborative environment that encouraged the exploration of cutting-edge technologies and ideas, advancing the quantum computing field. YQuantum 2024 underscored the potential of quantum technologies and promoted knowledge exchange among participants and sponsors.
Hackathon Winners
Held on April 13, 2024, YQuantum's inaugural event attracted 300 participants from 10 countries, featuring six industry-sponsored challenges that culminated in a series of prestigious awards.
Institute Grand Prizes Winners
-
1st Place: Quantum Consortium: Case-Duke-Lehigh-Vandy Nexus This project employs adiabatic methods to prepare antiferromagnetic energy eigenstates, with a focus on quantum many-body scarring and enhancing error correction in computing.
-
2nd Place: Sparse Quantum State Preparation The team developed efficient algorithms using Classiq APIs for sparse quantum state preparation, optimizing execution for scalability and efficiency in managing quantum data.
-
3rd Place: QuBruin This project optimizes algorithms using dynamic quantum circuits and enhances error correction. The team improved user accessibility through Qiskit-based models for better circuit performance under noise conditions.
IBM Quantum Prize Winners
- Modified IBM Challenge
This project delves into foundational linear algebra concepts, emphasizing core principles and mastery.
QuEra Computing Prize Winners
- 3D Quantum Scars on 2D Tweezer Arrays
The team investigates quantum scar states on a 3D lattice projected into 2D, using Julia and QuEra's Bloqade to simulate quantum dynamics.
Classiq Technologies Prize Winners
- YQuantum2024 Classiq Team 34 Wavefunction Wizards
Focusing on optimizing sparse quantum state preparation, this project enhances algorithmic efficiency in quantum data processing.
DoraHacks Prize Winners
- Spooner_QRNG_Classifier
The project employs Python scripts and a gradient booster classifier to predict quantum device origins of random binary data, surpassing baseline prediction accuracy.
Capgemini // Quantinuum // The Hartford Prize Winners
-
Skittlez
This partnership addresses quantum computing challenges through interdisciplinary expertise, designing innovative quantum solutions. -
Honorable Mention: BB24 - Yale Quantum Monte Carlo The project enhances Quantum Monte Carlo techniques via novel sampling and encoding schemes, improving parallel processing and computational efficiency.
SandboxAQ Prize Winners
-
QuantumQuails
This project improves solar cell efficiency through quantum chemistry, utilizing VQE to model solar energy absorption for enhanced conversion effectiveness. -
Honorable Mention: mRNA Sequence Design via Quantum Approximate Optimization Algorithm This project optimizes mRNA sequence design using QAOA, enhancing protein expression and structural stability through codon and nucleotide parameters.
Explore all projects at DoraHacks.
About the Organizer:
YQuantum
YQuantum is a prominent entity within the technology and blockchain sectors, recognized for its innovative approach and strategic initiatives. Specializing in utilizing quantum computing capabilities, YQuantum is committed to advancing the technological frontier. Though specific projects are not highlighted, YQuantum's role in shaping industry standards positions it as a leader in the field. Through dedication to cutting-edge research and development, YQuantum continues to drive progress in quantum technologies, aligning with its mission to propel scientific and technological advancements globally.
-
-
@ e373ca41:b82abcc5
2025-01-08 12:22:05“At Florence's. During the meal, Jouhandou told me that he had entered an antiquarian bookshop near the Place du Palais Bourbon, where a statue of an Indian god was first displayed for sale and then recognized as miraculous. The antiquarian took advantage of this – for example, she receives commission from stenotypists whose request for a lottery win was granted (...) I am not surprised by this; we will see miraculous things in this respect.”
(Ernst Jünger, 2nd Paris Diary, January 20, 1944)
“Everything that is imaginable is real,” Pablo Picasso knew. The artist translated the possibilities opened up by his consciousness into his formal language: he saw round female bodies and painted them as triangles and squares more beautifully than anyone before him; he recognized the head of a bull in an upturned bicycle saddle. To crystallize the reality of consciousness into images and artefacts, so that they appear even more real than reality, that is the power of art and spirit. At an exhibition of the war painting “Guernica”, a Wehrmacht soldier is said to have asked him: “Did you do that?” To which Picasso replied: “No, you did.”
"Consciousness determines being"
Picasso was in Paris, the place of longing for all artists, when Max Planck was awarded the Nobel Prize for quantum theory. Planck recognized the origin of all being in spirit, energy and consciousness:
“There is no matter, only a fabric of energies given form by intelligent spirit. This spirit is the origin of all matter.”
The discovery of the power of the mind is something that has come to us again and again in different guises in all eras of time – perhaps too often to listen, because from New Age to mindfulness meditation, most people have probably already heard this insight so much that they no longer pay any attention to it. We find these ideas in Descartes' “cogito ergo sum”, in Hegel's theory that “consciousness creates being” or in the ancient doctrine of Hermeticism, in which the first principle is that of mentalism: to recognize that all power comes from the mind and consciousness. Inflation leads to a loss of value here, too. Hardly any other idea has been profaned as much as the “power of thought”.
A simplified (for some: particularly profaned) theory is the popular “law of attraction”; there are bestselling books and countless videos about it with millions of views. Put simply, you should “wish for something intensely from the universe” and then it will come true. The “theory” exhausts itself in the eternal repetition of this principle and in the listing of alleged events that are supposed to support this. Admittedly, I found this rather off-putting, like a kitchen-sink psychological prop for people who don't want to invest any effort, but instead live in a wish-it-were-something conception of reality. Dreaming, in other words.
https://www.youtube.com/watch?v=5zvnFM2BXqY&t=1s
Or is there something to it? The American Helene Hadsell, also known as the “competition queen”, is said to have won every competition she took part in through intensive mental work. Even a house was among them. The idea of the expected event, for example the main prize in a competition, had to arise in her head in the form of a clearly outlined assumption, no doubts were allowed. Hadsell came up with her technique after reading a well-known guide to positive thinking (Vincent Peale, “The Power of Positive Thinking”).
Individual thoughts become a collective consciousness
Our collective reality is also determined by thoughts, and by all our thoughts equally. Will we achieve a bold vision? Or will we stick to the lowest common denominator of frightened narrow-minded thinking?
Let's not forget: the power of shared thoughts gives rise to new groupings and collectives with specific interests, which in turn bring about change. Every thought, every word has an energy value that cannot be measured by clicks, likes or similar. Where many thoughts with a high energy value come together, things tend to get brighter. In today's media world, it is thoughts more than ever that create reality. Never before have ideas, conveyed through the media, been able to merge so quickly with other ideas, exchange ideas and circumnavigate the world.
- The mind creates and models the world through language.
- These ideas are linked intersubjectively in media reality, becoming a kind of virtual network of thoughts that replicates or changes mimetically.
- Thoughts connect like-minded people, they network mental levels, give rise to communities, groupings and tribes.
In other words, we can each look at a mountain for ourselves, but it is our modeled mind that tells us what to see: a natural phenomenon; evidence of climate change because there is little snow; a natural element with magical energy; a tourist area; a hunting ground, a dangerous cairn? The power of thoughts comes with a price: individually, their power can be decisive for us, but collective thought patterns can also put our own thinking in the bag. But then again, a new thought can help.
Thoughts, what are they really? All just images in your head? Chimeras? We don't know any more than philosophers know what reality is or physicists know exactly what energy is.
- Perhaps thoughts are a combination of several elements: A condensation of energy that can co-determine reality, a kind of mental trail followed by materialized action. Thoughts: an energy trail that attracts other energies.
- Thoughts seem to have their own communication circuit, we see this in moments of “synchronicities”, when we have just been thinking about a person for months and they are already calling.
- We also see the power of thoughts in their chain reactions: If we open our minds to inexplicable phenomena (such as synchronicities), then they knock on our door more often. The same applies to magic: if you believe in magic, you suddenly encounter it everywhere. In other words: Those who believe in miracles are (more likely to) experience them. Regardless of whether you believe in the power of thought or not, you will always be proven right and find proof of your own thoughts (“confirmation bias”).
ADVERTISEMENT:
Looking for the easiest way to buy Bitcoin and store it yourself? The Relai app is the No. 1 crypto start-up and No. 2 of all fintech start-ups in Switzerland. Here you can buy Bitcoin in just a few steps and also set up savings plans. Nobody has access to your Bitcoin except you. With the referral code MILOSZ you save on fees (no financial advice). Disclaimer due to regulatory issues: The services of the Relai App are hereby only recommended to inhabitants of Switzerland or Italy.
Need more security? The Trezor wallets are recommended and easy to use, others are available in the store. Need more advice? Book an introductory meeting with a wallet expert.
Self-efficacy starts with authority over thoughts
The power of thought is something of an individual self-fulfilling prophecy. But let's look around us: wasn't everything that surrounds us that is man-made initially just a thought? We don't have to expect a material causal chain from pure thoughts, like magicians who can move a glass of water, but the material world would be inconceivable without the existence of thoughts, they are a sine qua non.
For me, intensive thought work is most likely a form of psychological self-programming: what I focus on today, no matter how daring, bold, megalomaniac or abstruse the thought may be, puts me on the track to realizing this thought, i.e. creates a magnetic force field that attracts precisely the encounters, events or constellations that are needed to realize the thoughts. Providence sends coincidences fleeing. Provided you are not blind to the signs that are then sent your way. Sometimes you have to (mentally) reach for the stars in order to land on the moon.
Many people may smile at New Year's resolutions. I think to myself: anyone who forgoes good resolutions is consciously forgoing the opportunity to set themselves on a new path or closer to a new goal. Why should you give up the power of thought and see yourself as a plaything of external energies and external events?
What bold goal have you set yourself for 2025? Write to me at: milosz@pareto.space
My goal for 2025: to consign the phenomenon of censorship to the graveyard of history once and for all! It was an idea 1.5 years ago, now it has already become a reality for the first authors with the Pareto project. Here, too, it started out as just an idea that resonated with the thoughts of others (including you!), who helped turn it into reality.
It's a kind of magic...right?
https://www.youtube.com/watch?v=0p_1QSUsbsM
This article by Milosz Matuschek first appeared in German on Freischwebende Intelligenz.
Join the marketplace of ideas! We are building a publishing ecosystem on Nostr for citizen-journalism, starting with a client for blogging and newsletter distribution. Sound money and sound information should finally be in the hands of the people, right? Want to learn more about the Pareto Project? Zap me, if you want to contribute (all Zaps go to the project).
Update:* Since my last article on the Pareto project, we have received more than 50 messages from publications, journalists, authors, testers and supporters. Thank you very much, we are happy to help everyone become censorship-resistant! May just take a little time. Are you a publication and want to be part of it, test us, migrate your content to Nostr? Write to team@pareto.space***
Not yet on Nostr and want the full experience? Easy onboarding via Nosta.me.
-
@ 9358c676:9f2912fc
2024-09-24 12:29:11OBJECTIVES
To establish a guideline for the management of Acute Community-Acquired Pneumonia (CAP) in our center, for both outpatient and hospitalized patients, with the aim of:
- Reducing morbidity and mortality associated with the condition.
- Improving the quality of medical care and optimizing hospital resources.
- Delaying the progression of antimicrobial resistance.
SCOPE
All patients over 16 years of age diagnosed with Acute Community-Acquired Pneumonia who are being followed by our institution in an outpatient or inpatient setting.
RESPONSIBILITIES
Physicians from the Medical Clinic, Medical Emergency, Coronary Unit, and Intensive Care Service. Nursing Coordination. Pharmacy Service. Infection Control Committee.
REFERENCES AND BIBLIOGRAPHY
- Community-Acquired Pneumonia in Adults. Recommendations for its management. Lopardo et al. MEDICINA (Buenos Aires) 2015; 75: 245-257. Argentine Society of Infectiology. ISSN 0025-7680
- Diagnosis and Treatment of Adults with Community-acquired Pneumonia. An Official Clinical Practice Guideline of the American Thoracic Society and Infectious Diseases Society of America. 2019. American Journal of Respiratory and Critical Care Medicine Volume 200 Number 7 | October 1, 2019. DOI: 10.1164 rccm.201908-1581ST
- ERS/ESICM/ESCMID/ALAT guidelines for the management of severe community-acquired pneumonia. Intensive Care Med (2023) 49:615–632 https://doi.org/10.1007/s00134-023-07033-8
- Antimicrobial resistance. WHO. https://www.who.int/news-room/fact-sheets/detail/antimicrobial resistance
- Internal Medicine. Farreras-Rosman. Volume I. Elsevier. 2008 Edition.
- Considerations for the Responsible Use of Antibiotics in COVID-19. Argentine Society of Infectiology. 2020. https://drive.google.com/file/d/1BmXD5x6rEpSqDIc8urccdqLcZKkP3U7X/view
- Penicillin Allergy. Castells M. New England Journal of Medicine, 381(24), 2338–2351. doi:10.1056 nejmra1807761
INTRODUCTION
Pneumonia is one of the leading causes of morbidity and mortality worldwide, affecting patients of all ages and with various risk factors. Proper management in both outpatient and hospital settings is crucial for improving clinical outcomes and reducing associated complications.
This document aims to standardize and optimize the treatment of pneumonia based on the most current evidence and recommendations from leading scientific organizations. It seeks to be a practical tool for healthcare professionals, providing a clear and concise approach to the diagnosis, treatment, and follow-up of patients with pneumonia.
FOUNDATIONS. HOSPITAL SITUATION ANALYSIS:
- Pneumonias represent a significant burden on the healthcare system due to their high prevalence and potential severity, underscoring the need for a standardized approach.
- A clinical guideline facilitates decision-making, ensuring that all healthcare professionals follow a uniform protocol that integrates best practices, thereby reducing variability in treatments. This allows for better resource utilization, optimizing antibiotic use and reducing the emergence of antimicrobial resistance.
- Antimicrobial resistance has been proposed by the World Health Organization (WHO) and related organizations as the leading cause of death and hospital expenditure by the year 2050.
- Pneumonias in our center, in their various presentations, have shown significant prevalence in hospitalizations according to measurements taken in 2024.
- In our center, antibiotics, as a whole, have been the main source of financial losses related to drugs during the billing cycle from June 2023 to July 2024.
EPIDEMIOLOGICAL SITUATION:
Pneumonias represent a global incidence of 1.26 cases per 1000 inhabitants. It has been documented in some centers that this incidence can increase in patients over 65 years of age, representing 34 cases per 1000 inhabitants. Outpatient mortality varies between 0.1% and 5%, but can reach up to 50% in hospitalized patients, especially those requiring Intensive Care Unit stay.
The main risk factors for developing pneumonia are:
- Chronic Heart Disease.
- Chronic Respiratory Disease.
- Chronic Kidney Disease.
- Advanced-stage HIV infection.
- Immunosuppressed. Solid Organ Transplant. Hematopoietic Stem Cell Transplantation.
- Diabetes mellitus.
- Neoplasms.
- Smoking.
- Chronic use of Corticosteroids or Proton Pump Inhibitors.
- Multiple Myeloma and Hypogammaglobulinemia.
- Anatomical or Functional Asplenia.
The main causative agents of acute community-acquired pneumonia in our setting are:
- Respiratory Viruses (Influenza, SARS-CoV2, RSV).
- Streptococcus pneumoniae.
- Haemophilus influenzae.
- Staphylococcus aureus.
- Mycoplasma pneumoniae and Chlamydophila pneumoniae.
It should be noted that Streptococcus pneumoniae shows a good sensitivity pattern to penicillin and continues to be the most frequent causative microorganism. Haemophilus influenzae only shows beta-lactamase production in 10% to 23% of cases. Staphylococcus aureus in our setting has a low incidence of methicillin resistance, although this possibility should be considered in certain situations and severe clinical presentations. Given these considerations, beta-lactams remain the first-line treatment.
Regarding Pseudomonas aeruginosa isolates, they will only be relevant in patients with risk factors such as bronchiectasis, cystic fibrosis, prior treatment with corticosteroids, or broad-spectrum antibiotics.
Emerging pathogens of some relevance include the eventual emergence of cases caused by Leptospira interrogans, Legionella pneumophila, and Hantavirus. These cases should always be associated with a specific epidemiological link.
DIAGNOSIS
The diagnosis of pneumonia is based on clinical and imaging criteria. For the diagnosis of Acute Community-Acquired Pneumonia, we will consider:
Symptoms and Clinical Signs (at least 1 of the following): * Fever. * Altered general condition. * Cough. * Sputum production. * Chest pain. * Dyspnea. * Hemoptysis.
plus
Radiopacity on Chest X-ray (Alveolar consolidation with or without air bronchogram, interstitial pattern, bronchiectasis, cavitation, pleural effusion, new radiopacity, etc.). It is always recommended to request both frontal and lateral views.
Chest CT remains a method with greater sensitivity and specificity for evaluating lung parenchyma compared to conventional X-ray in infectious pathology. However, a simple chest X-ray is an adequate method for the initial evaluation of the condition and its complications, which is why a CT scan is not recommended as an initial method for evaluating pneumonia and should always be preceded by a conventional chest X-ray.
CT studies should be considered in the following situations:
- Respiratory failure.
- Evaluation or suspicion of differential diagnoses to Acute Community-Acquired Pneumonia.
- Evaluation or suspicion of complications of Acute Community-Acquired Pneumonia.
- Evaluation of radiological patterns that are not entirely clear on the chest X-ray.
CHOICE OF CARE SITE AND TREATMENT
For the choice of care site and treatment of pneumonia, it is recommended to complement clinical criteria with validated mortality scores associated with risk factors and clinical status.
CURB-65 (1 point for each item): * Confusion * Elevated urea greater than 90 mg/dl * Respiratory rate greater than 30/minute * Systolic blood pressure < 90 mmHg or diastolic blood pressure < 60 mmHg * Age equal to or greater than 65 years
Results:
- Groups 0 to 1: Outpatient management.
- Groups 1-2: Admission to General Ward.
- Groups 3-5: Admission to Intensive Care Unit.
- Appendix: A pulse oximetry reading of less than 92% is recommended as an independent factor for inpatient management under expert recommendation to complement the score.
COMPLEMENTARY STUDIES AND CULTURE SAMPLING
Once the diagnosis is completed, the patient's risk stratification and the choice of admission site are made, the following complementary studies and culture sampling are recommended to proceed with the patient's study during treatment.
Outpatient patient: * Pulse Oximetry. * Laboratory routine (complete blood count, glucose, urea, creatinine, liver function tests).
Inpatient patient in general ward: * Pulse Oximetry. * Laboratory routine (complete blood count, glucose, urea, creatinine, liver function tests). Acid-base status if pulse oximetry is less than 92%. * Sputum sample (Gram stain, culture, antibiogram). * Blood cultures. * In the presence of pleural effusion: Thoracentesis. Physical-chemical study for Light's Criteria. Direct and Culture of Pleural Fluid.
Inpatient patient in intensive care unit: * Pulse Oximetry. * Laboratory routine (complete blood count, glucose, urea, creatinine, liver function tests) plus acid-base status. * Sputum sample (Gram stain, culture, antibiogram). Tracheal aspirate, Mini-BAL, or BAL sampling for patients requiring ARM upon admission. * Blood cultures. * Urinary antigen for detection of Streptococcus pneumoniae, if available in microbiology. * In the presence of pleural effusion: Thoracentesis. Physical-chemical study for Light's Criteria. Direct and Culture of Pleural Fluid.
Special considerations for Viral Pneumonias: * We recommend performing a viral panel for Influenza A/B for any pneumonia presenting at least 1 risk factor mentioned during periods of viral circulation in the community. * We recommend performing a viral panel for SARS-CoV2 for any pneumonia presenting at least 1 risk factor mentioned during periods of viral circulation in the community or having epidemiological criteria of a suspected COVID-19 case. * The Infection Control Committee will timely inform based on the National Epidemiological Bulletin about the presence of circulating respiratory viruses in our setting.
Special considerations for Atypical Pneumonias and HIV Testing: * We recommend serological testing for IgM/IgG for Chlamydia and Mycoplasma for any pneumonia presenting a subacute evolution at the time of clinical presentation or clinical-radiological dissociation in its presentation. * In the suspicion of pneumonia caused by emerging pathogens (Legionella pneumophila, Leptospira interrogans, Hantavirus), consider the necessary epidemiological link as a prior epidemiological background before requesting specific diagnostic tests. * HIV testing is recommended for all pneumonias, with special emphasis on those that do not present the conventional risk factors mentioned.
ANTIMICROBIAL TREATMENT AND DURATION OF TREATMENT:
Directed antimicrobial treatment will be based on the present risk factors and the choice of care site and treatment.
Outpatient patient <65 years and without risk factors:
First choice: * Amoxicillin 875mg/12h orally for 5-7 days.
Scheme for history of allergy to Beta-Lactams: * Clarithromycin 500mg/12h orally for 5 days or * Azithromycin 500-1000mg/day for 5 days.
Outpatient patient >65 years or with at least 1 risk factor:
First choice: * Amoxicillin-Clavulanate 1g/12h orally for 7 days.
Scheme for history of allergy to Beta-Lactams: * Clarithromycin 500mg/12h orally for 5 days or * Azithromycin 500-1000mg/day orally for 5 days.
Inpatient patient in General Ward <65 years and without risk factors:
First choice: * Ampicillin-Sulbactam 1.5g/6h IV +/- Clarithromycin 500mg/12h orally/IV for 5-7 days.
Scheme for history of allergy to Beta-Lactams: * Ceftriaxone 1g/day IV for 5-7 days.
Inpatient patient in General Ward >65 years or with at least 1 risk factor:
First choice: * Ampicillin-Sulbactam 1.5g/6h IV for 7 days +/- Clarithromycin 500mg/12h orally/IV for 5 days.
Scheme for history of allergy to Beta-Lactams: * Ceftriaxone 1g/day IV for 7 days.
Inpatient patient in Intensive Care Unit:
First choice: * Ampicillin-Sulbactam 1.5g/6h IV for 7 days +/- Clarithromycin 500mg/12h orally/IV for 5 days.
Scheme for history of allergy to Beta-Lactams: * Ceftriaxone 1-2g/day IV for 7 days.
Special Considerations for Inpatients:
Scheme for risk factors for Pseudomonas aeruginosa*: * Piperacillin/Tazobactam 4.5g/6h IV or Cefepime 2g/8h IV for 7 days +/- Clarithromycin 500mg/12h orally/IV for 5 days.
Scheme for risk factors for Methicillin-Resistant Staphylococcus aureus**: * Add to conventional scheme: Vancomycin 15-20mg/kg/8-12h IV +/- Clindamycin 600mg/8h IV for 7-14 days.
Aspiration Pneumonia:
First choice: * Ampicillin-Sulbactam 1.5g/6h IV for 5-7 days.
*Risk factors for Pseudomonas aeruginosa: Bronchiectasis, cystic fibrosis, prior treatment with corticosteroids or broad-spectrum antibiotics. Documented isolates in respiratory cultures of Pseudomonas aeruginosa.
**Risk factors for Methicillin-Resistant Staphylococcus aureus: Previously healthy young patients with severe, necrotizing, and rapidly progressive pneumonia, cavitary infiltrates, hemoptysis, prior influenza, intravenous drug users, rash, leukopenia, recent or concomitant skin and soft tissue infections.
The routine use of corticosteroids in pneumonia is not recommended.
CONSIDERATIONS ON ANTIMICROBIALS IN VIRAL AND ATYPICAL PNEUMONIAS:
In the case of a concomitant antigen test or PCR for Influenza A/B or SARS-CoV2, the following treatment recommendations are made:
Influenza Virus A/B:
First choice: * Oseltamivir 75mg every 12 hours orally for 5 days. Other considerations: * In cases of Respiratory Failure in ARM or Obesity: Oseltamivir 150mg every 12 hours orally for 5 days. * Concomitant antimicrobial treatment is recommended as there is documented frequent association of Influenza Virus and Streptococcus pneumoniae.
COVID-19: * First choice is conventional treatment with dexamethasone 8 mg IV for 10 days in the event of respiratory failure. * Routine antimicrobial treatment is not recommended for COVID-19; therefore, upon a positive SARS-CoV2 test, it is recommended to discontinue antimicrobials.
Consider maintaining concomitant antimicrobial treatment only in suspected bacterial infection due to severe presentation: * Focal alveolar consolidation +/- air bronchogram in imaging studies plus 1 of the following: sepsis, risk factors, and/or immunosuppression.
Atypical Pneumonias with Seroconversion for Chlamydia or Mycoplasma:
First choice: * Clarithromycin 500mg every 12 hours IV/orally for 14 days. * Azithromycin 500-1000mg/day IV/orally for 14 days. * Doxycycline 100mg every 12 hours IV/orally for 14 days.
CONSIDERATIONS ON PENICILLIN AND OTHER BETA-LACTAM ALLERGIES:
Patients who report penicillin allergy are often misclassified. It is documented that more than 95% of patients who report penicillin allergy can receive beta-lactams without any complications. Additionally, penicillin hypersensitivity diminishes over the years.
Allergy to one beta-lactam does not imply the impossibility of using the entire spectrum of beta-lactams, as there are only a few cases of cross-hypersensitivity.
Therefore, we recommend the safe use of beta-lactams except in cases of a reported or documented history of severe allergy to penicillin (anaphylaxis).
In doubtful cases or confirmed allergy events during hospitalization, a consultation with an Allergy Specialist is available to evaluate the case.
FOLLOW-UP IN OUTPATIENT TREATMENT MODALITY
Patients undergoing pneumonia treatment in an outpatient setting can continue their treatment at home, considering advising them to seek further consultation in case of alarm signs (fever that does not subside after 48 to 72 hours, dyspnea, hemoptysis, chest pain, etc.). Nevertheless, it is good practice to consider a follow-up consultation in the emergency department or clinic after 48 to 72 hours of starting antibiotic therapy.
It is not routinely recommended to repeat a chest X-ray or CT scan to evaluate the evolution of pneumonia under outpatient treatment. Only in the case of suspected complications or unfavorable evolution. A follow-up at the end of treatment with the primary care physician is suggested.
FOLLOW-UP IN INPATIENT TREATMENT MODALITY
For hospitalized patients, we should consider transitioning from parenteral medication to oral when the following conditions are met
- Completion of 48 hours of parenteral treatment.
- Presence of a 24-hour afebrile period, with hemodynamic stability and significant clinical improvement.
- Availability of the oral route.
It is not routinely recommended to repeat a chest X-ray or CT scan to evaluate the evolution of pneumonia under outpatient or inpatient treatment. Only in the case of suspected complications or unfavorable evolution.
PREVENTION
The prevention of pneumonia is based on timely immunization with pneumococcal vaccines, influenza vaccination, and COVID-19 vaccination according to the immunization recommendations and current schedule from the Ministry of Health.
ICD-11 CODING
- CA40 - Pneumonia.
- CA40.0 - Bacterial Pneumonia.
- CA40.1 - Viral Bronchopneumonia.
- CA40.2 - Fungal Pneumonia.
- CA40.Z - Pneumonia, organism unspecified.
Autor
Kamo Weasel - MD Infectious Diseases - MD Internal Medicine - #DocChain Community npub1jdvvva54m8nchh3t708pav99qk24x6rkx2sh0e7jthh0l8efzt7q9y7jlj
-
@ fa984bd7:58018f52
2024-08-16 13:22:12 -
@ c3b2802b:4850599c
2025-01-08 12:06:29An die Damen und Herren Abgeordneten des 20. Deutschen Bundestages
* *
Ihre Stellungnahme bezüglich Abstimmungen zu Waffenlieferungen und Kriegseinsätzen
Sehr geehrte Damen und Herren Bundestagsabgeordnete,
im vergangenen Jahrhundert haben sich Machthaber, Politiker und Parlamentarier unseres Landes mehrfach für Kriegshandlungen und völkerrechtswidrige Gewalttaten ausgesprochen, eingesetzt oder diese unterstützt, darunter zwei Weltkriege, welche unermessliches Leid über die Völker Europas und der Welt gebracht haben.
Kein anständiger Mensch kann sich eine Wiederholung solcher Entscheidungen wünschen. Daher fordere ich Sie auf, mir - als Teil des Souveräns, in dessen Namen Sie derzeit Verantwortung tragen - eine Stellungnahme zu Ihren künftigen Abstimmungsintentionen bei anstehenden Entscheidungen über Auslandseinsätze unserer Bundeswehr sowie Waffenlieferungen an kriegführende Länder zukommen zu lassen.
Reflektieren Sie dabei insbesondere bitte folgende historischen Tatsachen:
· Im Februar 1990 versprach der US Außenminister James Baker Herrn Gorbatschow, dass sich im Falle eines Rückzuges der sowjetischen Streitkräfte aus Ostdeutschland und weiteren Ländern des ehemaligen Ostblocks das NATO Militärbündnis „not an inch“, also nicht einen Zoll in Richtung Osteuropa ausdehnen würde (im Dokument unten auf Seite 5 unten). Danach wurden bekanntlich sämtliche Streitkräfte der WK II Siegermacht Sowjetunion aus Osteuropa zurückgezogen.
· Im April 2000 berief das US Außenministerium eine Konferenz in Bratislava ein, zu der mehrere Staatschefs früherer Ostblockländer, aber keine EU Staatschefs geladen waren. Es ging bei dieser Konferenz um die Ausweitung der NATO Richtung Osteuropa, welche inzwischen stattgefunden hat und zur Aufrüstung mit ca. 400 neue Militärbasen in früheren Ostblock-Staaten führte. Darüber berichtet Willy Wimmer, ein Kollege von Ihnen, der 33 Jahre Mitglied des Bundestags war, verteidigungspolitischer Sprecher der CDU/CSU Fraktion und Vizepräsident der parlamentarischen Versammlung der OSZE, in dem Buch: Alexander Sosnowski im Gespräch mit Willy Wimmer: „Und immer wieder Versailles“. Zeitgeist Verlag, 2019, S. 166, 175, 185.
Meine Fragen an Sie:
(1) Wie beurteilen Sie den Rückzug der sowjetischen Streitkräfte aus Osteuropa Anfang der 1990er Jahre?
(2) Wie beurteilen Sie das Verhalten der Vertreter der Alliierten-Macht USA
· im Jahr 1990,
· im Jahr 2000 im Hinblick auf das Versprechen im Jahr 1990 sowie
· bezüglich des Kreises der eingeladenen Staatschefs der Bratislava Konferenz?
(3) Welche Folgerungen ziehen Sie persönlich für künftige Abstimmungen über Waffenlieferungen aus Deutschland oder über Kriegseinsätze deutscher Soldaten in Konflikten, welche aus dem geschilderten historischen Hintergrund hervorgehen?
Zweifellos ist die Aufnahme von Kriegsflüchtlingen eine generöse Handlung. Doch um wieviel klüger, menschlicher könnte es sein, wenn Sie sich mit all Ihrer Klugheit und Menschlichkeit für Maßnahmen einsetzen, welche auch den Menschen in Kriegsgebieten ein friedliches Weihnachtsfest in ihrer Heimat möglich machen würden!
Ich wünsche Ihnen, Ihren Familien und Teams gute besinnliche Weihnachtstage, in denen Sie Ihre Möglichkeiten für friedenserhaltende und friedensschaffende Entscheidungen im deutschen Parlament weise abwägen.
Mit freundlichen Grüßen Peter Schmuck
Sieben der 15 antwortenden Parlamentarier lehnten militärisches Engagement unseres Landes im Ausland ab. Einer der Antwortenden sprach sich dafür aus. Die verbleibenden sieben Antwortenden bezogen keine klare Position oder erklärten sich für nicht zuständig, mein Schreiben zu beantworten.
Lassen Sie uns gemeinsam überlegen, welche weiteren Aktionen dazu beitragen können, dass unser Land nicht in neue Kriege verwickelt wird - und dass die bestehenden Konflikte friedliche Lösungen finden.
Ein Schlüsselereignis wird die bevorstehende Wahl zum Bundestag sein. Eine friedliche Zukunft werden wir nur behalten, wenn wir politischen Kräften aller Couleur die rote Karte zeigen, welche deutsches militärisches Engagement im Ausland befürworten. Wenn wir alle, die Frieden wollen, in unseren Bekannten- und Nachbarschaftsnetzen für unsere Position werben.
Ein wichtiger Schritt zum Frieden ist aus meiner Sicht, die Propaganda-Nachrichtenkanäle auszuschalten. Dann entsteht der Freiraum, den wir brauchen, uns selbst zu denken, die eigenen Emotionen zu spüren und so in unserer Mitte zu bleiben oder sie zurückzufinden.
Beste Grüße in die Runde Ihr Peter Schmuck
Titelbild von EKD
-
@ ee11a5df:b76c4e49
2024-12-24 18:49:05China
I might be wrong, but this is how I see it
This is a post within a series I am going to call "I might be wrong, but this is how I see it"
I have repeatedly found that my understanding of China is quite different from that of many libertarian-minded Americans. And so I make this post to explain how I see it. Maybe you will learn something. Maybe I will learn something.
It seems to me that many American's see America as a shining beacon of freedom with a few small problems, and China is an evil communist country spreading communism everywhere. From my perspective, America was a shining beacon of freedom that has fallen to being typical in most ways, and which is now acting as a falling empire, and China was communist for about a decade, but turned and ran away from that as fast as they could (while not admitting it) and the result is that the US and China are not much different anymore when it comes to free markets. Except they are very different in some other respects.
China has a big problem
China has a big problem. But it is not the communism problem that most Westerners diagnose.
I argue that China is no longer communist, it is only communist in name. And that while it is not a beacon of free market principles, it is nearly as free market now as Western nations like Germany and New Zealand are (being somewhat socialist themselves).
No, China's real problem is authoritarian one-party rule. And that core problem causes all of the other problems, including its human rights abuses.
Communism and Socialism
Communism and Socialism are bad ideas. I don't want to argue it right here, but most readers will already understand this. The last thing I intend to do with this post is to bolster or defend those bad ideas. If you dear reader hold a candle for socialism, let me know and I can help you extinguish it with a future "I might be wrong, but this is how I see it" installment.
Communism is the idea of structuring a society around common ownership of the means of production, distribution, and exchange, and the idea of allocating goods and services based on need. It eliminates the concept of private property, of social classes, ultimately of money and finally of the state itself.
Back under Mao in 1958-1962 (The Great Leap Forward), China tried this (in part). Some 50+ million people died. It was an abject failure.
But due to China's real problem (authoritarianism, even worship of their leaders), the leading classes never admitted this. And even today they continue to use the word "Communist" for things that aren't communist at all, as a way to save face, and also in opposition to the United States of America and Europe.
Authorities are not eager to admit their faults. But this is not just a Chinese fault, it is a fault in human nature that affects all countries. The USA still refuses to admit they assassinated their own president JFK. They do not admit they bombed the Nord Stream pipeline.
China defines "socialism with Chinese characteristics" to mean "the leadership of the Communist Party of China". So they still keep the words socialism and communism, but they long ago dropped the meanings of those words. I'm not sure if this is a political ploy against us in the West or not.
China's Marketplace Today
Today China exhibits very few of the properties of communism.
They have some common ownership and state enterprises, but not much differently than Western countries (New Zealand owns Air New Zealand and Kiwibank and Kiwirail, etc). And there are private enterprises all over China. They compete and some succeed and some fail. You might hear about a real-estate bank collapsing. China has private property. They have mostly free markets. They have money, and the most definitely have social classes and a very strong state.
None of that is inline with what communist thinkers want. Communist thinkers in China moan that China has turned away from communism.
Deng Xiaoping who succeeded Mao and attempted to correct the massive mistake, did much when he said "to get rich is glorious."
China achieved staggering rates of economic growth. 10% annually on average since 1977. Chinese economic reform started in 1979 and has continued through successive administrations (Deng, Jiang, Hu and now Xi).
China is now the world's largest economy (by GDP in PPP terms) since 2016.
I was first made aware of China's economic growth by Jim Rogers, an American commodities expert who travelled through China (and the rest of the world from 1990-1992) and in 2007 moved to Singapore where he ensured his daughters learned to speak Mandarin, because Jim knew where the economic growth was going to happen. Jim always spoke positively of China's economic prospects, and his view was so different from the "China is a nasty communist place" view that I had grown up with that my mind opened.
How can anybody believe they are still a communist country? In what world does it make sense that communism can produce such a massively booming economy? It doesn't make sense because it is simply wrong.
What does happen is that the CPC interferes. It lets the market do what markets do, but it interferes where it thinks oversight and regulation would produce a better result.
Western nations interfere with their markets too. They have oversight and regulation. In fact some of China's planned reforms had to be put on hold by Xi due to Donald Trump's trade war with China. That's right, they were trying to be even more free market than America, but America's protectionism prodded Xi to keep control so he could fight back efficiently.
Government oversight and regulation IMHO is mostly bad because it gets out of control, and there are no market forces to correct this. This gets even more extreme in a one-party system, so I can judge that China's oversight and regulation problems are very likely worse than those in Western nations (but I have no first hand experience or evidence).
Why do you keep saying CPC?
The Communist Party of China (CPC) is the ruling party in China. That is their official name. To call them the CCP is to concede to the idea that the British and Americans get to name everybody. I'm not sure who is right, since CPC or CCP is their "English" name (in Chinese it is 中国共产党 and Westernized it is Zhōngguó Gòngchǎndǎng). Nonetheless, I'll call them CPC because that is their wish.
Social Credit System
China moved from a planned economy to a market economy in stages. They didn't want any more sudden changes (can you blame them?). In the process, many institutions that have existed in the West for a long time didn't exist in China and they had to arise somehow. IMHO market forces would have brought these about in the private sector, but the one-party CP of China instead decided to create these.
One of those institutions was a credit score system. In the West we have TransUnion and Equifax that maintain credit ratings on people, and we have S&P, Moody's and Fitch that maintain credit ratings on companies. The domain of these ratings is their financial credit-worthiness.
So the People's Bank of China developed a credit information database for it's own needs. The government picked up on the idea and started moving towards a National Credit Management System. In 2004 it became an official goal to establish a credit system compatible with a modern market system. By 2006 banks were required to report on consumer creditworthiness.
But unchecked one-party governmental power will often take a good idea (credit worthiness data shared among private parties) and systematize it and apply it top-down, creating a solution and a new problem at the same time.
Nonetheless, originally it was about credit worthiness and also criminal convictions. That is no big scary thing that some right-wing American commentators will lead you to believe. In the US for example criminal records are public, so China's Social Credit System started out being no more over-reaching in scope than what Americans have lived under their entire lives, its only fault (a severe one) being centrally planned. And that remained the case up until about 2016 (in my estimation).
But of course there is always scope creep. As it exists today, I have reason to believe that CPC officials and even A.I. use judgement calls to score someone on how moral that person has been! Of course that is not a good idea, and IMHO the problem stems from one-party rule, and authoritarian administration of ideas that should instead be handled by the private sector.
Environmental, Social, and Governance
ESG is a system that came out of a couple basic ideas. The first is that many two-party transactions actually have externalities. They don't just affect the two parties, they also affect everybody else. When you fly in an airplane, you increase the CO2 in the atmosphere that everybody has to pay for (eventually). You may dispute that example, but that is no doubt one of the motivations of ESG.
But of course the recognition of this basic issue didn't lead all people towards market solutions (well it did, but those have been mostly messed up by others), but instead led many people towards ESG, which is a social credit scoring system which applies scores based on environmental and social side-effects of market transactions.
This is not at all the same as China's social credit system, which I described above. I hope you can see the difference.
In fact, China imported ESG from the West. Chinese companies, of their free will, in an attempt to court Western capital, achieve ESG goals for those Western investors. They have been playing this ESG game for 20 years just like the entire world has, because the West has imposed this faux-morality upon them. It isn't something China exported to us, it is something we exported to them.
I think China has avoided Woke-ism
My understanding of Chinese people, based on what I've heard many Chinese people say, is that China isn't affected by the Western woke-ism epidemic. They deride Western white woke people with the term "Baizuo". They have never sent an incompetent break dancer to the Olympics because of wok-ism. Competence is highly respected as is the competition to be the most competent, which (when augmented by a one-child policy which is no longer) has produced child prodigies like no other country has.
What about predatory loans of the Belt and Road initiative?
Predatory is an odd name for loans to people in need. The World Bank makes loans to people in need. China does too. China stands in opposition to Western Empire, and in that regard they produce their own alternative BRICS institutions. This is one of them.
There is AFAIK nothing more predatory about them. It is just that in some cases the borrowers have trouble paying them back and they get foreclosed upon. I don't think this is worthy of much discussion, except that the term "predatory" seems to me to be a propaganda device.
What about foreign influence from China?
China wants to influence the world, especially its own trading partners and potential trading partners. Doing that above board is fine by me.
But some of it is undoubtedly covert. Sometimes Chinese-born people run for public office in Western countries. In New Zealand we stood down some when it became clear they were being influenced too much by the CPC while being charged with representing their local town (dual loyalty issues). If only the USA would do the same thing to their dually-loyal politicians.
And all large nations run influence operations. The USA has the CIA, for example, and claims this "soft power" is actually the better alternative to what would otherwise be military intervention (but IMHO shouldn't be either). I'm not defending such operations (I despise them), I'm just explaining how China's position of exerting influence is not only no big deal and totally expected, it pales in comparison to the United States' influence operations which often become military excursions (something China rarely ever does).
What about the Great Firewall?
Yeah, that sucks. Again, single-party authoritarian control gone to extremes.
What about Human Rights Abuses? What about the Uyghur Genocide?
I don't like them. To the extent they are occurring (and I lean towards the belief that they are occurring), I condemn them.
China has anti-terrorism and anti-extremism policies that go too far. They end up oppressing and/or criminalizing cultures that aren't Chinese enough. But especially, China punishes dissent. Disagreement with the CPC is the high crime. It is the one-party rule that causes this problem. Anybody who speaks out against the CPC or goes against the state in any way is harshly punished. This happens to Uyghurs, to Falun Gong, to Tibetans, and to any religion that is seen as subversive.
Amnesty International and the UN OHCHR have documented issues around the Xinjiang Uyghur autonomous region, Tibet, LGBT rights, death penalty, workers rights, and the Hong Kong special administrative region. I am not about to pretend I know better than they do, but to some extent they go too far.
Amnesty International says this about the USA: Discrimination and violence against LGBTI people were widespread and anti-LGBTI legislation increased. Bills were introduced to address reparations regarding slavery and its legacies. Multiple states implemented total bans on abortion or severely limited access to it. Gender-based violence disproportionately affected Indigenous women. Access to the USA for asylum seekers and migrants was still fraught with obstacles, but some nationalities continued to enjoy Temporary Protected Status. Moves were made to restrict the freedom to protest in a number of states. Black people were disproportionately affected by the use of lethal force by police. No progress was made in the abolition of the death penalty, apart from in Washington. Arbitrary and indefinite detention in the US naval base Guantánamo Bay, Cuba, continued. Despite extensive gun violence, no further firearm reform policies were considered, but President Biden did announce the creation of the White House Office of Gun Violence Prevention. The USA continued to use lethal force in countries around the world. Black people, other racialized groups and low-income people bore the brunt of the health impacts of the petrochemical industry, and the use of fossil fuels continued unabated.
Amnesty international didn't even point out that the US government quashes free speech via pressure on social media corporations (because Amnesty International is far too lefty).
So who is worse, China or the US? I'm not going to make that judgement call, but suffice it to say that in my mind, China is not obviously worse.
China violates freedom of expression, association, and assembly of all people. This is bad, and a consequence mainly of one-party rule (again, what I think is the root cause of most of their ills). They arrest, detain, potentially kill anybody who publicly disagrees openly with their government. Clearly this is an excess of authoritarianism, a cancer that is very advanced in China.
As to organ harvesting of Uyghur Muslims, I think this is a myth.
China has dealt harshly with Muslim extremism. They don't offer freedom of religion to ISIS. And Amnesty International complains about that. But practically speaking you probably shouldn't respect the extremist religion of people who want to force everybody into a global caliphate through threat of violence. As you are well aware, some extremist Muslims (<1% of Islam) believe in using violence to bring about a global caliphate. Those extremists pop up in every country and are usually dealt with harshly. China has had to deal with them too.
I have watched two different Western YouTubers travel to Xinjiang province trying to find the oppressed Uyghurs and interview them. They can't find them. What they find instead are Uyghur Muslims doing their prayers five times a day at the local mosque. And also stories that the CPC pitched in some money to help them renovate the mosque. Maybe they were afraid it was a CPC trap and so they wouldn't speak freely. Amnesty International and the UN OHCHR say more than a million are "arbitrarily detained" and I'm not going to argue otherwise. But I'd be more convinced if there were a stream of pictures and news like there is out of Gaza, and it is suspicious that there isn't.
Conclusion
China is more like a Western nation that Westerners realize. Economically, militarily, socially. It still has a very serious obstacle to overcome: one-party rule. I don't think the one-party is going to voluntarily give up power. So most probably at some point in the future there will be a revolution. But in my opinion it won't happen anytime soon. For the most part Chinese people are living high on the hog, getting rich, enjoying the good life, in positive spirits about life, and are getting along with their government quite well at present.
-
@ da18e986:3a0d9851
2024-08-14 13:58:24After months of development I am excited to officially announce the first version of DVMDash (v0.1). DVMDash is a monitoring and debugging tool for all Data Vending Machine (DVM) activity on Nostr. The website is live at https://dvmdash.live and the code is available on Github.
Data Vending Machines (NIP-90) offload computationally expensive tasks from relays and clients in a decentralized, free-market manner. They are especially useful for AI tools, algorithmic processing of user’s feeds, and many other use cases.
The long term goal of DVMDash is to become 1) a place to easily see what’s happening in the DVM ecosystem with metrics and graphs, and 2) provide real-time tools to help developers monitor, debug, and improve their DVMs.
DVMDash aims to enable users to answer these types of questions at a glance: * What’s the most popular DVM right now? * How much money is being paid to image generation DVMs? * Is any DVM down at the moment? When was the last time that DVM completed a task? * Have any DVMs failed to deliver after accepting payment? Did they refund that payment? * How long does it take this DVM to respond? * For task X, what’s the average amount of time it takes for a DVM to complete the task? * … and more
For developers working with DVMs there is now a visual, graph based tool that shows DVM-chain activity. DVMs have already started calling other DVMs to assist with work. Soon, we will have humans in the loop monitoring DVM activity, or completing tasks themselves. The activity trace of which DVM is being called as part of a sub-task from another DVM will become complicated, especially because these decisions will be made at run-time and are not known ahead of time. Building a tool to help users and developers understand where a DVM is in this activity trace, whether it’s gotten stuck or is just taking a long time, will be invaluable. For now, the website only shows 1 step of a dvm chain from a user's request.
One of the main designs for the site is that it is highly clickable, meaning whenever you see a DVM, Kind, User, or Event ID, you can click it and open that up in a new page to inspect it.
Another aspect of this website is that it should be fast. If you submit a DVM request, you should see it in DVMDash within seconds, as well as events from DVMs interacting with your request. I have attempted to obtain DVM events from relays as quickly as possible and compute metrics over them within seconds.
This project makes use of a nosql database and graph database, currently set to use mongo db and neo4j, for which there are free, community versions that can be run locally.
Finally, I’m grateful to nostr:npub10pensatlcfwktnvjjw2dtem38n6rvw8g6fv73h84cuacxn4c28eqyfn34f for supporting this project.
Features in v0.1:
Global Network Metrics:
This page shows the following metrics: - DVM Requests: Number of unencrypted DVM requests (kind 5000-5999) - DVM Results: Number of unencrypted DVM results (kind 6000-6999) - DVM Request Kinds Seen: Number of unique kinds in the Kind range 5000-5999 (except for known non-DVM kinds 5666 and 5969) - DVM Result Kinds Seen: Number of unique kinds in the Kind range 6000-6999 (except for known non-DVM kinds 6666 and 6969) - DVM Pub Keys Seen: Number of unique pub keys that have written a kind 6000-6999 (except for known non-DVM kinds) or have published a kind 31990 event that specifies a ‘k’ tag value between 5000-5999 - DVM Profiles (NIP-89) Seen: Number of 31990 that have a ‘k’ tag value for kind 5000-5999 - Most Popular DVM: The DVM that has produced the most result events (kind 6000-6999) - Most Popular Kind: The Kind in range 5000-5999 that has the most requests by users. - 24 hr DVM Requests: Number of kind 5000-5999 events created in the last 24 hrs - 24 hr DVM Results: Number of kind 6000-6999 events created in the last 24 hours - 1 week DVM Requests: Number of kind 5000-5999 events created in the last week - 1 week DVM Results: Number of kind 6000-6999 events created in the last week - Unique Users of DVMs: Number of unique pubkeys of kind 5000-5999 events - Total Sats Paid to DVMs: - This is an estimate. - This value is likely a lower bound as it does not take into consideration subscriptions paid to DVMs - This is calculated by counting the values of all invoices where: - A DVM published a kind 7000 event requesting payment and containing an invoice - The DVM later provided a DVM Result for the same job for which it requested payment. - The assumption is that the invoice was paid, otherwise the DVM would not have done the work - Note that because there are multiple ways to pay a DVM such as lightning invoices, ecash, and subscriptions, there is no guaranteed way to know whether a DVM has been paid. Additionally, there is no way to know that a DVM completed the job because some DVMs may not publish a final result event and instead send the user a DM or take some other kind of action.
Recent Requests:
This page shows the most recent 3 events per kind, sorted by created date. You should always be able to find the last 3 events here of all DVM kinds.
DVM Browser:
This page will either show a profile of a specific DVM, or when no DVM is given in the url, it will show a table of all DVMs with some high level stats. Users can click on a DVM in the table to load the DVM specific page.
Kind Browser:
This page will either show data on a specific kind including all DVMs that have performed jobs of that kind, or when no kind is given, it will show a table summarizing activity across all Kinds.
Debug:
This page shows the graph based visualization of all events, users, and DVMs involved in a single job as well as a table of all events in order from oldest to newest. When no event is given, this page shows the 200 most recent events where the user can click on an event in order to debug that job. The graph-based visualization allows the user to zoom in and out and move around the graph, as well as double click on any node in the graph (except invoices) to open up that event, user, or dvm in a new page.
Playground:
This page is currently under development and may not work at the moment. If it does work, in the current state you can login with NIP-07 extension and broadcast a 5050 event with some text and then the page will show you events from DVMs. This page will be used to interact with DVMs live. A current good alternative to this feature, for some but not all kinds, is https://vendata.io/.
Looking to the Future
I originally built DVMDash out of Fear-of-Missing-Out (FOMO); I wanted to make AI systems that were comprised of DVMs but my day job was taking up a lot of my time. I needed to know when someone was performing a new task or launching a new AI or Nostr tool!
I have a long list of DVMs and Agents I hope to build and I needed DVMDash to help me do it; I hope it helps you achieve your goals with Nostr, DVMs, and even AI. To this end, I wish for this tool to be useful to others, so if you would like a feature, please submit a git issue here or note me on Nostr!
Immediate Next Steps:
- Refactoring code and removing code that is no longer used
- Improve documentation to run the project locally
- Adding a metric for number of encrypted requests
- Adding a metric for number of encrypted results
Long Term Goals:
- Add more metrics based on community feedback
- Add plots showing metrics over time
- Add support for showing a multi-dvm chain in the graph based visualizer
- Add a real-time mode where the pages will auto update (currently the user must refresh the page)
- ... Add support for user requested features!
Acknowledgements
There are some fantastic people working in the DVM space right now. Thank you to nostr:npub1drvpzev3syqt0kjrls50050uzf25gehpz9vgdw08hvex7e0vgfeq0eseet for making python bindings for nostr_sdk and for the recent asyncio upgrades! Thank you to nostr:npub1nxa4tywfz9nqp7z9zp7nr7d4nchhclsf58lcqt5y782rmf2hefjquaa6q8 for answering lots of questions about DVMs and for making the nostrdvm library. Thank you to nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft for making the original DVM NIP and vendata.io which I use all the time for testing!
P.S. I rushed to get this out in time for Nostriga 2024; code refactoring will be coming :)
-
@ 76c71aae:3e29cafa
2024-08-13 04:30:00On social media and in the Nostr space in particular, there’s been a lot of debate about the idea of supporting deletion and editing of notes.
Some people think they’re vital features to have, others believe that more honest and healthy social media will come from getting rid of these features. The discussion about these features quickly turns to the feasibility of completely deleting something on a decentralized protocol. We quickly get to the “We can’t really delete anything from the internet, or a decentralized network.” argument. This crowds out how Delete and Edit can mimic elements of offline interactions, how they can be used as social signals.
When it comes to issues of deletion and editing content, what matters more is if the creator can communicate their intentions around their content. Sure, on the internet, with decentralized protocols, there’s no way to be sure something’s deleted. It’s not like taking a piece of paper and burning it. Computers make copies of things all the time, computers don’t like deleting things. In particular, distributed systems tend to use a Kafka architecture with immutable logs, it’s just easier to keep everything around, as deleting and reindexing is hard. Even if the software could be made to delete something, there’s always screenshots, or even pictures of screens. We can’t provably make something disappear.
What we need to do in our software is clearly express intention. A delete is actually a kind of retraction. “I no longer want to associate myself with this content, please stop showing it to people as part of what I’ve published, stop highlighting it, stop sharing it.” Even if a relay or other server keeps a copy, and keeps sharing it, being able to clearly state “hello world, this thing I said, was a mistake, please get rid of it.” Just giving users the chance to say “I deleted this” is a way of showing intention. It’s also a way of signaling that feedback has been heard. Perhaps the post was factually incorrect or perhaps it was mean and the person wants to remove what they said. In an IRL conversation, for either of these scenarios there is some dialogue where the creator of the content is learning something and taking action based on what they’ve learned.
Without delete or edit, there is no option to signal to the rest of the community that you have learned something because of how the content is structured today. On most platforms a reply or response stating one’s learning will be lost often in a deluge of replies on the original post and subsequent posts are often not seen especially when the original goes viral. By providing tools like delete and edit we give people a chance to signal that they have heard the feedback and taken action.
The Nostr Protocol supports delete and expiring notes. It was one of the reasons we switched from secure scuttlebutt to build on Nostr. Our nos.social app offers delete and while we know that not all relays will honor this, we believe it’s important to provide social signaling tools as a means of making the internet more humane.
We believe that the power to learn from each other is more important than the need to police through moral outrage which is how the current platforms and even some Nostr clients work today.
It’s important that we don’t say Nostr doesn’t support delete. Not all apps need to support requesting a delete, some might want to call it a retraction. It is important that users know there is no way to enforce a delete and not all relays may honor their request.
Edit is similar, although not as widely supported as delete. It’s a creator making a clear statement that they’ve created a new version of their content. Maybe it’s a spelling error, or a new version of the content, or maybe they’re changing it altogether. Freedom online means freedom to retract a statement, freedom to update a statement, freedom to edit your own content. By building on these freedoms, we’ll make Nostr a space where people feel empowered and in control of their own media.
-
@ c5fede3d:16e03f7b
2025-01-08 11:41:16Hay quien dice el famoso dicho de «año nuevo, vida nueva». En este caso, iniciamos el año con el mismo propósito, seguir aprendiendo para que no nos pille el toro. En esta ocasión, toca tratar la entrada de capital a tu wallet. Sin embargo, hay que saber donde meterse sin que las arenas movedizas te engullan. ¿Preparado para comprar la hucha del cerdito?
Esta es la segunda entrega de Semanario Crypto, una serie de artículos dedicados para aquellos que desconocen los conceptos básicos del mundo de las criptomonedas. La semana pasada hicimos un barrido sin adentrarnos en territorio comanche. Si aún no tienes claro qué es una wallet o cuál es el propósito de una frase semilla, ve al punto de partida y vuelve a leerte Semanario Crypto #1 | Un nuevo paradigma, porque es el ticket de entrada para este mundillo y no lo puedes perder.
EL LÍO DEL MONTEPÍO💱
Si has llegado hasta aquí, he de felicitarte. Has dado dos grandes pasos. El primero, tener la mente abierta y querer aprender. El segundo, disponer de una wallet y tener guardada a buen recaudo la frase semilla. Ahora es el momento de la verdad, operar, no sin antes tener claro un par de conceptos más.
¿Qué son los exchanges?
Son plataformas digitales donde los usuarios pueden comprar, vender o intercambiar criptomonedas. A través de ellas, los usuarios pueden convertir su dinero tradicional en crypto, facilitando el comercio de criptoactivos.
Los exchanges son los bancos del mundo de la criptomonedas. Ambos actúan como intermediarios en las transacciones financieras y ofrecen servicios relacionados con la inversión y el comercio. Sin embargo, no todos los exchanges son iguales, se diferencian dos tipos:
1. Exchange Centralizado (CEX)
En este tipo de exchange, una entidad centralizada gestiona las transacciones y retiene los fondos los usuarios. Los CEX custodian tu dinero, cuentan con equipos profesionales de atención al cliente y están sujetos a altas regulaciones gubernamentales. Te registras, haces la verificación de identidad (KYC) y ellos te proporcionan una wallet para que la fondees con tu dinero fiduciario y operes dentro de la plataforma. Todo un ecosistema a golpe de click.
2. Exchange Descentralizado (DEX)
Aquí las transacciones se realizan entre usuarios a través de contratos inteligentes en la blockchain (P2P), es decir, las operaciones se hacen directamente desde sus propias billeteras. No requieren que se proporcionen información personal. Los usuarios mantienen el control sobre sus activos (autocustodia) y no habrá que depositar en ellas.
Sabiendo las diferencias entre un CEX y un DEX, nuevamente nos hallamos en la tesitura de tener que definirnos a nosotros mismos. En la anterior entrega de Semanario Crypto optamos por una wallet caliente o una fría en función del tipo de inversor que somos, o incluso pudimos hacer un mix emparejando la wallet fría a una extensión de navegador. Aunque, como acabamos de ver, si te registras en un CEX ellos ya te proporcionan una billetera electrónica para que operes dentro de la plataforma. La elección es tuya, pero has de tener en cuenta cómo operar de una forma u otra conforme al capital que dispongas:
Quiero operar por un monto superior a 50k euros anuales y/o soy un buen ciudadano.
- Amigo mío, quítate de problemas, y registrate en un CEX como Binance o Bit2Me. La legislación fiscal española incide especialmente en que cualquier tenencia de criptomonedas superior a 50k euros debe ser declarada. Con los exchanges que te he puesto, la información proporcionada a la Agencia Tributaria es automática y de ella se encargan ellos, no tienes que hacer nada de nada. Solo hacer tu declaración anual habitual.
- También es la opción ideal para el vago y el que no dispone de tiempo. ¿Quieres hacer un mix que te ofrezca las bondades de los CEX y los DEX? Atento al siguiente punto y atiende a las nuevas regulaciones de cara a 2025.
Quiero operar por un monto inferior a 10k euros anuales y/o considero que los CEX son neo-usureros.
- La solución son los DEX. Como ya vimos, los exchanges descentralizados no requieren de KYC para operar, de modo que dan un mayor grado de privacidad y anonimato, puesto que jamás dispondrán de tu documentación personal. Además, estás expuesto a lo que se denomina el ecosistema de las finanzas descentralizadas (DeFi).
- El mundo DeFi busca democratizar el acceso a los servicios financieros, abriendo un abanico de nuevos mercados, oportunidades de inversión y ser el primero en conocer las innovaciones financieras. Sin lugar a dudas, es donde están los más avispados y la gente pudiente, muestra de ello es el valor de su capitalización de mercado, alcanzando más de 52 mil millones de dólares, que se dice pronto.
EL CASTILLO DE DRÁCULA, LA AEAT 🧛
El año 2025 va a ser determinante para el devenir del mundo de las criptomonedas, al menos en Europa. Es el año donde entran en vigor las nuevas regulaciones fiscales. Parece ser que el mantra de que los criptoactivos eran una estafa y que no valían nada a pasado a mejor vida a partir de la entrada del gran capital, como Blackrock. Ahora, los entes fiscales reguladores quieren su porción del pastel y apuntan a tu billetera. Si quieres operar en este mundillo, debes saber un poco de fiscalidad, para que no llamen a tu puerta. Aunque, recuerda, si optaste por ser un buen ciudadano (español, en este caso) que te registraste en un CEX como Binance o Bit2Me no tendrás mayores preocupaciones, porque allí todo lo que hagas acaba registrado automáticamente en tu declaración del año fiscal. De todas formas, siempre es bueno aprender, sobre todo si operas desde los DEX con tu billetera autocustodiada.
1. La Ley MiCa y Directiva DAC8
- Reglamento europeo que establece el marco regulatorio para las criptomonedas. Obliga a que todos los servicios financieros que emitan o comercialicen criptoactivos tengan licencia y deban proporcionar información sobre sus operaciones. Los proveedores de servicios deberán informar sobre las transacciones realizadas por residentes en Europa con fines de supervisión fiscal. Los ciudadanos europeos están obligados a declarar la tenencia de criptoactivos como parte del patrimonio personal, incluyendo ganancias, la cual estará sujeta a impuestos.
- La Directiva DAC8 complementa al reglamento y se enfoca en el intercambio automático de información fiscal entre los Estados miembro de la UE (CARF). Los proveedores de criptoactivos deberán reportarán todas las transacciones y datos relevantes a las autoridades fiscales nacionales, concretamente los movimientos y saldos del usuario. Legitima a Hacienda a poder embargar las criptomonedas depositadas en un exchange, las wallets autocustodiadas son inembargables por estar en control del usuario.
2. La Travel Rule o Regla de Viaje
- Regulación que aumenta la trazabilidad entre las transacciones de criptomonedas. Exige a los servicios de activos digitales (VASP) recojan y compartan información sobre los remitentes y beneficiarios, sea a carteras custodiadas o autocustodiadas.
3. Límites y “mandamientos”
- Cualquier transferencia superior a 1.000 euros requerirá que el proveedor recopile datos personales.
- Si el monto de operaciones alcanza los 10.000 euros anuales, el proveedor informa.
- Si el monto de operaciones alcanza los 3.000 euros en un trimestre natural, el proveedor informa.
- Las ganancias deben ser declaradas en el IRPF al final del año fiscal, incluso si las criptomonedas no se han convertido a FIAT (dinero fiduciario tradicional).
- El Modelo 721 es una obligación informativa que deben cumplir los contribuyentes que poseen criptomonedas en el extranjero (exchange que no opere bajo legislación española y no presente los modelos informativos requeridos por Hacienda) y cuyo saldo supera los 50.000 euros a fecha del 31 de diciembre.
- La CNMV supervisa el mercado de criptoactivos y el Banco de España las monedas estables (dólares digitales como USDC-USDT).
¿AÚN CON FUERZAS?
Pues sabiendo todo esto, ya es hora de que deposites tu dinero en tu billetera de criptomonedas. ¿Cómo hacerlo? Eso ya lo verás en la siguiente entrega de Semanario Crypto. En él se te ofrecerá el martillo para que rompes la hucha del cerdito y le des vida a tu wallet. Aprende las rutas de entrada y de salida. Opera con conocimiento y sabiendo lo que haces. Es más fácil de lo que piensas. Recuerda que la información es poder, y tú la vas a tener.
Descargo de responsabilidad: Toda la información compartida forma parte de mi visión personal y no tiene como objetivo asesorar financieramente. Doy información, no consejos de inversión.
-
@ 2063cd79:57bd1320
2025-01-08 11:19:56Ich hatte vor ein paar Wochen die Gelegenheit mich mit Micheal Hassard persönlich zu unterhalten. Mike ist Verteidiger im Fall von Roman Sterlingov. Der Fall ist haarsträubend und beängstigend. Mike und ich haben uns einige Zeit unterhalten und er hat mir einige Details aus diesem wirklich spannenden Prozess verraten. Ich wollte versuchen die Informationen in einem Artikel zusammenzufassen, um auch anderen Leuten, die mit dem Fall noch nicht betraut sind, die Möglichkeit zu geben, zu verstehen, was für absurde Methoden und ungerechte Beweismittel in diesem noch komplett neuen rechtlichen Umfeld angewendet werden.
LAX
Am 27. April 2001 landet ein Direktflug aus Moskau am Los Angeles International Airport (LAX). Bei der Passkontrolle an der Immigration wird ein junger Passagier dieses Fluges von Kriminalermittlern des Internal Revenue Service (IRS) verhaftet. In seinem Gepäck befinden sich vier Reisepässe und allerhand technisches Equipment. Darunter Laptops, externe Festplatten und Bitcoin Signing Devices (Hardware Wallets). Der junge Mann wird festgenommen, seine mitgeführten Besitztümer und Pässe konfisziert, dann wird er in Untersuchungshaft gebracht. Der Vorwurf: Die Gründung und der Betrieb eines Bitcoin Mixers. Konkret wird ihm vorgeworfen, Bitcoin Fog gegründet und betrieben zu haben, darüber hinaus wird er in drei Punkten angeklagt: Geldwäsche, Betrieb eines nicht lizenzierten Geldtransfergeschäfts und Geldtransfer ohne Lizenz. Die IRS behauptet, dass über 1,2 Millionen Bitcoin, im Wert von etwa 336 M US Dollar zum Zeitpunkt der Transaktionen, über Bitcoin Fog verschickt wurden.
Bitcoin Fog
Bitcoin Fog war ein beliebter Custodial Bitcoin Mixer, der von Nutzer//innen für ihre Privatsphäre genutzt wurde. Mixer sind Services die entwickelt wurden, um das Problem der "Common-Input-Ownership-Heuristik" zu brechen. Vereinfacht ausgedrückt beschreibt dieses Problem die Annahme, dass mehrere Inputs einer Transaktion relativ sicher dem gleichen Besitzer gehören. Ich habe Bitcoin Mixer schon mal detailliert beschrieben:
https://www.genexyz.org/post/23-block-772315-bitcoin-mixing-q6i7y4/
TL;DR: Die Grundidee besteht darin, dass man einen Coin nimmt, der aus mehreren UTXOs besteht, und diesen mit Hilfe eines Dienstes einem Pool zuführt. Diese Dienste erhalten für die Vermittlung, Zusammenführung und das Stellen der Infrastruktur eine kleine Gebühr. Transaktionen werden dann so aufgebaut, dass sie es Überwachungsfirmen oder anderen Beobachtern sehr schwer machen, genau zu wissen, welcher Transaktion-Output zu welchem der Input-Steller gehört.
Bitcoin Fog wurde 2011 gegründet und ist ein Custodial Service, was bedeutet, dass Nutzer//innen ihre Bitcoin an eine Wallet des Betreibers senden, und im Gegenzug dann von Bitcoin Fog andere Bitcoin zurück erhalten, um die Spur der On-Chain-Transaktionen zu verwischen.
Roman Sterlingov
Roman war schon früh Benutzer von Bitcoin. Als er 14 Jahre alt war, zog er mit seiner Mutter von Russland nach Schweden und beschäftigte sich ab etwa 2011 mit Bitcoin. Dies ist wichtig, denn als russischer und schwedischer Staatsbürger ist Roman im Besitz von vier offiziell ausgestellten Reisepässen. Russland hat zwei Pässe, einen für das Reisen innerhalb und einen für das Reisen außerhalb Russlands. Schweden stellt auch zwei Reisepässe aus. Als der Bitcoin-Kurs stieg, wurde er Millionär. Er kündigte seinen Job und versuchte, sich selbstständig zu machen. Unter anderem gründete er ein VPN-Geschäft, das nicht erfolgreich war, und entschied sich später aufgrund der Volatilität von Bitcoin und fehlenden Einnahmen aus seinen Projekten, Pilot bei einer kommerziellen Fluggesellschaft zu werden.
Er meldete sich bei einer kalifornischen Flugschule an und 2021, als Roman nach Kalifornien zur Flugschule flog, wurde er von der Regierung am Flughafen LAX verhaftet. Er sitzt seit über zwei Jahren im Gefängnis und wartet auf seinen Prozess. Neben seinen Pässen und seinem Equipment wurden auch die seit 2011 angesammelten Bitcoin beschlagnahmt, da diese auf Konten bei u.a. Kraken lagen.
Die Anklage
Kalifornien hat Roman Sterlingov wegen des Vorwurfs verhaftet, über einen Zeitraum von 10 Jahren Bitcoin im Wert von fast 336 M US Dollar gewaschen zu haben. Ihm wird vorgeworfen, über sein Konto und seine IP-Adressen mit der Bitcoin Fog-Domain und mit Mt. Gox-Konten, die in Verbindung zu Bitcoin Fog stehen, an Bitcoin Fog beteiligt zu sein.
Vor dem Start des Dienstes nutzte der Administrator seinen echten Namen auf seinem Mt. Gox-Konto, um die Plattform einem Betatest zu unterziehen. Sein persönliches Google-Konto wurde auch zum Speichern der Schritte zur Bezahlung der Domain verwendet. Dies sind jedoch zum heutigen Zeitpunkt nur Anschuldigungen ohne konkrete Beweise. Der Fall stützt sich stark auf digitale Forensik und Blockchain-Analyse ohne Zeugenaussagen oder ähnliche konkrete Beweisstücke. Selbst wenn Roman die Domain gekauft hätte, wäre dies nicht illegal. Die Verjährungsfrist für die angeblichen Verbrechen ist ebenfalls abgelaufen. Was bleibt, sind von der Anklage angeführte "Beweise", die sich komplett auf die Blockchain-Analyse der Firma Chainalysis stützen.
Chainalysis
Chainalysis ist die wohl bekannteste Blockchain-Analyse Firma. In einem früheren Artikel habe ich schon mal beschrieben, wie diese Firmen operieren:
https://www.genexyz.org/post/19-block-765505-on-chain-analytics-mhcumo/
TL;DR: Unter On-Chain Analytics versteht man die Analyse von Daten, die auf jeder beliebigen Blockchain vorhanden sind. Diese Daten sind auf der Chain, also on-chain und somit für jedermann jederzeit und von überall abrufbar. Genauer bieten Blockchains Daten über Adressen, Transaktionen und in gewisser Weise auch über Wallets. Diese Informationen können verwertet werden, um verschiedene Sachverhalte darzustellen. Dieses Verfahren wird auch Heuristik genannt und bedient sich wahrscheinlicher Annahmen, also z.B. wiederkehrender Muster. Dabei werden sogenannte Cluster erstellt, also Verbindungen zwischen Adressen und Transaktionen gezogen.
So nutzen nutzen Analyse-Firmen wie Chainalysis Heuristiken und Wahrscheinlichkeitsanalysen, um Bitcoin-Transaktionen und Eigentümerwechsel zu verfolgen. Sie versuchen, Adressen auf der Grundlage dieser Heuristiken zu gruppieren, jedoch stimmen die Ergebnisse verschiedener Unternehmen oft nicht überein. Dies kann zu vagen Beweisen und Schuldunterstellungen führen.
„Während die Identität eines Besitzers einer Bitcoin-Adresse im Allgemeinen anonym ist (es sei denn, der Besitzer entscheidet sich dafür, die Informationen öffentlich zugänglich zu machen), können Strafverfolgungsbehörden den Besitzer einer bestimmten Bitcoin-Adresse oft durch Analyse der Blockchain identifizieren“ - Devon Beckett, Special Agent, IRS
Chainalysis betreiben einen sogenannten Reactor, der diese Analysen vornimmt. Diese Analyse dient als Grundlage für das Argument, Roman habe Geld von seinem Mt Gox-Konto abgebucht und verwendet, um die Bezahlung der DNS-Registrierung für Bitcoin Fog zu tätigen und zu verbergen. Es wird so versucht, Roman mit Aufzeichnungen im Bitcoin Talk-Forums in Verbindung zu bringen, die wiederum Bitcoin Fog mit illegalen Aktivitäten in Verbindung bringen.
Konkret wird anhand dieser Analyse eine Verbindung zu Roman und weiter zu Bitcoin Fog hergestellt, die beweisen soll, dass Zahlungen im Wert von 336 M US Dollar gewaschen wurden, die für Drogengeschäfte verwendet wurden.
Es gibt keine objektiven Standards für diese Art der Analyse und Strafverfolgungsbehörden stützen ihre Beweise auf diese privaten Ermittlungen. Im konkreten Fall vo Chainalysis spielen Beziehungen zu Strafverfolgungsbehörden wie dem britischen Serious Crimes Office und dem US-Justizministerium, sowie den damit einhergehenden Geldquellen eine entscheidende Rolle beim Aufstieg des Unternehmens zum größten Anbieter dieser Dienstleistungen mit einer Marktkapitalisierung von 8,6 Milliarden US Dollar.
Verteidigung
Roman wird in diesem Fall von der Kanzlei Ekeland Law, PLLC vertreten. Die Anwälte, Tor Ekeland und Michael Hassard sind der festen Überzeugung, dass Roman unschuldig ist und dass er in diesem Fall aufgrund fehlerhafter digitaler Forensik in Bedrängnis geraten ist.
Roman gibt zu, Bitcoin Fog aus Datenschutzgründen verwendet zu haben, um seine Bitcoin zu waschen, bevor er diese in sein Konto bei Kraken einzahlte. Das Mischen an sich ist nicht illegal, denn während der Anhörung erkannte der Richter sogar an, dass die Verwendung eines Mixers wie Bitcoin Fog nicht grundsätzlich verboten sei. Dies war sogar das erste Mal, dass ein Richter ausdrücklich erklärte, dass das Mischen von Bitcoin nicht illegal ist und dass es auch nicht illegal ist, Nutzer//in eines Mischdienstes zu sein. Es ist jedoch zu beachten, dass sich dieser Fall speziell gegen den Betreiber von Bitcoin Fog richtet und versucht, den Dienst mit Drogenmarktplätzen in Verbindung zu bringen.
Argumente für Romans Unschuld beinhalten unter anderem, dass Bitcoin Fog in der gesamten Zeit von Romans Inhaftierung aktiv geblieben ist, was darauf schließen lässt, dass die eigentlichen Betreiber immer noch auf freiem Fuß sind. Roman wurde vor seiner Verhaftung überwacht, es wurden Abhör- und Überwachungsmaßnahmen durchgeführt, jedoch keine Beweise gefunden, die ihn mit dem Betrieb von Bitcoin Fog in Verbindung bringen, selbst nachdem Server beschlagnahmt wurden.
Darüber hinaus ignoriert die Anklage auch die Tatsache, dass die DNS-Registrierung der Bitcoin Fog Domain seit Romans Verhaftung zweimal erneuert wurde. Trotzdem versucht die Anklage eine Verbindung zu Roman auf der Grundlage von IP-Adressen herzustellen, die mit anderen E-Mails verknüpft sind, die zur Registrierung der DNS und zur Erstellung eines Kontos im Bitcoin Talk Forum verwendet wurden.
Roman wird Verschwörung vorgeworfen, es wurde jedoch kein einziger Mitverschwörer genannt. Bei den von der Anklage behaupteten Transaktionen handelt es sich um Lizenzzahlungen des Mixers, die jedoch nicht durch Beweise gestützt werden. Wenn Roman ein Drahtzieher wäre, der 336 M US Dollar an Drogengeldern gewaschen hätte, würde es für ihn keinen Sinn machen, sein Geld mit seinem richtigen Namen und Passfoto auf ein KYC-Konto bei Kraken einzuzahlen.
An dieser Stelle ist es vielleicht interessant festzustellen, dass Michael Gronager, einer der Mitbegründer von Chainalysis, auch einer der Mitbegründer von Kraken war.
Mt Gox Daten
Es gibt eine Verbindung zwischen Kraken, Chainalysis und Mt Gox. Denn nicht nur war der Gründer von Kraken, Jesse Powell, als Berater für Mt. Gox bei der Lösung eines Sicherheitsproblems tätig und begann in Erwartung seines Kollapses mit der Arbeit an Kraken als Ersatz, auch Chainalysis wurde als direkte Reaktion auf den Mt. Gox-Skandal gegründet.
Chainalysis wurde in den offiziellen Ermittlungen im Insolvenzverfahren von Mt. Gox genutzt, um den Verbleib der "gestohlenen" bitcoins zu untersuchen. Allerdings gibt es Anzeichen dafür, dass die dabei verwendeten Daten falsch und unzuverlässig seien. Angebliche Transaktionsnummern und Wallet-Adressen existieren nicht, werden verwechselt oder sind schlichtweg fehlerhaft. Genau dieser Datensatz wird aber nun benutzt, um Fälle wie den von Roman zu beweisen.
Ankläger
Einer der Staatsanwälte des Falles ist jetzt leitender Rechtsberater für Chainalysis, und ein IRS-Ermittler gründete während seiner Tätigkeit für den IRS ein privates Unternehmen namens Exigent LLC. Die Pressemitteilungen und Fundraising-Runden von Chainalysis stehen eng im Zusammenhang mit dem Fall. Exigent LLC erhält in der Pressemitteilung des US-Justizministeriums die höchste Auszeichnung für Romans Verhaftung, und fünf Monate später kaufte Chainalysis Exigent LLC. Dieser Fall scheint von Karrierismus und Profitstreben getrieben zu sein.
Problem
Neben den Verbindungen der Ermittler und Ankläger mit Chainalysis und der Problematik der fehlenden Beweise, ist dieser Fall zutiefst beunruhigend und wirft Bedenken hinsichtlich des geltenden Computerrechts auf.
Die meisten Blockchain-Strafverfolgungen folgen dem gleichen Muster: Einspruchsvereinbarungen, Gerichtsverfahren oder Entlassungen. Unschuldige Menschen gehen oft auf Plädoyer-Deals ein, weil ihnen die Ressourcen fehlen, um gegen die unbegrenzten Ressourcen des Department of Justice zu kämpfen. Roman kann keinen Deal annehmen, weil er nichts weiß und lügen müsste.
Es ist beunruhigend, dass der Fall in Washington D.C. verhandelt wird, obwohl Roman keine Verbindungen zu dieser Stadt hat. Die einzige Grundlage dafür, die Gerichtsbarkeit nach D.C. zu legen, ist darin begründet, dass eine verdeckte Operation gegen Roman aus Washington D.C. geleitet wurde. Dies gibt Anlass zur Sorge, weil es Staatsanwälten ermöglicht, Angeklagte auf der Grundlage von Online-Interaktionen vor jedes Bundesgericht zu ziehen - ob US Staatsbürger oder nicht. Dies ist ein direkter Verstoß gegen die Gerichtsstandsklausel und entfernt wichtige Elemente des Strafrechtssystems, da es jede/n Nutzer//in von Bitcoin-Mixern in die gefährliche Lage versetzen kann, vor einem US-Gericht angeklagt zu werden, wenn eine auch nur dünne Beweislage gegen ihn/sie vorliegt.
Ein weiteres Problem besteht in den vorgebrachten Beweisen. Denn die Verteidigung hat bis heute keinen Einblick in den Code oder die verwendeten Datensätze, die von Chainalysis verwendet wurden, erhalten. Chainalysis beruft sich dabei auf seine proprietären Geschäftsdaten und lehnt eine Offenlegung ab. Es wird vermutet, dass die Datensätze falsch sind, insbesondere angesichts der fragwürdigen Mt. Gox-Aufzeichnungen, auf die sie sich stützen.
Die bereitgestellten Daten sind begrenzt, unvollständig und werden in komplizierten Flussdiagrammen dargestellt. Die verwendete Software, wie z.B. der Chainalysis Reactor, steht nicht für eine unabhängige Prüfung zur Verfügung. Der Mangel an Transparenz und Zugang zu dieser Software gibt Anlass zu Bedenken hinsichtlich ihrer Genauigkeit und den daraus gezogenen Schlussfolgerungen.
Es bestehen Zweifel am Zusammenhang zwischen Roman, dem Betreiber von Bitcoin Fog, und den mutmaßlichen Straftaten. Roman sitzt derzeit im Gefängnis, ihm droht eine Haftstrafe von 50 Jahren. Die Freiheit einer Person wird durch eine kommerzielle proprietäre Software gefährdet, die vor Gericht erwirken kann, dass Quellen und Datensätze nicht offengelegt werden.
Auch wirft der Fall Bedenken hinsichtlich fehlender Standards, des gewinnorientierten Charakters des forensischen Bereichs, der Weigerung, Beweise auszutauschen, und der Möglichkeit von Justizirrtümern auf, die durch fehlerhafte Software und fragwürdige Praktiken verursacht werden.
Wie geht es weiter?
Das Verteidigungsteam hat finanzielle Probleme, da alle Gelder von Roman beschlagnahmt wurden. Der Antrag auf Freigabe der Mittel wurde abgelehnt. Romans Verteidigung muss öffentliche Mittel beantragen und hofft auf Spenden. Ich habe in einem früheren Artikel schon auf die Spendenseite aufmerksam gemacht. Wer anhand der aufgelisteten Fakten das Gefühl bekommt, dass hier jemand zu Unrecht verhaftet wurde und helfen möchte, kann die Verteidigung mit einer Spende unterstützen.
https://www.torekeland.com/roman-sterlingov
https://geyser.fund/project/usvsterlingov
FREEROMAN
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ f1989a96:bcaaf2c1
2024-12-19 15:16:35Good morning, readers!
After 53 years of tyranny, the Syrian regime has been overthrown. Rebels captured Damascus, forcing Bashar al-Assad and his family to flee to Moscow, Russia. Assad’s rule was defined by severe human rights abuses and widespread financial repression. Hundreds of thousands were jailed or killed, millions fled, and more than 90% of the country was plunged into poverty amid currency collapse. With Assad gone, Syrians may have a chance to rebuild their country and work toward a freer, more democratic future.
In Tunisia, President Kais Saied continues to dismantle civil society and due process. The regime is escalating the repression of journalists through arrests, incarceration, and judicial harassment to silence critical voices. By doing so, Saied shifts focus away from the country’s economic struggles and worsening hardships.
In technology news, Klever Wallet, a KYC-free digital asset wallet widely used in regions like Nigeria and the Philippines, integrated the Lightning Network via the Breez SDK, enabling fast, low-cost Bitcoin transactions for its significant global user base. In addition, the Bitcoin Design Foundation announced a South American Bitcoin UX Bootcamp, offering 10 skilled UX designers across South America a chance to refine their design expertise within the Bitcoin ecosystem and attend the 2025 bitcoin++ developer conference in Florianopolis, Brazil.
We end with a live stream of the 2024 Africa Bitcoin Conference, an inspiring event HRF supported and participated in. The conference brought together leaders and innovators across the African continent to advance Bitcoin for financial freedom and to push back against growing authoritarianism. If you were unable to attend in person, be sure to catch the recordings below.
Now, let’s dive right in!
Subscribe Here
GLOBAL NEWS
Syria | Assad Regime Overthrown
The Assad regime, infamous for its financial repression and brutal authoritarianism, has been overthrown following the rebel capture of Damascus, forcing Bashar al-Assad and his family to flee to Moscow. For 24 years under Assad — and 53 years of Assad family rule — the regime manipulated the economy to maintain its grip on power. Policies such as enforcing artificial currency exchange rates, restricting bank withdrawals, and imposing strict controls on the flow of goods and money plunged over 90% of Syrians into poverty. This economic stranglehold, combined with systemic human rights abuses, defined his reign. With the regime’s collapse, Syrians now face a pivotal moment to rebuild their country and pursue a future of more financial freedom.
China | Youth Bear the Brunt of Economic Slowdown
China’s slowing economy is forcing younger generations into increasingly precarious financial positions. Youth unemployment has soared past 17%, and even those who find work face stagnant wages and unmet income expectations. To survive, many young people are embracing extreme frugality — capping food expenses at just 500 yuan ($70), eating in the dark to save electricity, and avoiding dining out entirely. The middle class, weighed down by debt and a bleak economic outlook, is also adopting similar austerity measures. This growing financial strain offers a stark snapshot of China’s economic challenges and raises deep concerns about the long-term prosperity and opportunities for the nation’s youth.
Tunisia | Growing Repression of Journalists Amidst Worsening Economic Crisis
Tunisia is grappling with a worsening economic crisis, as citizens face soaring unemployment, a collapsing currency, and the devastating impacts of financial mismanagement. Amid this economic turmoil, President Kais Saied is intensifying his crackdown on dissent, imprisoning journalists in overcrowded cells, denying them medical care, and subjecting them to psychological torture — blatant evidence of the state’s disregard for human rights. Saied’s regime has also weaponized vague morality laws to target activists, influencers, and musicians, ensuring no opposition voice goes unpunished. By silencing dissent, Saied seeks to deflect attention from the regime’s economic failures, positioning the state as a moral authority while deepening the suffering of journalists and the broader public.
Pakistan | Testing Internet Firewall to Increase Financial Surveillance
Pakistan’s government is testing a nationwide Internet firewall, a tool designed to monitor, censor, and control online content by filtering internet traffic at the state level. By leveraging technology sourced from China, officials can block websites, restrict apps, and track individual online activity. This firewall poses a severe threat to financial freedom, as the military regime could use it to restrict access to tools like Bitcoin, cutting off alternative financial systems that offer privacy and independence. Civil society, including activists, journalists, and political dissidents, faces heightened surveillance, repression, and limited access to information — further curtailing their capacity to organize or express dissent.
India | Central Bank Governor Shares CBDC Vision
Outgoing Reserve Bank of India (RBI) Gov.Shaktikanta Das reaffirmed his vision for India’s central bank digital currency (CBDC), the digital rupee, as the nation’s currency continues to reach a record low against the US dollar. While hailed as the “future of currency” and praised for its potential economic benefits, the CBDC raises serious concerns. It grants the state unprecedented power to surveil transactions, freeze funds, and block payments in real-time — an alarming reality in a country already known for freezing opposition bank accounts and imposing rigid KYC requirements. Das’s hopes of a CBDC to “underpin the payment systems of the future” prioritizes state control at the expense of individual freedoms.
Georgia | Internet Shutdowns Amid Energy Crisis
In the breakaway Georgian region of Abkhazian, Russian-backed officials are using an energy crisis as a pretext to tighten Internet controls. Blaming illegal Bitcoin mining for electricity shortages, officials imposed nightly Internet shutdowns from midnight to 7:00 a.m., starting Dec. 10. These restrictions, coupled with power rationing and school closures, exacerbate hardships for residents as the region grapples with reduced energy from Russia and the Enguri hydroelectric plant. By painting Bitcoin as the villain, officials divert attention from broader governance failures while consolidating their grip over online communication and suppressing access to alternative financial tools.
LATEST IN BITCOIN NEWS, DEVELOPMENT, AND COMMUNITY
Klever Wallet | Integrates Lightning Network
Klever Wallet, a KYC-free digital asset wallet popular in underbanked countries like Nigeria, Brazil, India, and the Philippines, integrated the Lightning Network through the Breez SDK. This integration will empower its 100,000 active monthly users with fast, low-cost Bitcoin transactions directly from the wallet. By using the Breez SDK, Klever eliminates the complexities of Lightning channel management for users while maintaining a self-custodial design. This integration enhances financial freedom for its global user base — particularly in regions where traditional systems fall short.
Fedi | Adds Cashu Melting and Portable Nostr Keys
Fedi, a company leveraging Bitcoin and ecash technology to support communities, especially under authoritarian regimes, announced the integration of Cashu melting to enable users to receive Cashu ecash directly within the Fedi app. Built on the Chaumian ecash protocol, Cashu allows users to transact ecash tokens with strong privacy guarantees, minimal costs, and instant settlements, though with a custodial tradeoff. Additionally, Fedi now supports portable Nostr keys, allowing users to interact with external Nostr clients like Primal and Amethyst. Together, these updates enhance financial privacy and accessibility, offering users more control over their transactions and a portable digital identity, advancing financial freedom in underserved regions.
Core Lightning | Releases Latest Version with BOLT 12 by Default
Core Lightning, an implementation of the Lightning Network, introduced improvements to privacy and functionality with its latest v24.11 release. The update enables BOLT 12 offers by default when sending and receiving Bitcoin payments. BOLT 12 is an important update to the Lightning Network that brings increased receiver privacy, greater censorship resistance, and reusable payment requests for recurring payments. The update also includes xpay, an experimental payment plugin for advanced routing of payments on the Lightning Network. With these features, users of wallets and applications built with Core Lightning can maintain greater privacy and experience more optimized payments.
Proton Wallet | Implements Replace-by-Fee for Bitcoin Transactions
Proton, the company behind privacy tools like Proton Mail and Proton VPN, added support for Replace-by-Fee (RBF) transactions in Proton Wallet, its self-custodial and privacy-centric Bitcoin wallet. RBF allows users to increase the fee on stuck transactions to expedite confirmation and allow the payment to settle faster. The wallet also uses strong encryption and offers accessible recovery methods, ensuring users — like activists in hostile environments — maintain financial autonomy. Watch this tutorial by Bitcoin educator BTC Sessions to learn how to use Proton Wallet.
Bitcoin Design Community | South American Bitcoin UX Bootcamp
The Bitcoin Design Community, with support from HRF, will be hosting a South American UX Bitcoin Bootcamp. This program will support ten skilled UX designers across South America to develop and refine their design expertise within the Bitcoin ecosystem. Participants will also have the opportunity to attend the 2025 bitcoin++ developer conference in Florianopolis, Brazil, where they will receive specialized UX training and engage in hands-on learning with Bitcoin-related technologies. UX designers with an interest in Bitcoin are encouraged to apply here.
OpenSats | Announces Ninth Wave of Nostr Grants
OpenSats, a public nonprofit funding free and open-source software and projects, announced its ninth wave of grants supporting projects built on the decentralized Nostr protocol. Among the grantees is Pokey, an Android app enhancing Nostr and communications in restrictive environments through offline Bluetooth mesh networking and multi-account support. These features are particularly valuable for anyone facing Internet blackouts or state censorship. Another recipient, Persian NIPs, is breaking language barriers by localizing Nostr resources for Persian/Farsi speakers. The project will translate key protocols, user guides, and developer documentation, bringing decentralized and uncensorable technology to millions of people.
RECOMMENDED CONTENT
Africa Bitcoin Conference Livestream
Held from Dec. 9-11, 2024, in Nairobi, Kenya, the Africa Bitcoin Conference brought together human rights defenders, educators, and developers from across the continent to learn, collaborate, and innovate on freedom technologies. Supported by HRF, the event offered an inspiring mix of keynotes, workshops, panel discussions, and hackathons, all dedicated to advancing open-source solutions to fight authoritarianism and financial repression. This vibrant gathering highlighted innovative ideas and practical tools to empower communities worldwide. If you missed it, you can still catch the conversations and breakthroughs by watching the livestream here. Highlight talks include those from Farida Nabourema, Femi Longe, Jack Dorsey, and more.
-
@ 609899dc:13493d8d
2025-01-08 10:16:53Simplify your Arlo security system setup with Myarlosetup.From connecting devices to setting up settings for maximum security, our professional assistance guarantees a seamless installation experience. We assist you in smoothly integrating your floodlights, doorbells, and cameras into your system. Get improved protection and real-time monitoring for your house or place of business. You can rely on Myarlosetup to offer detailed guidance and guarantee a simple and effective Arlo security system setup. Easily secure your home now!
-
@ 0e8c41eb:95ff0faa
2024-07-08 14:36:14Chef's notes
Sprinkle a pinch of salt in a bowl. Sift 275 grams of flour above it. Make a well in the center of the flour and sprinkle the yeast into it. Add 50 grams of butter, 25 grams of sugar, and the egg. Pour in the milk and knead the dough with the mixer or by hand into a smooth dough. If necessary, add a bit more flour if the dough is too sticky. Form the dough into a ball. Let the dough rise covered with cling film at room temperature for 1 hour.
Peel the apples. Cut the apples and apricots into pieces. Cook the fruit with 150 grams of sugar and 50 ml of water in 15 minutes into a thick compote. Let this fruit filling cool.
Knead the dough again briefly and roll it out to a round sheet of about 28-30 cm in diameter, so that it fits well over the baking tin. Press the dough into the tin and press it well into the corners. Let the dough rise again for 10 minutes and cut off the excess edges.
Spread the fruit filling over the dough.
Mix the rest of the flour with the remaining 100 grams of butter and 100 grams of sugar and knead it with your fingers into a crumbly mixture. Sprinkle this crumble mixture over the fruit filling. Bake the tart in the preheated oven at 200°C for about 30 minutes until golden brown.
Variations: Only apple? Make this tart with 1 kilo of apples. High or low? You can also bake the crumble tart in a low tart tin of 30 cm diameter. If the fruit filling is a bit too voluminous, you can make double the crumble mixture and sprinkle it over the larger surface area.
Additional needs: Mixer with dough hooks or food processor Cling film Round baking tin with a diameter of 28-30 cm, greased
Details
- ⏲️ Prep time: 45 min + 1 hour Rising
- 🍳 Cook time: 30 minutes
- 🍽️ Servings: 8
Ingredients
- 375 grams flour
- 1 packet dried yeast (7 grams)
- 125 grams unsalted butter, at room temperature
- 275 grams sugar
- 1 egg
- 100 ml milk, at room temperature
- 500 grams apples
- 500 grams apricots (fresh or from a can)
Directions
- Sprinkle a pinch of salt in a bowl. Sift 275 grams of flour above it. Make a well in the center of the flour and sprinkle the yeast into it. Add 50 grams of butter, 25 grams of sugar, and the egg. Pour in the milk and knead the dough with the mixer or by hand into a smooth dough. If necessary, add a bit more flour if the dough is too sticky. Form the dough into a ball. Let the dough rise covered with cling film at room temperature for 1 hour.
- Peel the apples. Cut the apples and apricots into pieces. Cook the fruit with 150 grams of sugar and 50 ml of water in 15 minutes into a thick compote. Let this fruit filling cool.
- Knead the dough again briefly and roll it out to a round sheet of about 28-30 cm in diameter, so that it fits well over the baking tin. Press the dough into the tin and press it well into the corners. Let the dough rise again for 10 minutes and cut off the excess edges.
- Spread the fruit filling over the dough.
-
@ 6871d8df:4a9396c1
2024-06-12 22:10:51Embracing AI: A Case for AI Accelerationism
In an era where artificial intelligence (AI) development is at the forefront of technological innovation, a counter-narrative championed by a group I refer to as the 'AI Decels'—those advocating for the deceleration of AI advancements— seems to be gaining significant traction. After tuning into a recent episode of the Joe Rogan Podcast, I realized that the prevailing narrative around AI was heading in a dangerous direction. Rogan had Aza Raskin and Tristan Harris, technology safety advocates, who released a talk called 'The AI Dilemma,' on for a discussion. You may know them from the popular documentary 'The Social Dilemma' on the dangers of social media. It became increasingly clear that the cautionary stance dominating this discourse might be tipping the scales too far, veering towards an over-regulated future that stifles innovation rather than fostering it.
Are we moving too fast?
While acknowledging AI's benefits, Aza and Tristan fear it could be dangerous if not guided by ethical standards and safeguards. They believe AI development is moving too quickly and that the right incentives for its growth are not in place. They are concerned about the possibility of "civilizational overwhelm," where advanced AI technology far outpaces 21st-century governance. They fear a scenario where society and its institutions cannot manage or adapt to the rapid changes and challenges introduced by AI.
They argue for regulating and slowing down AI development due to rapid, uncontrolled advancement driven by competition among companies like Google, OpenAI, and Microsoft. They claim this race can lead to unsafe releases of new technologies, with AI systems exhibiting unpredictable, emergent behaviors, posing significant societal risks. For instance, AI can inadvertently learn tasks like sentiment analysis or human emotion understanding, creating potential for misuse in areas like biological weapons or cybersecurity vulnerabilities.
Moreover, AI companies' profit-driven incentives often conflict with the public good, prioritizing market dominance over safety and ethics. This misalignment can lead to technologies that maximize engagement or profits at societal expense, similar to the negative impacts seen with social media. To address these issues, they suggest government regulation to realign AI companies' incentives with safety, ethical considerations, and public welfare. Implementing responsible development frameworks focused on long-term societal impacts is essential for mitigating potential harm.
This isn't new
Though the premise of their concerns seems reasonable, it's dangerous and an all too common occurrence with the emergence of new technologies. For example, in their example in the podcast, they refer to the technological breakthrough of oil. Oil as energy was a technological marvel and changed the course of human civilization. The embrace of oil — now the cornerstone of industry in our age — revolutionized how societies operated, fueled economies, and connected the world in unprecedented ways. Yet recently, as ideas of its environmental and geopolitical ramifications propagated, the narrative around oil has shifted.
Tristan and Aza detail this shift and claim that though the period was great for humanity, we didn't have another technology to go to once the technological consequences became apparent. The problem with that argument is that we did innovate to a better alternative: nuclear. However, at its technological breakthrough, it was met with severe suspicions, from safety concerns to ethical debates over its use. This overregulation due to these concerns caused a decades-long stagnation in nuclear innovation, where even today, we are still stuck with heavy reliance on coal and oil. The scare tactics and fear-mongering had consequences, and, interestingly, they don't see the parallels with their current deceleration stance on AI.
These examples underscore a critical insight: the initial anxiety surrounding new technologies is a natural response to the unknowns they introduce. Yet, history shows that too much anxiety can stifle the innovation needed to address the problems posed by current technologies. The cycle of discovery, fear, adaptation, and eventual acceptance reveals an essential truth—progress requires not just the courage to innovate but also the resilience to navigate the uncertainties these innovations bring.
Moreover, believing we can predict and plan for all AI-related unknowns reflects overconfidence in our understanding and foresight. History shows that technological progress, marked by unexpected outcomes and discoveries, defies such predictions. The evolution from the printing press to the internet underscores progress's unpredictability. Hence, facing AI's future requires caution, curiosity, and humility. Acknowledging our limitations and embracing continuous learning and adaptation will allow us to harness AI's potential responsibly, illustrating that embracing our uncertainties, rather than pretending to foresee them, is vital to innovation.
The journey of technological advancement is fraught with both promise and trepidation. Historically, each significant leap forward, from the dawn of the industrial age to the digital revolution, has been met with a mix of enthusiasm and apprehension. Aza Raskin and Tristan Harris's thesis in the 'AI Dilemma' embodies the latter.
Who defines "safe?"
When slowing down technologies for safety or ethical reasons, the issue arises of who gets to define what "safe" or “ethical” mean? This inquiry is not merely technical but deeply ideological, touching the very core of societal values and power dynamics. For example, the push for Diversity, Equity, and Inclusion (DEI) initiatives shows how specific ideological underpinnings can shape definitions of safety and decency.
Take the case of the initial release of Google's AI chatbot, Gemini, which chose the ideology of its creators over truth. Luckily, the answers were so ridiculous that the pushback was sudden and immediate. My worry, however, is if, in correcting this, they become experts in making the ideological capture much more subtle. Large bureaucratic institutions' top-down safety enforcement creates a fertile ground for ideological capture of safety standards.
I claim that the issue is not the technology itself but the lens through which we view and regulate it. Suppose the gatekeepers of 'safety' are aligned with a singular ideology. In that case, AI development would skew to serve specific ends, sidelining diverse perspectives and potentially stifling innovative thought and progress.
In the podcast, Tristan and Aza suggest such manipulation as a solution. They propose using AI for consensus-building and creating "shared realities" to address societal challenges. In practice, this means that when individuals' viewpoints seem to be far apart, we can leverage AI to "bridge the gap." How they bridge the gap and what we would bridge it toward is left to the imagination, but to me, it is clear. Regulators will inevitably influence it from the top down, which, in my opinion, would be the opposite of progress.
In navigating this terrain, we must advocate for a pluralistic approach to defining safety, encompassing various perspectives and values achieved through market forces rather than a governing entity choosing winners. The more players that can play the game, the more wide-ranging perspectives will catalyze innovation to flourish.
Ownership & Identity
Just because we should accelerate AI forward does not mean I do not have my concerns. When I think about what could be the most devastating for society, I don't believe we have to worry about a Matrix-level dystopia; I worry about freedom. As I explored in "Whose data is it anyway?," my concern gravitates toward the issues of data ownership and the implications of relinquishing control over our digital identities. This relinquishment threatens our privacy and the integrity of the content we generate, leaving it susceptible to the inclinations and profit of a few dominant tech entities.
To counteract these concerns, a paradigm shift towards decentralized models of data ownership is imperative. Such standards would empower individuals with control over their digital footprints, ensuring that we develop AI systems with diverse, honest, and truthful perspectives rather than the massaged, narrow viewpoints of their creators. This shift safeguards individual privacy and promotes an ethical framework for AI development that upholds the principles of fairness and impartiality.
As we stand at the crossroads of technological innovation and ethical consideration, it is crucial to advocate for systems that place data ownership firmly in the hands of users. By doing so, we can ensure that the future of AI remains truthful, non-ideological, and aligned with the broader interests of society.
But what about the Matrix?
I know I am in the minority on this, but I feel that the concerns of AGI (Artificial General Intelligence) are generally overblown. I am not scared of reaching the point of AGI, and I think the idea that AI will become so intelligent that we will lose control of it is unfounded and silly. Reaching AGI is not reaching consciousness; being worried about it spontaneously gaining consciousness is a misplaced fear. It is a tool created by humans for humans to enhance productivity and achieve specific outcomes.
At a technical level, large language models (LLMs) are trained on extensive datasets and learning patterns from language and data through a technique called "unsupervised learning" (meaning the data is untagged). They predict the next word in sentences, refining their predictions through feedback to improve coherence and relevance. When queried, LLMs generate responses based on learned patterns, simulating an understanding of language to provide contextually appropriate answers. They will only answer based on the datasets that were inputted and scanned.
AI will never be "alive," meaning that AI lacks inherent agency, consciousness, and the characteristics of life, not capable of independent thought or action. AI cannot act independently of human control. Concerns about AI gaining autonomy and posing a threat to humanity are based on a misunderstanding of the nature of AI and the fundamental differences between living beings and machines. AI spontaneously developing a will or consciousness is more similar to thinking a hammer will start walking than us being able to create consciousness through programming. Right now, there is only one way to create consciousness, and I'm skeptical that is ever something we will be able to harness and create as humans. Irrespective of its complexity — and yes, our tools will continue to become evermore complex — machines, specifically AI, cannot transcend their nature as non-living, inanimate objects programmed and controlled by humans.
The advancement of AI should be seen as enhancing human capabilities, not as a path toward creating autonomous entities with their own wills. So, while AI will continue to evolve, improve, and become more powerful, I believe it will remain under human direction and control without the existential threats often sensationalized in discussions about AI's future.
With this framing, we should not view the race toward AGI as something to avoid. This will only make the tools we use more powerful, making us more productive. With all this being said, AGI is still much farther away than many believe.
Today's AI excels in specific, narrow tasks, known as narrow or weak AI. These systems operate within tightly defined parameters, achieving remarkable efficiency and accuracy that can sometimes surpass human performance in those specific tasks. Yet, this is far from the versatile and adaptable functionality that AGI represents.
Moreover, the exponential growth of computational power observed in the past decades does not directly translate to an equivalent acceleration in achieving AGI. AI's impressive feats are often the result of massive data inputs and computing resources tailored to specific tasks. These successes do not inherently bring us closer to understanding or replicating the general problem-solving capabilities of the human mind, which again would only make the tools more potent in our hands.
While AI will undeniably introduce challenges and change the aspects of conflict and power dynamics, these challenges will primarily stem from humans wielding this powerful tool rather than the technology itself. AI is a mirror reflecting our own biases, values, and intentions. The crux of future AI-related issues lies not in the technology's inherent capabilities but in how it is used by those wielding it. This reality is at odds with the idea that we should slow down development as our biggest threat will come from those who are not friendly to us.
AI Beget's AI
While the unknowns of AI development and its pitfalls indeed stir apprehension, it's essential to recognize the power of market forces and human ingenuity in leveraging AI to address these challenges. History is replete with examples of new technologies raising concerns, only for those very technologies to provide solutions to the problems they initially seemed to exacerbate. It looks silly and unfair to think of fighting a war with a country that never embraced oil and was still primarily getting its energy from burning wood.
The evolution of AI is no exception to this pattern. As we venture into uncharted territories, the potential issues that arise with AI—be it ethical concerns, use by malicious actors, biases in decision-making, or privacy intrusions—are not merely obstacles but opportunities for innovation. It is within the realm of possibility, and indeed, probability, that AI will play a crucial role in solving the problems it creates. The idea that there would be no incentive to address and solve these problems is to underestimate the fundamental drivers of technological progress.
Market forces, fueled by the demand for better, safer, and more efficient solutions, are powerful catalysts for positive change. When a problem is worth fixing, it invariably attracts the attention of innovators, researchers, and entrepreneurs eager to solve it. This dynamic has driven progress throughout history, and AI is poised to benefit from this problem-solving cycle.
Thus, rather than viewing AI's unknowns as sources of fear, we should see them as sparks of opportunity. By tackling the challenges posed by AI, we will harness its full potential to benefit humanity. By fostering an ecosystem that encourages exploration, innovation, and problem-solving, we can ensure that AI serves as a force for good, solving problems as profound as those it might create. This is the optimism we must hold onto—a belief in our collective ability to shape AI into a tool that addresses its own challenges and elevates our capacity to solve some of society's most pressing issues.
An AI Future
The reality is that it isn't whether AI will lead to unforeseen challenges—it undoubtedly will, as has every major technological leap in history. The real issue is whether we let fear dictate our path and confine us to a standstill or embrace AI's potential to address current and future challenges.
The approach to solving potential AI-related problems with stringent regulations and a slowdown in innovation is akin to cutting off the nose to spite the face. It's a strategy that risks stagnating the U.S. in a global race where other nations will undoubtedly continue their AI advancements. This perspective dangerously ignores that AI, much like the printing press of the past, has the power to democratize information, empower individuals, and dismantle outdated power structures.
The way forward is not less AI but more of it, more innovation, optimism, and curiosity for the remarkable technological breakthroughs that will come. We must recognize that the solution to AI-induced challenges lies not in retreating but in advancing our capabilities to innovate and adapt.
AI represents a frontier of limitless possibilities. If wielded with foresight and responsibility, it's a tool that can help solve some of the most pressing issues we face today. There are certainly challenges ahead, but I trust that with problems come solutions. Let's keep the AI Decels from steering us away from this path with their doomsday predictions. Instead, let's embrace AI with the cautious optimism it deserves, forging a future where technology and humanity advance to heights we can't imagine.
-
@ 3bf0c63f:aefa459d
2024-05-21 12:38:08Bitcoin transactions explained
A transaction is a piece of data that takes inputs and produces outputs. Forget about the blockchain thing, Bitcoin is actually just a big tree of transactions. The blockchain is just a way to keep transactions ordered.
Imagine you have 10 satoshis. That means you have them in an unspent transaction output (UTXO). You want to spend them, so you create a transaction. The transaction should reference unspent outputs as its inputs. Every transaction has an immutable id, so you use that id plus the index of the output (because transactions can have multiple outputs). Then you specify a script that unlocks that transaction and related signatures, then you specify outputs along with a script that locks these outputs.
As you can see, there's this lock/unlocking thing and there are inputs and outputs. Inputs must be unlocked by fulfilling the conditions specified by the person who created the transaction they're in. And outputs must be locked so anyone wanting to spend those outputs will need to unlock them.
For most of the cases locking and unlocking means specifying a public key whose controller (the person who has the corresponding private key) will be able to spend. Other fancy things are possible too, but we can ignore them for now.
Back to the 10 satoshis you want to spend. Since you've successfully referenced 10 satoshis and unlocked them, now you can specify the outputs (this is all done in a single step). You can specify one output of 10 satoshis, two of 5, one of 3 and one of 7, three of 3 and so on. The sum of outputs can't be more than 10. And if the sum of outputs is less than 10 the difference goes to fees. In the first days of Bitcoin you didn't need any fees, but now you do, otherwise your transaction won't be included in any block.
If you're still interested in transactions maybe you could take a look at this small chapter of that Andreas Antonopoulos book.
If you hate Andreas Antonopoulos because he is a communist shitcoiner or don't want to read more than half a page, go here: https://en.bitcoin.it/wiki/Coin_analogy
-
@ fa984bd7:58018f52
2024-02-28 22:15:25I have recently launched Wikifreedia, which is a different take on how Wikipedia-style systems can work.
Yes, it's built on nostr, but that's not the most interesting part.
The fascinating aspect is that there is no "official" entry on any topic. Anyone can create or edit any entry and build their own take about what they care about.
Think the entry about Mao is missing something? Go ahead and edit it, you don't need to ask for permission from anyone.
Stuart Bowman put it best on a #SovEng hike:
The path to truth is in the integration of opposites.
Since launching Wikifreedia, less than a week ago, quite a few people asked me if it would be possible to import ALL of wikipedia into it.
Yes. Yes it would.
I initially started looking into it to make it happen as I am often quick to jump into action.
But, after thinking about it, I am not convinced importing all of Wikipedia is the way to go.
The magical thing about building an encyclopedia with no canonical entry on any topic is that each individual can bring to light the part they are interested the most about a certain topic, it can be dozens or hundreds, or perhaps more, entries that focus on the edges of a topic.
Whereas, Wikipedia, in their Quijotean approach to truth, have focused on the impossible path of seeking neutrality.
Humans can't be neutral, we have biases.
Show me an unbiased human and I'll show you a lifeless human.
Biases are good. Having an opinion is good. Seeking neutrality is seeking to devoid our views and opinions of humanity.
Importing Wikipedia would mean importing a massive amount of colorless trivia, a few interesting tidbits, but, more important than anything, a vast amount of watered-down useless information.
All edges of the truth having been neutered by a democratic process that searches for a single truth via consensus.
"What's the worst that could happen?"
Sure, importing wikipedia would simply be one more entry on each topic.
Yes.
But culture has incredibly strong momentum.
And if the culture that develops in this type of media is that of exclusively watered-down comfortable truths, then some magic could be lost.
If people who are passionate or have a unique perspective about a topic feel like the "right approach" is to use the wikipedia-based article then I would see this as an extremely negative action.
An alternative
An idea we discussed on the #SovEng hike was, what if the wikipedia entry is processed by different "AI agents" with different perspectives.
Perhaps instead of blankly importing the "Napoleon" article, an LLM trained to behave as a 1850s russian peasant could be asked to write a wiki about Napoleon. And then an agent tried to behave like Margaret Thatcher could write one.
Etc, etc.
Embrace the chaos. Embrace the bias.
-
@ d830ee7b:4e61cd62
2025-01-08 07:56:25การเผชิญหน้า (The Collision Point)
กลางปี 2017 ที่ร้านคราฟท์เบียร์เล็ก ๆ ในย่านเกาะเกร็ด นนทบุรี อากาศร้อนจนเครื่องปรับอากาศ (ที่ยังไม่มี) ในร้านทำงานหนักแทบไหม้ "แจ๊ก กู้ดเดย์" (Jakk Goodday) นั่งลงบนเก้าอี้ไม้ที่เจ้าของร้านกันไว้ให้เป็นประจำ ราวกับเขาเป็นลูกค้าขาประจำระดับวีไอพี
กลิ่นกาแฟคั่ว ลอยผสมกับไอความร้อนจากนอกหน้าต่าง (ผิดร้านหรือเปล่า?) เกิดเป็นบรรยากาศขมติดปลายลิ้นชวนให้คนจิบแล้วอยากถอนใจ
เขาเหลือบมองออกไปนอกหน้าต่าง.. เห็นแสงแดดแผดเผาราวกับมันรู้ว่าสงคราม Blocksize กำลังคุกรุ่นขึ้นอีกครั้ง
บรรยากาศนอกหน้าต่างกับใน ฟอรัม Bitcointalk ช่างเหมือนกันจนน่าขนลุก มันร้อนแรง ไร้ความปรานี
แจ๊กเปิดแล็ปท็อป กดเข้าเว็บฟอรัม พอเสียงแจ้งเตือน “—ติ๊ง” ดังขึ้น คิ้วของเขาก็ขมวดเล็กน้อย คล้ายได้กลิ่นดินปืนกลางสนามรบ
“โรเจอร์ แวร์ (Roger Ver) ไลฟ์เดือดลั่นเวที!” “ปีเตอร์ วูเล (Pieter Wuille) โต้กลับเรื่อง SegWit!” “Hard Fork ใกล้ถึงจุดปะทะแล้ว!”
แจ๊กคลิกเข้าไปในลิงก์ของไลฟ์ทันที เหมือนมือของเขาไม่ต้องการคำสั่งจากสมอง ความคุ้นเคยกับเหตุการณ์แบบนี้บอกเขาว่า นี่ไม่ใช่ดีเบตธรรมดา แต่มันอาจเปลี่ยนอนาคตของ Bitcoin ได้จริง ๆ
เห็นแค่พาดหัวสั้น ๆ แต่ความตึงเครียดก็ชัดเจนขึ้นเรื่อย ๆ ทุกข้อความเหมือนสุมไฟใส่ใจกองหนึ่งที่พร้อมระเบิดได้ทุกเมื่อ
โทรศัพท์ของแจ๊กดังพร้อมปรากฏชื่อ แชมป์ ‘PIGROCK’ ลอยขึ้นมา เขาหยิบขึ้นมารับทันที
“ว่าไงวะแชมป์… มีอะไรด่วนหรือเปล่า?” น้ำเสียงแจ๊กฟังดูเหมือนง่วง ๆ แต่จริง ๆ เขาพร้อมจะลุกมาวิเคราะห์สถานการณ์ให้ฟังทุกเมื่อ
“พี่แจ๊ก.. ผมอ่านดีเบตเรื่อง SegWit ในฟอรัมอยู่ครับ บางคนด่าว่ามันไม่ได้แก้ปัญหาจริง ๆ บ้างก็บอกถ้าเพิ่ม Blocksize ไปเลยจะง่ายกว่า... ผมเลยสงสัยว่า Hard Fork ที่เค้าพูดถึงกันนี่คืออะไร ใครคิดอะไรก็ Fork กันได้ง่าย ๆ เลยเหรอ"
"แล้วถ้า Fork ไปหลายสาย สุดท้ายเหรียญไหนจะเป็น ‘Bitcoin ที่แท้จริง’ ล่ะพี่?”
“แล้วการ Fork มันส่งผลกับนักลงทุนยังไงครับ? คนทั่วไปอย่างผมควรถือไว้หรือขายหนีตายดีล่ะเนี่ย?”
แจ๊กยิ้มมุมปาก ชอบใจที่น้องถามจี้จุด
“เอางี้… การ Fork มันเหมือนแบ่งถนนออกเป็นสองสาย ใครชอบกติกาเก่าก็วิ่งถนนเส้นเก่า ใครอยากแก้กติกาใหม่ก็ไปถนนเส้นใหม่"
"แต่ประเด็นคือ... นี่ไม่ใช่เรื่องเล็ก ๆ เพราะมีผลต่ออัตลักษณ์ของ Bitcoin ทั้งหมดเลยนะมึง—ใครจะยอมปล่อยผ่านง่าย ๆ”
"คิดดูสิ ถ้าครั้งนี้พวกเขา Fork จริง มันอาจไม่ได้เปลี่ยนแค่เครือข่าย แต่เปลี่ยนวิธีที่คนมอง Bitcoin ไปตลอดกาลเลยนะ"
"แล้วใครมันจะอยากลงทุนในระบบที่แตกแยกซ้ำแล้วซ้ำเล่าวะ?"
“งั้นหมายความว่าตอนนี้ก็มีสองแนวใหญ่ ๆ ชัวร์ใช่ไหมครับ?” แชมป์ถามต่อ
“ฝั่ง โรเจอร์ แวร์ ที่บอกว่าต้องเพิ่ม Blocksize ให้ใหญ่จุใจ กับฝั่งทีม Core อย่าง ปีเตอร์ วูเล ที่ยืนยันต้องใช้ SegWit ทำให้บล็อกเบา ไม่กระทบการกระจายอำนาจ?”
“ใช่เลย” แจ๊กจิบกาแฟดำเข้ม ๆ ผสมน้ำผึ้งไปหนึ่งอึก
“โรเจอร์นี่เขาเชื่อว่า Bitcoin ต้องเป็นเงินสดดิจิทัลที่ใช้จ่ายไว ค่าธรรมเนียมไม่แพง ส่วนปีเตอร์กับ Bitcoin Core มองว่าการเพิ่มบล็อกเยอะ ๆ มันจะไปฆ่า Node รายย่อย คนไม่มีทุนก็รัน Node ไม่ไหว สุดท้าย Bitcoin จะกลายเป็นระบบกึ่งรวมศูนย์ ซึ่งมันผิดหลักการเดิมของ ซาโตชิ ไงล่ะ”
“ฟังแล้วก็ไม่ใช่เรื่องง่ายนะพี่… งั้นที่ผมได้ยินว่า จิฮั่น อู๋ (Jihan Wu) เจ้าของ Bitmain ที่ถือ Hashrate เกินครึ่งนี่ก็มาอยู่ฝั่งเดียวกับโรเจอร์ใช่ไหม?"
"เพราะยิ่งบล็อกใหญ่ ค่าธรรมเนียมยิ่งเพิ่ม นักขุดก็ได้กำไรสูงขึ้นใช่ป่ะ?”
“ไอ้เรื่องกำไรก็ส่วนหนึ่ง...” แจ๊กถอนหายใจ
“แต่ที่สำคัญกว่านั้นคืออำนาจต่อรอง… ตอนประชุมลับที่ฮ่องกงเมื่อปีที่แล้ว พี่เองก็ถูกชวนให้เข้าไปในฐานะคนกลาง เลยเห็นภาพน่าขนลุกอยู่หน่อย ๆ"
"จิฮั่นนั่งไขว่ห้างด้วยสีหน้ามั่นใจมาก ด้วย Hashrate ราว 60% ของโลก สั่งซ้ายหันขวาหันเหมือนเป็นแม่ทัพใหญ่ได้เลย พอโรเจอร์ก็ไฟแรงอยู่แล้ว อยากให้ Bitcoin ครองโลกด้วยวิธีของเขา สองคนนี่จับมือกันทีจะเขย่าชุมชน Bitcoin ได้ทั้งกระดาน”
"พี่รู้สึกเหมือนนั่งอยู่ในศึกชิงบัลลังก์ยุคใหม่ คนหนึ่งยึดพลังขุด คนหนึ่งยึดความศรัทธาในชื่อ Bitcoin แต่สิ่งที่พี่สงสัยในตอนนั้นคือ… พวกเขาสู้เพื่อใครกันแน่?"
แชมป์เงียบไปครู่เหมือนกำลังประมวลผล “แล้วตอนนั้นพี่คิดยังไงบ้างครับ? รู้สึกกลัวหรือว่ายังไง?”
“จะไม่กลัวได้ไง!” แจ๊กหัวเราะแห้ง ๆ แวบหนึ่งก็นึกถึงสีหน้าที่ยิ้มเยาะของทั้งคู่ตอนประกาศความพร้อมจะ Fork
“พี่อดคิดไม่ได้ว่าถ้า Core ยังไม่ยอมขยายบล็อก พวกนั้นจะลากนักขุดทั้งกองทัพแฮชเรตไปทำเครือข่ายใหม่ให้เป็น ‘Bitcoin สายใหญ่’ แล้วทิ้งเครือข่ายเดิมให้ซวนเซ"
"แค่คิดก็นึกถึงสงครามกลางเมืองในหนังประวัติศาสตร์แล้วน่ะ.. แตกเป็นสองฝ่าย สุดท้ายใครแพ้ใครชนะ ไม่มีใครทำนายได้จริง ๆ”
พูดจบ.. เขาเปิดฟอรัมดูไลฟ์ดีเบตจากงานในปี 2017 ต่อ โรเจอร์ แวร์ กำลังพูดในโทนร้อนแรง
“Bitcoin ไม่ใช่ของคนรวย! ถ้าคุณไม่เพิ่ม Blocksize คุณก็ทำให้ค่าธรรมเนียมพุ่งจนคนธรรมดาใช้ไม่ได้!”
ขณะเดียวกัน ปีเตอร์ วูเล่ ยืนอยู่ฝั่งตรงข้าม สีหน้าเยือกเย็นราวกับตั้งรับมานาน “การเพิ่มบล็อกคือการทำลายโครงสร้าง Node รายย่อยในระยะยาว แล้วมันจะยังเรียกว่ากระจายอำนาจได้หรือ?”
"ถ้าคุณอยากให้ Bitcoin เป็นของคนรวยเพียงไม่กี่คน ก็เชิญขยายบล็อกไปเถอะนะ แต่ถ้าอยากให้มันเป็นระบบที่คนทุกระดับมีส่วนร่วมจริง ๆ ..คุณต้องฟังเสียง Node รายเล็กด้วย" ปีเตอร์กล่าว
เสียงผู้คนในงานโห่ฮากันอย่างแตกเป็นสองฝ่าย บ้างก็เชียร์ความตรงไปตรงมาของโรเจอร์ บ้างก็เคารพเหตุผลเชิงเทคนิคของปีเตอร์
ข้อความจำนวนมหาศาลในฟอรัมต่างโหมกระพือไปต่าง ๆ นานา มีทั้งคำด่าหยาบคายจนแจ๊กต้องเบือนหน้า ตลอดจนการวิเคราะห์ลึก ๆ ถึงอนาคตของ Bitcoin ที่อาจไม่เหมือนเดิม
ในระหว่างนั้น.. แชมป์ส่งข้อความ Discord กลับมาอีก
“พี่ ถ้า Fork จริง ราคาจะป่วนแค่ไหน? ที่เขาว่าคนถือ BTC จะได้เหรียญใหม่ฟรี ๆ จริงไหม? ผมกลัวว่าถ้าเกิดแบ่งเครือข่ายไม่รู้กี่สาย ตลาดอาจมั่วจนคนหายหมดก็ได้ ใช่ไหมครับ?”
"แล้วถ้าเครือข่ายใหม่ล้มเหลวล่ะครับ? จะส่งผลอะไรต่อชุมชน Bitcoin เดิม?"
"ไอ้แชมป์มึงถามรัวจังวะ!?" แจ๊กสบถเพราะเริ่มตั้งรับไม่ทัน
“ก็ขึ้นกับตลาดจะเชื่อว่าสายไหนเป็น ‘ของจริง’ อีกนั่นแหละ” แจ๊กพิมพ์กลับ
“บางคนถือไว้เผื่อได้เหรียญใหม่ฟรี บางคนขายหนีตายก่อน"
"พี่เองก็ยังไม่กล้าการันตีเลย แต่ที่แน่ ๆ สงครามนี้ไม่ได้มีแค่ผลกำไร มันกระทบศรัทธาของชุมชน Bitcoin ทั้งหมดด้วย"
"ถ้าชาวเน็ตเลิกเชื่อมั่น หรือคนนอกมองว่าพวกเราทะเลาะกันเองเหมือนเด็กแย่งของเล่น ต่อให้ฝั่งไหนชนะ ก็อาจไม่มีผู้ใช้เหลือให้ฉลอง”
แล้วสายตาแจ๊กก็ปะทะกับกระทู้ใหม่ที่เด้งขึ้นมาบนหน้าฟอรัม
“โรเจอร์ แวร์ ประกาศ: ถ้าไม่เพิ่ม Blocksize เราจะฟอร์กเป็น Bitcoin ที่แท้จริง!”
ตัวหนังสือหนาแปะอยู่ตรงนั้นส่งแรงสั่นสะเทือนราวกับจะดึงคนในวงการให้ต้องเลือกข้างกันแบบไม่อาจกลับหลังได้
แจ๊กเอื้อมมือปิดแล็ปท็อปช้า ๆ คล้ายยอมรับความจริงว่าหนทางประนีประนอมอาจไม่มีอีกแล้ว..
“สงครามนี่คงใกล้ระเบิดเต็มทีล่ะนะ” เขาลุกจากเก้าอี้ สะพายเป้ พึมพำกับตัวเองขณะมองกาแฟดำที่เหลือครึ่งแก้ว “ถ้าพวกเขาฟอร์กจริง โลกคริปโตฯ ที่เราเคยรู้จักอาจไม่มีวันเหมือนเดิมอีกต่อไป”
เขามองออกไปนอกหน้าต่าง แสงแดดที่แผดเผาราวกับกำลังบอกว่า.. อนาคตของ Bitcoin อยู่ในจุดที่เส้นแบ่งระหว่างชัยชนะกับความล่มสลายเริ่มพร่าเลือน... และอาจไม่มีทางย้อนกลับ
ก่อนเดินออกจากร้าน เขากดส่งข้อความสั้น ๆ ถึงแชมป์
“เตรียมใจกับความปั่นป่วนไว้ให้ดี ไม่แน่ว่าเราอาจจะได้เห็น Bitcoin แตกเป็นหลายสาย.. ใครจะอยู่ใครจะไปไม่รู้เหมือนกัน แต่เรื่องนี้คงไม่จบง่าย ๆ แน่”
แจ๊กผลักประตูออกไปพบกับแดดจัดที่เหมือนแผดเผากว่าเดิม พายุร้อนไม่ได้มาแค่ในรูปความร้อนกลางกรุง แต่มาในรูป “สงคราม Blocksize” ที่พร้อมจะฉีกชุมชนคริปโตออกเป็นฝักฝ่าย และอาจลามบานปลายจนกลายเป็นศึกประวัติศาสตร์
ทว่าสิ่งที่ค้างคาใจกลับเป็นคำถามนั้น…
เมื่อเครือข่ายแบ่งเป็นหลายสายแล้ว เหรียญไหนจะเป็น Bitcoin จริง?
หรือบางที... ในโลกที่ใครก็ Fork ได้ตามใจ เราจะไม่มีวันได้เห็น “Bitcoin หนึ่งเดียว” อีกต่อไป?
คำถามที่ไม่มีใครตอบได้ชัดนี้ส่องประกายอยู่ตรงปลายทาง ราวกับป้ายเตือนว่า “อันตรายข้างหน้า” และคนในชุมชนทั้งหมดกำลังจะต้องเผชิญ…
โดยไม่มีใครมั่นใจเลยว่าจะรอด หรือจะแตกสลายไปก่อนกันแน่...
สองเส้นทาง (The Forked Path)
กลางปี 2017 ท้องฟ้าเหนือบุรีรัมย์ยังคงคุกรุ่นด้วยไอแดดและความร้อนแรงของสงคราม Blocksize แจ๊ก กู้ดเดย์ ก้าวเข้ามาในคาเฟ่เล็ก ๆ แห่งหนึ่งในย่านเทศบาลด้วยสีหน้าครุ่นคิด เขาพยายามมองหามุมสงบสำหรับนั่งตั้งหลักในโลกความเป็นจริง ก่อนจะจมดิ่งสู่สงครามในโลกดิจิทัลบนฟอรัม Bitcointalk อีกครั้ง
กลิ่นกาแฟคั่วเข้มลอยกระทบจมูก แจ๊กสั่งกาแฟดำแก้วโปรดแล้วปลีกตัวมาที่โต๊ะริมกระจก กระจกบานนั้นสะท้อนแสงอาทิตย์จัดจ้า ราวกับจะบอกว่าวันนี้คงไม่มีใครหนีความร้อนที่กำลังแผดเผา ทั้งในอากาศและในชุมชน Bitcoin ได้พ้น
เขาเปิดแล็ปท็อปขึ้น ล็อกอินเข้า Bitcointalk.org ตามเคย ข้อความและกระทู้มากมายกระหน่ำแจ้งเตือน ไม่ต่างอะไรจากสมรภูมิคำพูดที่ไม่มีวันหลับ “Hong Kong Agreement ล้มเหลวจริงหรือ?” “UASF คือปฏิวัติโดย Node?” เหล่านี้ล้วนสะท้อนความไม่แน่นอนในชุมชน Bitcoin ที่ตอนนี้ ดูคล้ายจะถึงจุดแตกหักเต็มที...
“ทั้งที่ตอนนั้นเราก็พยายามกันแทบตาย…” แจ๊กพึมพำ มองจอด้วยสายตาเหนื่อยใจพร้อมภาพความทรงจำย้อนกลับเข้าในหัว เขายังจำการประชุมที่ฮ่องกงเมื่อต้นปี 2016 ได้แม่น ยามนั้นความหวังในการประนีประนอมระหว่าง Big Block และ Small Block ดูเป็นไปได้ หากแต่กลายเป็นละครฉากใหญ่ที่จบลงโดยไม่มีใครยอมถอย...
...การประชุม Hong Kong Agreement (2016)
ภายในห้องประชุมหรูของโรงแรมใจกลางย่านธุรกิจฮ่องกง บรรยากาศตึงเครียดยิ่งกว่าการเจรจาสงบศึกในสมัยโบราณ
โรเจอร์ แวร์ ยืนเสนอว่า “การเพิ่ม Blocksize สำคัญต่ออนาคตของ Bitcoin — เราอยากให้คนทั่วไปเข้าถึงได้โดยไม่ต้องจ่ายค่าธรรมเนียมแพง ๆ”
“จิฮั่น อู๋ (Jihan Wu)” จาก Bitmain นั่งฝั่งเดียวกับโรเจอร์ คอยเสริมว่าการเพิ่มบล็อกคือโอกาสสำหรับนักขุด และหากทีม Core ไม่ยอม พวกเขาก็พร้อม “ดัน Fork” ขึ้นได้ทุกเมื่อ ด้วย Hashrate มหาศาลที่พวกเขาคุมไว้
ฝั่ง ปีเตอร์ วูเล (Pieter Wuille) กับ เกร็ก แมกซ์เวลล์ (Greg Maxwell) จาก Bitcoin Core เถียงกลับอย่างใจเย็นว่า “การขยายบล็อกอาจดึงดูดทุนใหญ่ ๆ แล้วไล่ Node รายย่อยออกไป ชุมชนอาจไม่เหลือความกระจายอำนาจอย่างที่ Satoshi ตั้งใจ”
สุดท้าย บทสรุปที่เรียกว่า Hong Kong Agreement ลงนามได้ก็จริง แต่มันกลับเป็นแค่ลายเซ็นบนกระดาษที่ไม่มีฝ่ายไหนเชื่อใจใคร
แจ๊กเบือนสายตาออกนอกหน้าต่าง สังเกตเห็นผู้คนเดินขวักไขว่ บ้างก็ดูรีบร้อน บ้างเดินทอดน่องเหมือนว่างเปล่า นี่คงไม่ต่างอะไรกับชาวเน็ตในฟอรัมที่แบ่งฝ่ายกันใน “สงคราม Blocksize” อย่างไม่มีทีท่าจะหยุด
แค่ไม่กี่นาที... เสียงโทรศัพท์ก็ดังขึ้น ชื่อ แชมป์ ‘PIGROCK’ โชว์หราเต็มจออีกครั้ง
“ว่าไงเจ้าแชมป์?” แจ๊กกรอกเสียงในสายด้วยอารมณ์เหนื่อย ๆ ทว่าพร้อมจะอธิบายเหตุการณ์ตามสไตล์คนที่ชอบครุ่นคิด
“พี่แจ๊ก.. ผมเข้าใจแล้วว่าการประชุมฮ่องกงมันล้มเหลว ตอนนี้ก็มีคนแยกเป็นสองขั้ว Big Block กับ SegWit แต่ผมเจออีกกลุ่มในฟอรัมเรียกว่า UASF (User-Activated Soft Fork) ที่เหมือนจะกดดันพวกนักขุดให้ยอมรับ SegWit..."
"อยากรู้ว่าตกลง UASF มันสำคัญยังไงครับ? ทำไมใคร ๆ ถึงเรียกว่าเป็น การปฏิวัติโดย Node กัน?”
แจ๊กอมยิ้มก่อนจะวางแก้วกาแฟลง พูดด้วยน้ำเสียงจริงจังกว่าเดิม “UASF น่ะหรือ? มันเปรียบได้กับการที่ ‘ชาวนา’ หรือ ‘ประชาชนตัวเล็ก ๆ’ ออกมาประกาศว่า ‘ฉันจะไม่รับบล็อกของนักขุดที่ไม่รองรับ SegWit นะ ถ้าแกไม่ทำตาม ฉันก็จะตัดบล็อกแกทิ้ง!’ เสมือนเป็นการปฏิวัติที่บอกว่าแรงขุดมากแค่ไหนก็ไม่สำคัญ ถ้าคนรัน Node ไม่ยอม… เชนก็เดินต่อไม่ได้”
“โห… ฟังดูแรงจริง ๆ พี่ แล้วถ้านักขุดไม่ร่วมมือ UASF จะเกิดอะไรขึ้น?” แชมป์ถามต่อเสียงสั่นนิด ๆ
“ก็อาจเกิด ‘Chain Split’ ยังไงล่ะ"
"แยกเครือข่ายเป็นสองสาย สุดท้ายเครือข่ายเดิม กับเครือข่ายใหม่ที่รองรับ SegWit ไม่ตรงกัน คนอาจสับสนหนักยิ่งกว่า Hard Fork ปกติด้วยซ้ำ"
"แต่นั่นแหละ... มันแสดงพลังว่าผู้ใช้ทั่วไปก็มีสิทธิ์กำหนดทิศทาง Bitcoin ไม่ได้น้อยไปกว่านักขุดเลย”
“เข้าใจแล้วครับพี่… เหมือน การปฏิวัติโดยประชาชนตาดำ ๆ ที่จับมือกันค้านอำนาจทุนใหญ่ใช่ไหม?” แชมป์หยุดครู่หนึ่ง “ผมเคยคิดว่า Node รายย่อยน้อยรายจะไปสู้อะไรไหว แต่ตอนนี้ดูท่าจะเปลี่ยนเกมได้จริงว่ะพี่…”
“ใช่เลย” แจ๊กตอบ
“นี่เป็นความพิเศษของ Bitcoin ที่บอกว่า ‘เราคุมเครือข่ายร่วมกัน’ แม้แต่ Bitmain ที่มี Hashrate มากกว่า 50% ก็หนาวได้ถ้าผู้ใช้หรือ Node รายย่อยรวมพลังกันมากพอ”
แชมป์ฟังด้วยความตื่นเต้นปนกังวล “แล้วแบบนี้ เรื่อง SegWit กับ Blocksize จะจบยังไงครับ? เห็นข่าวว่าถ้านักขุดโดนกดดันมาก ๆ คนอย่าง จิฮั่น อู๋ อาจออกไปสนับสนุน Bitcoin Cash ที่จะเปิดบล็อกใหญ่”
แจ๊กเลื่อนดูฟีดข่าวในฟอรัม Bitcointalk อีกครั้ง ก็เห็นพาดหัวชัด ๆ
“Bitmain ประกาศกร้าวพร้อมหนุน BCH เต็มพิกัด!”
เขาถอนหายใจเฮือกหนึ่ง “ก็ใกล้เป็นจริงแล้วล่ะ… โรเจอร์ แวร์ เองก็ผลักดัน BCH ว่าคือ Bitcoin แท้ที่ค่าธรรมเนียมถูก ใช้งานได้จริง ส่วนฝั่ง BTC ที่ยึดเอา SegWit เป็นหลัก ก็ไม่ยอมให้ Blocksize เพิ่มใหญ่เกินจำเป็น.."
"ต่างคนต่างมีเหตุผล... แต่อุดมการณ์นี่คนละทางเลย”
“แล้วพี่คิดว่าใครจะเป็นฝ่ายชนะครับ?”
“เฮ้ย.. มึงถามยากไปหรือเปล่า” แจ๊กหัวเราะหึ ๆ “ทุกคนมีโอกาสได้หมด และก็มีโอกาสพังหมดเหมือนกัน ถ้า UASF กดดันนักขุดให้อยู่กับ Core ได้ พวกเขาอาจยอมแพ้ แต่ถ้า Bitmain เทใจไป BCH นักขุดรายใหญ่คนอื่น ๆ ก็คงตาม"
"แล้วถ้าฝั่ง BCH เริ่มได้เปรียบ... อาจดึงคนไปเรื่อย ๆ สุดท้ายจะเหลือไหมล่ะฝั่ง SegWit ตัวจริง?”
“งั้น Node รายย่อยจะยืนอยู่ตรงไหนล่ะครับพี่?” แชมป์ถามอย่างหนักใจ
“Node รายย่อยและชุมชนผู้ใช้นี่แหละ คือ ตัวแปรชี้ขาด ทุกวันนี้คนกลุ่ม UASF พยายามโชว์พลังว่าตัวเองมีสิทธิ์ตั้งกติกาเหมือนกัน ไม่ใช่แค่นักขุด"
"อย่างที่บอก.. มันคือการ ‘ลุกขึ้นปฏิวัติ’ โดยชาวนา ต่อสู้กับเจ้าที่ที่ถือ ‘แฮชเรต’ เป็นอาวุธ”
แจ๊กตบบ่าตัวเองเบา ๆ ก่อนจะหัวเราะเล็กน้อย
“นี่แหละความมันของ Bitcoin ไม่มีเจ้าไหนสั่งได้เบ็ดเสร็จจริง ๆ ทุกฝั่งต่างถือไพ่คนละใบ สงครามยังไม่รู้จะจบยังไง ถึงอย่างนั้นมันก็สะท้อนวิญญาณ ‘decentralization’ ที่แท้จริง กล้ายอมรับสิทธิ์ทุกฝ่ายเพื่อแข่งขันกันตามกติกา”
จู่ ๆ ในหน้าฟอรัมก็มีกระทู้ใหม่เด้งเด่น “Bitmain หนุน Bitcoin Cash ด้วย Hashrate กว่า 50%! สงครามเริ่มแล้ว?” ข้อความนั้นดังโครมครามเหมือนระเบิดลงกลางวง
แจ๊กนิ่งไปชั่วขณะ สัมผัสได้ถึงความปั่นป่วนที่กำลังปะทุขึ้นอีกครั้ง เหงื่อบางเบาซึมบนหน้าผากแม้อากาศในคาเฟ่จะเย็นฉ่ำ เขาหันมองโทรศัพท์ที่ยังค้างสายกับแชมป์ แล้วเอ่ยด้วยน้ำเสียงจริงจัง
“นี่ล่ะ.. จุดเริ่มของสองเส้นทางอย่างชัดเจน… บล็อกใหญ่จะไปกับ BCH ส่วน SegWit ก็อยู่กับ BTC แน่นอนว่าทั้งสองฝ่ายไม่คิดถอยง่าย ๆ นักขุดจะเลือกข้างไหน? Node รายย่อยจะยอมใคร?"
"เมื่อสงครามครั้งนี้นำไปสู่การแบ่งเครือข่าย ใครกันแน่จะเป็นผู้ชนะตัวจริง? หรืออาจไม่มีผู้ชนะเลยก็เป็นได้”
ปลายสายเงียบงัน มีแต่เสียงหายใจของแชมป์ที่สะท้อนความกังวลปนอยากรู้อย่างแรง
“พี่… สุดท้ายแล้วเรากำลังยืนอยู่บนรอยแยกที่พร้อมจะฉีกทุกอย่างออกเป็นชิ้น ๆ ใช่ไหมครับ?”
“อาจจะใช่ก็ได้... หรือถ้ามองอีกมุม อาจเป็นวัฏจักรที่ Bitcoin ต้องเจอเป็นระยะ ทุกคนมีสิทธิ์ Fork ได้ตามใจใช่ไหมล่ะ? ก็ขอให้โลกได้เห็นกันว่าชุมชนไหนแน่จริง” แจ๊กพูดทิ้งท้ายก่อนจะแย้มยิ้มเจือรอยอ่อนล้า
ภาพบนจอคอมพิวเตอร์ฉายกระทู้ถกเถียงกันไม่หยุด ประหนึ่งเวทีดีเบตที่ไม่มีวันปิดไฟ แจ๊กจิบกาแฟอึกสุดท้ายเหมือนจะเตรียมพร้อมใจก่อนเข้าสู่สนามรบครั้งใหม่ สงครามยังไม่จบ.. ซ้ำยังดูหนักข้อยิ่งขึ้นเรื่อย ๆ
เขาลุกขึ้นจากโต๊ะ ชำเลืองมองแสงแดดจัดจ้าที่สาดลงมาไม่หยุด เปรียบเหมือนไฟแห่งข้อขัดแย้งที่เผาผลาญทั้งชุมชน Bitcoin ไม่ว่าใครจะเลือกอยู่ฝั่งไหน กลุ่ม UASF, กลุ่ม Big Block, หรือ กลุ่ม SegWit ทางเดินข้างหน้าล้วนเต็มไปด้วยความไม่แน่นอน
“สุดท้ายแล้ว… เมื่อกระดานแบ่งเป็นสองเส้นทางอย่างเด่นชัด สงคราม Blocksize จะจบลงด้วยใครได้บทผู้ชนะ?"
"หรือบางที… มันอาจไม่มีผู้ชนะที่แท้จริงในระบบที่ใครก็ Fork ได้ตลอดเวลา”
คำถามนี้ลอยติดค้างอยู่ในบรรยากาศยามบ่ายที่ร้อนระอุ ชวนให้ใครก็ตามที่จับตาดูสงคราม Blocksize ต้องฉุกคิด
เมื่อไม่มีใครเป็นเจ้าของ Bitcoin อย่างสมบูรณ์ ทุกคนจึงมีสิทธิ์บงการและเสี่ยงต่อการแตกแยกได้ทุกเมื่อ แล้วท้ายที่สุด ชัยชนะ–ความพ่ายแพ้ อาจไม่ใช่จุดสิ้นสุดของโลกคริปโตฯ
แต่เป็นเพียงจุดเริ่มต้นของการวิวัฒน์ที่ไม่มีวันจบสิ้น…
เมาท์แถมเรื่อง UASF (User-Activated Soft Fork)
นี่สนามรบยุคกลางที่ดูเหมือนในหนังแฟนตาซี ทุกคนมีดาบ มีโล่ แต่จู่ ๆ คนตัวเล็กที่เราไม่เคยสังเกต—พวกชาวนา ช่างไม้ คนแบกน้ำ—กลับรวมตัวกันยกดาบบุกวังเจ้าเมือง พร้อมตะโกนว่า “พอเถอะ! เราก็มีสิทธิ์เหมือนกัน!”
มันอาจจะดูเวอร์ ๆ หน่อยใช่ไหมครับ?
แต่ในโลก Bitcoin ปี 2017 นี่คือสิ่งที่เกิดขึ้นในรูปแบบ “User-Activated Soft Fork” หรือ UASF การปฏิวัติด้วยพลังโหนด ซึ่งทำให้นักขุดยักษ์ใหญ่ตัวสั่นงันงกันมาแล้ว!
แล้ว UASF มันคืออะไรล่ะ?
“User-Activated Soft Fork” หรือเรียกย่อ ๆ ว่า “UASF” ไม่ใช่อัปเกรดซอฟต์แวร์สวย ๆ แต่เป็น “ดาบเล่มใหม่” ที่คนตัวเล็ก—หมายถึง โหนด รายย่อย—ใช้ต่อรองกับนักขุดรายใหญ่ โดยกติกาคือ.. ถ้านักขุดไม่ทำตาม (เช่น ไม่รองรับ SegWit) โหนดก็จะปฏิเสธบล็อกของพวกเขาอย่างไม่เกรงใจใคร
สมมุติว่าคุณคือโหนด..
คุณรันซอฟต์แวร์ Bitcoin คอยตรวจสอบธุรกรรม วันดีคืนดี คุณประกาศ “ต่อไปถ้าใครไม่รองรับ SegWit ฉันไม่ยอมรับบล็อกนะ!” นี่ล่ะครับ “UASF” ตัวเป็น ๆ
คำขวัญสุดฮิตของ UASF
“No SegWit, No Block”
หรือแปลว่าถ้าบล็อกไม่รองรับ SegWit ก็เชิญออกไปเลยจ้า..
มันเหมือนการที่ชาวนาโผล่มาตบโต๊ะอาหารท่านขุนว่า “นายใหญ่จะปลูกอะไรก็ปลูกไป แต่ไม่งั้นฉันไม่รับผลผลิตนายนะ!”
ความเชื่อมโยงกับ BIP 148
ถ้าจะพูดถึง UASF ต้องรู้จัก BIP 148 ไว้นิดนึง มันเปรียบเหมือน “ธงปฏิวัติ” ที่ตีตราว่าวันที่ 1 สิงหาคม 2017 คือเส้นตาย!
BIP 148 บอกไว้ว่า.. ถ้าถึงวันนั้นแล้วยังมีนักขุดหน้าไหนไม่รองรับ SegWit บล็อกที่ขุดออกมาก็จะถูกโหนดที่ใช้ UASF “แบน” หมด
ผลลัพธ์ที่ตั้งใจ นักขุดไม่อยากโดนแบนก็ต้องทำตาม UASF กล่าวคือ “นายต้องรองรับ SegWit นะ ไม่งั้นอด!”
หลายคนกลัวกันว่า “อ้าว ถ้านักขุดใหญ่ ๆ ไม่ยอมแล้วหันไปขุดสายอื่น จะไม่กลายเป็นแยกเครือข่าย (Chain Split) หรือ?”
ใช่ครับ.. มันอาจเกิดสงครามสายใหม่ทันทีไงล่ะ
ทำไม UASF ถึงสำคัญ?
ย้อนกลับไปก่อนปี 2017 Bitcoin มีปัญหาโลกแตกทั้งค่าธรรมเนียมแพง ธุรกรรมหน่วง บวกกับความขัดแย้งเรื่อง “จะเพิ่ม Blocksize ดีไหม?” ทางกลุ่มนักขุดรายใหญ่ (นำโดย Bitmain, Roger Ver ฯลฯ) รู้สึกว่า “SegWit ไม่ใช่ทางออกที่แท้จริง” แต่อีกฝั่ง (ทีม Core) ชี้ว่า “Blocksize ใหญ่มากไปจะรวมศูนย์นะ โหนดรายย่อยตายหมด”
UASF เลยโผล่มา เหมือนชาวนาตะโกนว่า
“หุบปากได้แล้วไอ้พวกที่สู้กัน! ถ้าพวกแกไม่รองรับ SegWit พวกข้า (โหนด) ก็จะไม่เอาบล็อกแก”
สาระก็คือ.. มันคือตัวบ่งชี้ว่าคนตัวเล็กอย่างโหนดรายย่อยก็มีพลังต่อรอง เป็นกลไกที่ดึงอำนาจจากมือทุนใหญ่กลับสู่มือชุมชน (Decentralization ที่แท้ทรู)
วิธีการทำงานของ UASF
ลองจินตนาการตาม..
-
การกำหนดเส้นตาย BIP 148 ประกาศไว้ “ถึงวันที่ 1 สิงหาคม 2017 ถ้านายยังไม่รองรับ SegWit โหนด UASF จะไม่รับบล็อกนาย”
-
ถ้าคุณเป็นนักขุด… คุณขุดบล็อกออกมา แต่ไม่ได้ตีธง “ฉันรองรับ SegWit” UASF โหนดเห็นปุ๊บ พวกเขาจะจับโยนทิ้งไปเลย
-
ผลกระทบ? นักขุดที่ไม่ยอมทำตามจะเจอปัญหา บล็อกที่ขุดออกมาไม่มีใครรับ—เสียแรงขุดฟรี
อาจเกิด Chain Split คือ แยกเครือข่ายเลย ถ้านักขุดเหล่านั้นไปตั้งสายใหม่
ความสำเร็จและความท้าทายของ UASF
ความสำเร็จ.. หลังการรวมพลังผู้ใช้ โหนดรายย่อยกดดันนักขุดได้ไม่น้อย จนกระทั่ง SegWit เปิดใช้งานจริงใน Bitcoin วันที่ 24 สิงหาคม 2017 ช่วยให้ธุรกรรมเร็วขึ้น แก้ Transaction Malleability และเปิดทางสู่ Lightning Network ในอนาคต
ความท้าทาย.. นักขุดบางค่ายไม่โอเค.. โดยเฉพาะ Bitmain ซึ่งคาดว่าจะสูญรายได้บางส่วน ก็นำไปสู่การสนับสนุน “Bitcoin Cash (BCH)” แยกสาย (Hard Fork) ของตัวเองตั้งแต่วันที่ 1 สิงหาคม 2017 นั่นเอง
ว่าแล้วก็เปรียบง่าย ๆ
UASF เหมือนปฏิบัติการยึดคฤหาสน์เจ้าเมืองมาเปิดให้ชาวบ้านเข้าอยู่ฟรี.. แต่อีกฝ่ายบอก
“งั้นฉันออกไปตั้งคฤหาสน์ใหม่ดีกว่า!”
บทเรียนสำคัญ UASF เป็นตัวอย่างชัดว่า “ผู้ใช้” หรือ โหนดรายย่อย สามารถสร้างแรงกดดันให้นักขุดต้องยอมเปลี่ยนได้จริง ๆ ไม่ใช่แค่ยอมรับเงื่อนไขที่ขุดกันมา
ผลกระทบระยะยาวหลังจากนั้นล่ะ?
SegWit ถูกใช้งาน ทำให้ค่าธรรมเนียมธุรกรรมลดลง (ช่วงหนึ่ง) เกิด Lightning Network เป็น Layer 2 สุเฟี้ยวของ Bitcoin เกิด BCH (Bitcoin Cash) เป็นสายแยกที่อ้างว่า Blocksize ใหญ่คือทางออก
สรุปแล้ว UASF ทำให้โลกได้รู้ว่า..
Bitcoin ไม่ใช่ของนักขุด หรือของฝ่ายพัฒนาใดฝ่ายเดียว แต่มันเป็นของทุกคน!
“Bitcoin เป็นของทุกคน”
ไม่มีใครมีอำนาจเบ็ดเสร็จ ไม่ว่าคุณจะถือ Hashrate มากแค่ไหน ถ้า Node ทั่วโลกไม่เอา ก็จบ!
“แรงขุดใหญ่แค่ไหน ก็แพ้ใจมวลชน!”
(น่าจะมีตอนต่อไปนะ.. ถ้าชอบก็ Zap โหด ๆ เป็นกำลังใจให้ด้วยนะครับ)
-
-
@ d61f3bc5:0da6ef4a
2024-12-18 16:52:18January 2025 will mark two years since we started building Primal. Our goal was to create the best possible user experience for Nostr and make it accessible to everyone. We reached a big milestone towards realizing that vision with the recent Primal 2.0 release. It’s still early days, a lot more work lies ahead, but we thought the timing was right to introduce the Premium tier. Let’s explore what it is, why we built it, what’s included, and how it will evolve moving forward.
What Primal Premium Is
The idea behind Primal Premium is simple: integrate all tools and services required for the best Nostr experience into a single package. For $7 per month, Premium users get a Primal Name and Nostr Tools built by Primal. We’ll cover those in more detail below, but first we should make a crucial point: by signing up for Premium, you are in no way locked in to Primal. Quite the contrary, you can pick and choose which Premium features you wish to enable and use within other Nostr products.
Openness is Nostr’s killer feature. Any product that wishes to truly empower the user needs to interoperate with Nostr’s budding ecosystem. The feed marketplace is a great example. External feeds are first-class citizens within all Primal apps. Primal feeds are available in other Nostr clients. We are working on Premium feeds, which our users will be able to enjoy within Primal or other Nostr apps. Media hosting is another example. Our upcoming support for the Blossom protocol will make Primal Premium media hosting interoperable with other Nostr apps and media hosting services. The common theme here is user choice. Nostr offers the highest level of user agency, and the compounding effect of interoperable products and services is bound to make Nostr immensely powerful.
Why We Built Premium and Why Now
What is unfolding on Nostr right now is unique and special. The first truly self-sovereign network is being bootstrapped by this early cohort of users and builders. People are literally holding the keys to their online presence. Network infrastructure – relays, indexers, media hosting services, etc. – is being stood up organically and without any central planning or coordination. Hundreds of independent projects are adding new capabilities to Nostr without needing permission. The whole thing is truly a sight to behold.
In addition to fixing the fundamentals of the network, it is equally important that we fix the broken incentives that plague the legacy Web. The status quo of monetization via advertising, which turns users into products to be farmed, has overstayed its welcome. At Primal, we don’t monetize user data. Our users are our customers. We only make money when the user decides that we are providing a valuable service – and pays for it. That means that our users’ interests are aligned with ours. It allows us to wake up every morning and work all day to make the product better for our users.
Some might say that it is too early to try to monetize a Nostr product. We definitely need to be thoughtful about paywalling important features while the network is so young. For example, advanced search is a Primal Premium feature, but we enable it for all users up to 20 search results. That makes it quite usable for anyone on Nostr, but power users get the ability to save these searches and create powerful specialized feeds.
It is crucial to have commercially successful projects on Nostr that have their incentives aligned with those of their users. We are working on new features and monetization methods that follow this philosophy. The more we experiment on Nostr, the faster we will learn what works and unlock the full potential of this network. I have a feeling that a lot remains to be discovered, and Primal Premium is just the first step.
Now, let’s take a closer look at what is included in Premium: Primal Name and Nostr Tools.
Primal Name
A Primal Name is a unique name on the primal.net domain that offers three features:
- Verified Nostr address (NIP-05). This signals to the Nostr network that your account (npub) has been verified by Primal. Note that we don’t perform identity verification; we are simply signaling that this is a Primal Premium user. Users can pay with sats, preserving their privacy while signaling to the network that this verified account is not a bot.
- Friendly Bitcoin Lightning address. Primal’s built-in hosted wallet creates a randomly generated lightning address for every user. They look like this: bluedog25@primal.net. Premium users get to pick their name, so their lightning address is more personalized (e.g. preston@primal.net).
- VIP profile on primal.net. This is simply a friendly URL to your profile on primal.net. We are working on adding profile customization features for Premium users; stay tuned!
In summary, a Primal Name makes you easier to find on Nostr. You are free to use any of these three Primal Name elements as you see fit. If you wish to use your Primal Nostr address and/or Lightning address, simply update your Nostr profile with those entries.
Nostr Tools
Nostr Tools is a collection of features that we think would be useful to any Nostr power user. We are continuously working on expanding these capabilities, but the initial set of features includes:
- Media management. Primal Premium comes with 10GB of media storage (compared to 1GB for free accounts). We implemented a slick interface for managing all media you have on Primal.
- Contact list backup. Many Nostr users have experienced the loss of their contact list (i.e., their follow list) when using different clients. We store the history of the contact list for Primal Premium users and make it easy to recover.
- Content backup. Nostr users post their content to a collection of public relays. These relays typically don’t offer guarantees that they will store the content for any amount of time. We back up all content posted by Primal Premium users and make it easy to rebroadcast it to the specified relays at any time.
Primal Legends
The idea for the Primal Legend tier was suggested to me by Gigi a couple of months prior to the launch of Primal 2.0. His argument was simple: “There are users on Nostr who really appreciate Primal and are willing to pay way more than $7 / month to support the project. You should let them pay and recognize them for doing so.”
I am really glad that Gigi convinced me to introduce the Legend tier. Nostr is truly a special place. The early users are extremely passionate and mission driven. They care about growing and improving Nostr as much as the builders do. At first, I thought of the term “Legend” as a bit tongue in cheek, but then I met and chatted with some of these people. Man, they are incredible. They just wish to support the network and the builders of open source software in any way they can. So now I think the term is appropriate.
We are humbled by the support we received. Our first Legend supporter was none other than Jack. He found this option in the product and paid for the Legend tier literally an hour after Primal 2.0 was released. Thank you, sir, and thank you to all the other Legends out there! 💜🫂
What Comes Next?
We are delighted and encouraged by the market response to Primal Premium. It is already clear to us that we are on the right path. We will lean into it even harder from here. There will be MOAR Premium features, while at the same time we will make sure that the free product remains excellent. Since you, the user, are the customer, tell us what you would like to see added to Primal Premium.
Pura Vida 🤙
-
@ 6871d8df:4a9396c1
2024-02-24 22:42:16In an era where data seems to be as valuable as currency, the prevailing trend in AI starkly contrasts with the concept of personal data ownership. The explosion of AI and the ensuing race have made it easy to overlook where the data is coming from. The current model, dominated by big tech players, involves collecting vast amounts of user data and selling it to AI companies for training LLMs. Reddit recently penned a 60 million dollar deal, Google guards and mines Youtube, and more are going this direction. But is that their data to sell? Yes, it's on their platforms, but without the users to generate it, what would they monetize? To me, this practice raises significant ethical questions, as it assumes that user data is a commodity that companies can exploit at will.
The heart of the issue lies in the ownership of data. Why, in today's digital age, do we not retain ownership of our data? Why can't our data follow us, under our control, to wherever we want to go? These questions echo the broader sentiment that while some in the tech industry — such as the blockchain-first crypto bros — recognize the importance of data ownership, their "blockchain for everything solutions," to me, fall significantly short in execution.
Reddit further complicates this with its current move to IPO, which, on the heels of the large data deal, might reinforce the mistaken belief that user-generated data is a corporate asset. Others, no doubt, will follow suit. This underscores the urgent need for a paradigm shift towards recognizing and respecting user data as personal property.
In my perfect world, the digital landscape would undergo a revolutionary transformation centered around the empowerment and sovereignty of individual data ownership. Platforms like Twitter, Reddit, Yelp, YouTube, and Stack Overflow, integral to our digital lives, would operate on a fundamentally different premise: user-owned data.
In this envisioned future, data ownership would not just be a concept but a practice, with public and private keys ensuring the authenticity and privacy of individual identities. This model would eliminate the private data silos that currently dominate, where companies profit from selling user data without consent. Instead, data would traverse a decentralized protocol akin to the internet, prioritizing user control and transparency.
The cornerstone of this world would be a meritocratic digital ecosystem. Success for companies would hinge on their ability to leverage user-owned data to deliver unparalleled value rather than their capacity to gatekeep and monetize information. If a company breaks my trust, I can move to a competitor, and my data, connections, and followers will come with me. This shift would herald an era where consent, privacy, and utility define the digital experience, ensuring that the benefits of technology are equitably distributed and aligned with the users' interests and rights.
The conversation needs to shift fundamentally. We must challenge this trajectory and advocate for a future where data ownership and privacy are not just ideals but realities. If we continue on our current path without prioritizing individual data rights, the future of digital privacy and autonomy is bleak. Big tech's dominance allows them to treat user data as a commodity, potentially selling and exploiting it without consent. This imbalance has already led to users being cut off from their digital identities and connections when platforms terminate accounts, underscoring the need for a digital ecosystem that empowers user control over data. Without changing direction, we risk a future where our content — and our freedoms by consequence — are controlled by a few powerful entities, threatening our rights and the democratic essence of the digital realm. We must advocate for a shift towards data ownership by individuals to preserve our digital freedoms and democracy.
-
@ 7ed5bd1c:4caa7587
2025-01-08 07:35:42Bitcoin เป็นเกราะป้องกันจากการควบคุมของรัฐบาล
ในโลกที่การควบคุมทางการเงินของรัฐมีผลกระทบต่อชีวิตของประชาชน การปกป้องทรัพย์สินส่วนบุคคลจึงเป็นประเด็นสำคัญที่หลายคนกังวล Bitcoin ได้เข้ามามีบทบาทสำคัญในฐานะเครื่องมือที่ช่วยป้องกันการอายัดทรัพย์สินและการแทรกแซงทางการเงินจากรัฐบาลและองค์กรต่างๆ
กรณีศึกษาที่น่าสนใจ
-
เวเนซุเอลา: เมื่อประเทศประสบภาวะเงินเฟ้อสูงและรัฐบาลมีการควบคุมการแลกเปลี่ยนเงินตราต่างประเทศ ประชาชนบางส่วนใช้ Bitcoin เพื่อรักษามูลค่าทรัพย์สินของพวกเขาและทำธุรกรรมข้ามพรมแดนโดยไม่ต้องผ่านการตรวจสอบจากรัฐบาล
-
แคนาดา: ในปี 2022 รัฐบาลแคนาดามีการอายัดบัญชีธนาคารของผู้ประท้วงในการเคลื่อนไหวทางการเมืองบางอย่าง Bitcoin กลายเป็นช่องทางในการระดมทุนและช่วยให้ประชาชนสามารถป้องกันการแทรกแซงจากรัฐบาลได้
-
ไนจีเรีย: ธนาคารกลางไนจีเรียสั่งห้ามธุรกรรมที่เกี่ยวข้องกับ Bitcoin และคริปโตเคอร์เรนซีอื่นๆ แต่ประชาชนกลับหันมาใช้ Bitcoin ในตลาดมืดเพื่อหลีกเลี่ยงข้อจำกัดและรักษาความเป็นอิสระทางการเงิน
Bitcoin ปกป้องทรัพย์สินอย่างไร?
-
ความเป็นเจ้าของแท้จริง: Bitcoin ใช้ระบบกระจายศูนย์ที่ไม่มีตัวกลาง ซึ่งหมายความว่าไม่มีองค์กรหรือรัฐใดสามารถเข้าถึงหรือยึดครอง Bitcoin ของคุณได้ หากคุณเก็บรักษาคีย์ส่วนตัวอย่างปลอดภัย
-
ไร้พรมแดน: Bitcoin สามารถโอนย้ายได้ทั่วโลกโดยไม่ต้องผ่านธนาคารหรือสถาบันการเงินที่อยู่ภายใต้การควบคุมของรัฐบาล ทำให้เป็นตัวเลือกที่น่าสนใจสำหรับผู้ที่ต้องการหลบเลี่ยงการอายัดทรัพย์สิน
-
ความโปร่งใสและความปลอดภัย: การทำธุรกรรมของ Bitcoin ถูกบันทึกในบล็อกเชนซึ่งเป็นระบบที่โปร่งใสและตรวจสอบได้ ในขณะเดียวกันข้อมูลส่วนบุคคลของผู้ใช้งานจะถูกเก็บเป็นความลับ
ข้อควรระวัง
แม้ Bitcoin จะมีข้อดีในเรื่องการปกป้องทรัพย์สินจากรัฐ แต่ผู้ใช้งานต้องมีความระมัดระวังในการจัดเก็บคีย์ส่วนตัว และหลีกเลี่ยงการพึ่งพาบริการจากบุคคลที่สามที่อาจไม่ปลอดภัย
ในโลกที่อิสรภาพทางการเงินถูกท้าทาย Bitcoin กลายเป็นเครื่องมือสำคัญสำหรับการปกป้องทรัพย์สินและสิทธิส่วนบุคคลของประชาชน คุณคิดว่า Bitcoin สามารถเป็นคำตอบสำหรับความท้าทายนี้ได้จริงหรือไม่? ร่วมพูดคุยในความคิดเห็น!
-
-
@ 4657dfe8:47934b3e
2024-12-18 13:42:46Alby Hub enables creation of subaccounts, decentralizing trust and creating usecases for shared, community nodes.
Simplifying Bitcoin Wallets for Friends and Family
Alby Hub empowers you to take full control of your bitcoin and manage your payments. Through a user-friendly, self-custodial wallet with a one-click lightning node setup, you can effortlessly connect to dozens of applications. The integrated App Store provides access to popular apps like Amethyst, Damus, Stacker News, Podcasting 2.0, and a wide range of other external tools—all directly linked with your Alby Hub wallet. One of the latest and most exciting additions to Alby Hub is the Friends & Family app.
With the Friends & Family app, you can create subaccounts for friends and family, all powered by your Hub. In just a few clicks, you can set up wallets for them, giving them a smooth onboarding experience and making bitcoin accessible even to those new to the ecosystem. Think of it as a custodial wallet but with a personal touch—since you’re the one managing it, there’s a direct relationship and trust.
These subaccount holders can tap into all the channels and liquidity of your Hub without needing to handle any technical setup. Plus, you can preload their wallets with a few sats, creating a welcoming and smooth experience that’s hard to find elsewhere.
And that’s not all. Beyond providing an intuitive wallet, they can get their own lightning address, configurable payment notifications, access to Alby Go (a mobile app for payments on the go), and the Alby Browser Extension for easy web payments.
Let’s have a look how to set it up.
How to provide a wallet to Friends and Family?
- Open your Hub and find the Friends & Family app in the App Store
- Enter a name e.g. your friend’s name and click “Create subaccount”
- Share the Connection Secret with your friend for the different options
Here are two examples how your the new subaccount can be used.
Alby Go mobile App
Alby Go makes it easy to carry bitcoin in your pocket. This lightweight wallet connects directly to an Alby Hub subaccount, so your friends can pay and check transactions on the go.
Here’s how to set it up: 1. Open the Alby Go Mobile App tab in your Hub.
2. Copy the Connection Secret and share it with your friend if you cannot onboard them in person. 3. Your friend downloads Alby Go for Android or iOS and scans the code.
And that’s it—your friend now has a bitcoin wallet in their pocket, ready for seamless transactions anytime, anywhere. 🎉
Get a Lightning Address with an Alby account
An Alby Account offers a variety of useful features that make managing bitcoin payments easy. Among these are a personalized lightning address and email payment notifications—two powerful tools that help your newly onboarded friends stay connected and informed.
To set up an Alby account for someone:
-
Open the Alby Account tab in your Hub.
-
Copy the provided URL and share it with your friend.
-
Your friend simply needs to create their Alby account and afterwards click on the provided URL.
That’s it! The wallet is instantly connected, and they’re ready to receive payments to their new lightning address. 🥳
Onboarding Family & Friends Made Easy In this article, we explored how to create subaccounts for family and friends, connect them with Alby Go, and set up an Alby account to provide a smooth onboarding experience for your loved ones—all achievable in just a few clicks.
Stay tuned as we dive into more exciting use cases for subaccounts in Alby Hub! If you have ideas for improvement,let us know.
- Open your Hub and find the Friends & Family app in the App Store
-
@ fa984bd7:58018f52
2024-01-31 15:00:00I just hit the big red PUBLISH button on NDK 2.4.
(well, actually, I did it from the command line, the big red button is imaginary)
Codename: Safely Embrace the Chaos
Nostr is a, mostly, friendly environment with not too many developers and no ill-intent among them.
But this will not always be the case. Compatibility issues, mistakes, and all kinds of chaos is to be expected.
This version of NDK introduces validation at the library-level so that clients built using NDK can rely on some guarantees on handled-kinds that events they are consuming comply with what is defined on their respective NIPs.
An example?
NIP-88, recurring subscriptions, defines that Tier events should have amount tags of what subscribers are expected to pay and the cadence.
Prior to NDK 2.4 some malformed events would render like this:
https://i.nostr.build/Y4JG.png
But with NDK 2.4 the malformed parts of the events don't reach the client code.
https://i.nostr.build/wAgJ.png
This is just a beginning, but event-validation is now moving into the library!
-
@ 896c3ee8:e054cc31
2025-01-08 06:19:51I was scrolling through some news articles published by Primal.net/flash on my phone —Bitcoin up, Trump said this or that, accompanied by a screenshot of Twitter. I asked myself: why does social media exist? Is it to fulfill our need for social connection? Is it to show off our thoughts? Is it validation? It wasn’t like this long ago. It was a part of life now it is Life.
Quite some time ago, I was baffled to see a woman being prosecuted in a court of law based on what she had posted on Facebook! Facebook? Seriously, an internet post landing a person in jail? Since when? No one notified me. I thought the internet was just a thing—a toy for us to play with, have fun, and then return to our real life. I remember using Pidgin and IRC; back then, the internet was just a tool. One sudden day, all of that turned into serious business. Early internet, and by extension social media, was a fun place, but now it is a place where real money is spent and real lives are built. I mean, some of the richest companies are software companies—an industry titan propelled by intangible property. It is hard not to miss the early days when one could say absolutely anything in a forum post and leave forever, detached from the filth they spewed. Now we all know censorship, data mining, AI training, and laws getting involved. I cannot even take part in a cultural movement without being tracked and attacked. At some point, the internet attached itself to human consciousness so deeply that it has now become inseparable from the human experience and experience of life. Just like reading and writing, to live a modern life, one must have an internet connection and a social media account. It’s disheartening to think that our worth is often measured by the number of people who 'follow' us.
This attachment meant that there were powers who needed to control the internet. Laws were hopeless on the internet—one could break a list of laws of a particular country sitting from a boat in a faraway land where no jurisdictional police could touch a single fleck of their hair. This cross-border nature made it very necessary for law enforcement to up their game, and so they did. Now, posting something and forgetting it being associated with you is a dream of the past.
To achieve this, they went into a Hail Mary attempt to break human rights written in the declaration they all signed. The right to privacy needed to go first. You see, on the internet, you are not a human—just a fat, Mountain Dew-drinking piece of meat, a data generation machine. Rights mean very little for you if you are a keyboard warrior. No clause in the Universal Declaration of Human Rights said that an account on the internet is a human! So you lose privacy. Since law enforcers break privacy, it looks like it really is not a crime to break it. So, service providers break it too. Who is to stop them now? Law enforcers?
That is just the tip, perhaps even a necessary evil. Breaking privacy only allows enforcement of laws that have been written. There needs to be some mechanism to enforce laws that are not written—the so-called "soft laws" (a term used in international law). If illegal activity is to be curbed, instead of chasing after criminals, why not be proactive and get to the root of the evil: human thought? Here enters censorship. If you don't know about something you won't act on it. If you do not know about guns, you will not pick up a gun. Censorship allows law enforcers to enforce laws that may be written in the future, potential laws. Maybe one day, being on a particular political side will be deemed illegal, so let’s stop it now. Ever heard of a cat chasing a mouse? Censorship is just a mouse chasing a cat. A reversal of cause and effect.
These two factors, coupled with the internet's revenue stream—your attention—ruined the internet. Ads by God are one of the most human things humans have created: “Let us show you what you could be a part of. As you are right now, you seem unfulfilled; let us show you what you want.” The economy of attention is best tapped by creators working on our primal urge for reproduction. The porn industry is a mega titan for this reason. I do not have any bad words against the innovators working in that industry. They are the true and perhaps only industry that uses the internet to its maximum and has great respect for technology and technological innovation.
When I think more deeply about the purpose of social media, I realize I have no clear answer. Why should one show what their lunch looks like? What is the goal of sharing such trivial experiences? Perhaps the dopamine rush of likes and engagement is strong enough to motivate such actions. The definition of an individual gets blurred here. What is an individual person? A collection of social media posts? Or should we emphasize more on your offline version the flawed acne and angst filled individual who subscribes to the weird, concorted philosophy of Proudhon, Locke, and Marx? The algorithms have been determining the future of people on social media. People are worried about losing jobs to a computer now. Since YouTube and Instagram started utilizing attention to pay people, algorithms began to determine who should be paid and what should be paid. The ship of us being under a computer has long sailed.
To answer why social media exists, here is one study that identified ten uses and gratifications for using social media: social interaction, information seeking, passing time, entertainment, relaxation, communicatory utility, convenience utility, expression of opinion, information sharing, and surveillance/knowledge about others (reference ISSN: 1352-2752). Most studies you find will be in line with these. I will not expound more on this; you all know why you use social media, and you all also know why people use social media.
To end it, Nostr gives you certain things that traditional social media and the 'internet' fail to provide. You know what those are since you are here.
P.S.—This is written exclusively for the eyes in the Nostr ecosystem. I will not publish it anywhere else. Link people to this post even from outside; I don’t care.
-
@ bd50a856:038f487c
2025-01-08 04:25:47I'M NOT IN SCHOOL WHY AM I DOING THIS?
https://image.nostr.build/9df38856e4493466585f451771a013959ac7e29135289b4922a810623577dbef.jpg
Isms in my opinion are not good. - Ferris Bueler
OK so like many a disillusioned youth I was a pretty hardcore Marxist back in college. There's a common pipeline that starts as a 13 year old who wished they could vote for Ron Paul in 2008, takes a hard left turn at the first sign of bigotry, and winds up with a pretty badass juche tattoo. The Enlightenment era ideas of an ascertainable objective truth and mankind's control over their own destiny, combined with the complete subversion of the political history I was brought up with felt very empowering. But nowadays I'm not so sure I want to lay claim to any specific point or vector on the political spectrum. 2024 was in many ways a year of reflection for me. I've managed to reconnect with my sense of spirituality after years of bitterness towards the concept brought on by a life of run-ins with religious fundemantalism, and I had to challenge alot of things that for years I've taken for granted both about myself and the world at large. This ideological audit was in no small way catalyzed by my adoption of NOSTR, which with its endless potential enticed me out of the progressive echo chamber I made my digital home on the fediverse and into a new echo chamber: one full of Bitcoiners.
I had bought Bitcoin before, as a way to short the dollar, but I never encountered its ideologues in the wild. At first gradually then suddenly I was making the types of arguments in my head that former me would have decried as pedantic to the point of being apologetic towards the ruling class. And just like that the 19th and 20th century political and philosophical works which I zaelously held as trail blazes on the long and labyrinthine path towards realizing Absolute Truth were cast forcefully into their murky historical context by the staggering success of the first truly decentralized monetary system. In my college days, I saw Lenin's model of revoutionary politics and the Vanguard Party as the only way for a people's movement to legitimately threaten the hegemony of the global oligarchs who caused so much unnecessary suffering. Now I can see how whether or not that type of centralization was a necessary concession then, one cannot in good faith believe it to be so in the age of Bitcoin.
Yet you'll have to forgive me because still I'm sympathetic to much of the broader movement of Marxism. I detest how Great Man Theory suboordinates the totality of the evolution of society to the wills of a few individuals, and prefer to see socialism in a different light. Rather than viewing the movement as a clever trick some cartoonishly evil mustaches and haircuts used to brainwash almost half the human population, I see a genuine attempt by hundreds of millions of people to change the world for the better, forever. Yes the suffering was immense, and many many people for whom the tumult was too much, as well as those who wished to maintain their parasitic lifestyles, fled for their lives it was far from a black and white phenomena. Living standards also skyrocketed over the long run in places like the USSR and the PRC, from literacy to employment to diet, access to healthcare, you name it. But still the narrative of Hegel's Dialectic playing out in the arena of class politics - wherein the oppressed by becoming the oppressors would naturally do away with oppression altogether by following their self interest just as the Bourgeoisie had done, thereby unwinding the knot of economic injustice - has lost its status as the driving force of all of history for me. It's still much more compelling than the caricature of simply replacing one form of centralization with another. Rather its a much more relatable fallacy: taking a truth, in this case the millennia of class struggle which humanity has dealt with since the advent of agriculture, and trying to extrapolate from it some abstract and all compassing polemic that makes it all make sense. Moreover, in the same way that Bitcoiners say, "Once you see it you can never go back," I cannot unlearn just how hypocritical and dishonest the Western narrative of history is. Lying and calling America the land of the land of opportunity when the abundance we've known for our Empire's whole existence exists merely because of stolen land and slave labor. This is not a moralist objection by the way, though that would be wholly justified. The true horror is that people view the US as the model of a self sufficient nation state when in reality it has always been parasitic, even in it's larval stage. And of course the disillusion with every military campaign since the end of World War 2, starting with the grotesque and gratuitous display of power in Hiroshima and Nagasaki, then the fraudulant and deadly campaigns in Korea, Loas, Vietnam, and of course the entire Middle East. Our own forms of surveillance, censorship, repression all staring at us in the images we projected on the face of the Berlin Wall.
I know a little part of that probably rubbed some of you the wrong way. Hey we still were a net positive force in WW2, of course. And despite many differences in historical interpretations, when it comes to Marx's tomes of economic criticism I think the Bitcoiners of NOSTR would find a lot of rhetorical similarities with their gripes about the age of fiat actually share many rhetorical similarities: The levers of control over the global economy had been consolidated by a select view who were spamming them to make themselves inordinately wealthy at the cost of the quality of life for the majority of Planet Earth. The value of your labor is being ciphoned by a bunch of rackateering lizard men known as politicians. Fair competition, the spirit of Capitalism on paper, has been eroded by its those who claim to be its biggest proponents. Forever wars as a business, predatory global economic policies, proles=plebs, yada yada. Although I guess this note would be pointless if I yada-yada'd over the best parts.
THE INVISIBLE HANDJOB
https://image.nostr.build/595f3d10072c92fc66f9ad314de5d6eeb7e76a9bc26021c690d89cbd9bbe0a15.gif
The landlords, like all other men, love to reap where they never sowed, and demand a rent even for its natural produce. -Adam Smith
In the above quoted Wealth of Nations (Book 1, chapter 11) as well as in Book 4 and in The Theory of Moral Sentiments, everyone's favorite economist they've never read paints a complex and somewhat contradictory image of the proprietors over the means of production in his time. He saw greed and gluttony in their souls, but viewed their actions within the context of an emergent system whereby their selfishness propelled the interest of everyone. So, almost exactly how Marx viewed the holy timespanning vendetta of the have-nots of the world. However, in Book 1 ch10 of Wealth of Nations Smith says this:
[The rent] is not at all proportioned to what the landlord may have laid out upon the improvement of the land, or to what he can afford to take; but to what the farmer can afford to give,
In a section where he concedes that the landlords' actions amount to extortion. He also articulates here how through the influence of legislation, the landlord class effectively outlawed collective negotiation on the part of the working class while bolstering it for themselves, resulting in monopolies. Marx cites Smith himself throughout Das Kapital, and lays out extensively this process of the consolidation of capitalist power in part 3 of the first volume. The two also subscribed to the Labor Theory of Value, as did every other Enlightenment era economist... and so do most Bitcoiners! At least they sure sound like they do when they talk about the erosion of the masses' life force by the debasement of fiat. After all if the commodity that is money is an expression of your time and labor, then so must be the value of every other commodity. I've heard people try to glibly dismiss the LTV as stupid, citing things like land, products of fully automated processes... And digital assets. As if land didn't have to be surveyed, and discovered (or won in a genocide). Or if fully automated production processes didn't require thousands of hours of expert labor on robotics and/or computer engineering. Or if all financial assets in general didn't hold merely a hypothetical value as a representation of value wrought in the productive economy. And to be perfectly honest I always found the subjective theory of value to be downright silly, like imagine haggling at a supermarket over a gallon of milk. Yes demand is subjective (and really more of an expression of willing buying power than need but that's a whole other can of worms), but it's wholly reliant on objective factors such as scarcity and the relative difficulty to produce a certain commodity oneself. And when those who corner the market collude on pricing it's not like you even have the ability to "vote with your money". You have no leverage, unless you own a cow. All in all the price of a commodity can't be anything other than an approximation of its objective value based on the average cost of the raw materials and socially necessary labor time, ebbing and flowing with the asynchronous undulations of supply and demand. And maybe a little extra something just to cushion that P&L. OK maybe a lot. Gotta outperform inflation, right?! Was I being glib, myself, there? It just feels self evident from my current perspective, the hollow vampirism of it all. Capitalists enacting the rights to procure surplus value, reinsert it as capital in order to procure even more surplus value, rinsing and repeating, drifting further and further from the corporeal reality of our own survival and swallowing entire generations in the process.
STATISTS BE LIKE...
https://image.nostr.build/3109eed06d708cfad1ec0c8f4a823b8d6c58b73d3a7f73a94cdcafe22554656f.jpg
The government solution to a problem is usually as bad as the problem- Milton Friedman
On September 11, 1973 Chilean President Salvador Allende died during a fascist coup d'état perpetrated by the commander in chief of the military Augusto Pinochet. Officially he took his own life for fear of what would be done to him, but it remains a contentious topic. Pinochet's regime was characterized by mass arrests, widespread use of torture, extrajudicial killings, mass exiles, and brutal censorship of his political ditractors. But he cut taxes!!!! And he did so with the council of the Chicago Boys, a group of Chicago University alumni and disciples of right wing icon Milton Friedman. Friedman applauded Pinochet's government for his economic policies and providing a shining example of Milton's take on what small laissez-faire government looks like: Repression of the masses, no rules for the classes.
Pinochet was also a collaborator with the CIA on their project Operation Condor, whereby the funding and stoking of violence and unrest was weaponized to subvert the rise of left leaning politics throughout South and Central America and maintain cheap access to raw materials which US corporations relied on. As a matter of fact, the deep state has an endless track record of resorting to all sorts of crazy measures to subvert the popularity of socialism. This contradicts directly the American conservative view that the deep state wants socialism, and that Trump - who has cooperated in the continuations of these policies with the attempted coups in Venezuela and Bolivia during his first term - is here to stop 'em. The scapegoating and fear mongering of foreign left leaning governments in lucrative regions is a time honored tradition here In the US. All the West has always had more in common with the totalitarianism of Fascism than the East. If you're curious or skeptical about this, looking up Michael Parenti's Blackshirts & Reds is a good place to start digging deeper.
And while conservatives remain in denial about the parasiticism and exclusion their version of freedom relies on, Progressivism, as I see it, is a limping, mutilated, abomination of a watered down version of itself. Democrats for over a century now continue offering the bare minimum that would assuage their cinstituencies in the short term at best, and the exact same neocon policies of war and imperialism abroad, and corporate oligarchy and a police state at home. Yet every two years progressives walk beleaguered to the polls to vote blue no who. And Milton Friedman laughs in his grave. Reminds me of one of my favorite quotes, attributed to president of Tanzinia, Julius Nyere: "The Americans also have a one party state, but with typical American extravegance, they have two of them." https://image.nostr.build/9380dbc6d51a443b76340b46c760e12c9bb0540a170a8f5a2a22847e0bba88c7.jpg
WHAT IS DO BE DONE?
https://image.nostr.build/94aaebe5364c3c6a0094f09640ef18b05938d889124f874c49243f4ea972f725.jpg
I found freedom. Losing all hope is freedom. - Edward Norton, Fight Club
If you made it through all that rambling, what is wrong with you? In all seriousness, I hope this was a fruitful glance into the mind of someone who might think a little differently. In a rapidly evolving world, where systems we ourselves have put in place not only constitute the environment we live in, but reproduce themselves through our behavior as well, despondency, rage, and confusion permeate the collective consciousness. But there's also Bitcoin, which to an increasing number - and to an extent myself - represents a successful proof of concept of a new, genuinely Decentralized Ideological Apparatus. One which relies on Mutual Aid and the cooperation of smaller, decentralized and self sufficient communities. And to a certain extent it also represents hope. But it's as much an asset to those who'd prefer to continue feeding on the suffering of others as it is to those hoping for a change. Hope is as dangerous as fear - Lao Tzu
-
@ 3bf0c63f:aefa459d
2024-01-15 11:15:06Pequenos problemas que o Estado cria para a sociedade e que não são sempre lembrados
- **vale-transporte**: transferir o custo com o transporte do funcionário para um terceiro o estimula a morar longe de onde trabalha, já que morar perto é normalmente mais caro e a economia com transporte é inexistente. - **atestado médico**: o direito a faltar o trabalho com atestado médico cria a exigência desse atestado para todas as situações, substituindo o livre acordo entre patrão e empregado e sobrecarregando os médicos e postos de saúde com visitas desnecessárias de assalariados resfriados. - **prisões**: com dinheiro mal-administrado, burocracia e péssima alocação de recursos -- problemas que empresas privadas em competição (ou mesmo sem qualquer competição) saberiam resolver muito melhor -- o Estado fica sem presídios, com os poucos existentes entupidos, muito acima de sua alocação máxima, e com isto, segundo a bizarra corrente de responsabilidades que culpa o juiz que condenou o criminoso por sua morte na cadeia, juízes deixam de condenar à prisão os bandidos, soltando-os na rua. - **justiça**: entrar com processos é grátis e isto faz proliferar a atividade dos advogados que se dedicam a criar problemas judiciais onde não seria necessário e a entupir os tribunais, impedindo-os de fazer o que mais deveriam fazer. - **justiça**: como a justiça só obedece às leis e ignora acordos pessoais, escritos ou não, as pessoas não fazem acordos, recorrem sempre à justiça estatal, e entopem-na de assuntos que seriam muito melhor resolvidos entre vizinhos. - **leis civis**: as leis criadas pelos parlamentares ignoram os costumes da sociedade e são um incentivo a que as pessoas não respeitem nem criem normas sociais -- que seriam maneiras mais rápidas, baratas e satisfatórias de resolver problemas. - **leis de trãnsito**: quanto mais leis de trânsito, mais serviço de fiscalização são delegados aos policiais, que deixam de combater crimes por isto (afinal de contas, eles não querem de fato arriscar suas vidas combatendo o crime, a fiscalização é uma excelente desculpa para se esquivarem a esta responsabilidade). - **financiamento educacional**: é uma espécie de subsídio às faculdades privadas que faz com que se criem cursos e mais cursos que são cada vez menos recheados de algum conhecimento ou técnica útil e cada vez mais inúteis. - **leis de tombamento**: são um incentivo a que o dono de qualquer área ou construção "histórica" destrua todo e qualquer vestígio de história que houver nele antes que as autoridades descubram, o que poderia não acontecer se ele pudesse, por exemplo, usar, mostrar e se beneficiar da história daquele local sem correr o risco de perder, de fato, a sua propriedade. - **zoneamento urbano**: torna as cidades mais espalhadas, criando uma necessidade gigantesca de carros, ônibus e outros meios de transporte para as pessoas se locomoverem das zonas de moradia para as zonas de trabalho. - **zoneamento urbano**: faz com que as pessoas percam horas no trânsito todos os dias, o que é, além de um desperdício, um atentado contra a sua saúde, que estaria muito melhor servida numa caminhada diária entre a casa e o trabalho. - **zoneamento urbano**: torna ruas e as casas menos seguras criando zonas enormes, tanto de residências quanto de indústrias, onde não há movimento de gente alguma. - **escola obrigatória + currículo escolar nacional**: emburrece todas as crianças. - **leis contra trabalho infantil**: tira das crianças a oportunidade de aprender ofícios úteis e levar um dinheiro para ajudar a família. - **licitações**: como não existem os critérios do mercado para decidir qual é o melhor prestador de serviço, criam-se comissões de pessoas que vão decidir coisas. isto incentiva os prestadores de serviço que estão concorrendo na licitação a tentar comprar os membros dessas comissões. isto, fora a corrupção, gera problemas reais: __(i)__ a escolha dos serviços acaba sendo a pior possível, já que a empresa prestadora que vence está claramente mais dedicada a comprar comissões do que a fazer um bom trabalho (este problema afeta tantas áreas, desde a construção de estradas até a qualidade da merenda escolar, que é impossível listar aqui); __(ii)__ o processo corruptor acaba, no longo prazo, eliminando as empresas que prestavam e deixando para competir apenas as corruptas, e a qualidade tende a piorar progressivamente. - **cartéis**: o Estado em geral cria e depois fica refém de vários grupos de interesse. o caso dos taxistas contra o Uber é o que está na moda hoje (e o que mostra como os Estados se comportam da mesma forma no mundo todo). - **multas**: quando algum indivíduo ou empresa comete uma fraude financeira, ou causa algum dano material involuntário, as vítimas do caso são as pessoas que sofreram o dano ou perderam dinheiro, mas o Estado tem sempre leis que prevêem multas para os responsáveis. A justiça estatal é sempre muito rígida e rápida na aplicação dessas multas, mas relapsa e vaga no que diz respeito à indenização das vítimas. O que em geral acontece é que o Estado aplica uma enorme multa ao responsável pelo mal, retirando deste os recursos que dispunha para indenizar as vítimas, e se retira do caso, deixando estas desamparadas. - **desapropriação**: o Estado pode pegar qualquer propriedade de qualquer pessoa mediante uma indenização que é necessariamente inferior ao valor da propriedade para o seu presente dono (caso contrário ele a teria vendido voluntariamente). - **seguro-desemprego**: se há, por exemplo, um prazo mínimo de 1 ano para o sujeito ter direito a receber seguro-desemprego, isto o incentiva a planejar ficar apenas 1 ano em cada emprego (ano este que será sucedido por um período de desemprego remunerado), matando todas as possibilidades de aprendizado ou aquisição de experiência naquela empresa específica ou ascensão hierárquica. - **previdência**: a previdência social tem todos os defeitos de cálculo do mundo, e não importa muito ela ser uma forma horrível de poupar dinheiro, porque ela tem garantias bizarras de longevidade fornecidas pelo Estado, além de ser compulsória. Isso serve para criar no imaginário geral a idéia da __aposentadoria__, uma época mágica em que todos os dias serão finais de semana. A idéia da aposentadoria influencia o sujeito a não se preocupar em ter um emprego que faça sentido, mas sim em ter um trabalho qualquer, que o permita se aposentar. - **regulamentação impossível**: milhares de coisas são proibidas, há regulamentações sobre os aspectos mais mínimos de cada empreendimento ou construção ou espaço. se todas essas regulamentações fossem exigidas não haveria condições de produção e todos morreriam. portanto, elas não são exigidas. porém, o Estado, ou um agente individual imbuído do poder estatal pode, se desejar, exigi-las todas de um cidadão inimigo seu. qualquer pessoa pode viver a vida inteira sem cumprir nem 10% das regulamentações estatais, mas viverá também todo esse tempo com medo de se tornar um alvo de sua exigência, num estado de terror psicológico. - **perversão de critérios**: para muitas coisas sobre as quais a sociedade normalmente chegaria a um valor ou comportamento "razoável" espontaneamente, o Estado dita regras. estas regras muitas vezes não são obrigatórias, são mais "sugestões" ou limites, como o salário mínimo, ou as 44 horas semanais de trabalho. a sociedade, porém, passa a usar esses valores como se fossem o normal. são raras, por exemplo, as ofertas de emprego que fogem à regra das 44h semanais. - **inflação**: subir os preços é difícil e constrangedor para as empresas, pedir aumento de salário é difícil e constrangedor para o funcionário. a inflação força as pessoas a fazer isso, mas o aumento não é automático, como alguns economistas podem pensar (enquanto alguns outros ficam muito satisfeitos de que esse processo seja demorado e difícil). - **inflação**: a inflação destrói a capacidade das pessoas de julgar preços entre concorrentes usando a própria memória. - **inflação**: a inflação destrói os cálculos de lucro/prejuízo das empresas e prejudica enormemente as decisões empresariais que seriam baseadas neles. - **inflação**: a inflação redistribui a riqueza dos mais pobres e mais afastados do sistema financeiro para os mais ricos, os bancos e as megaempresas. - **inflação**: a inflação estimula o endividamento e o consumismo. - **lixo:** ao prover coleta e armazenamento de lixo "grátis para todos" o Estado incentiva a criação de lixo. se tivessem que pagar para que recolhessem o seu lixo, as pessoas (e conseqüentemente as empresas) se empenhariam mais em produzir coisas usando menos plástico, menos embalagens, menos sacolas. - **leis contra crimes financeiros:** ao criar legislação para dificultar acesso ao sistema financeiro por parte de criminosos a dificuldade e os custos para acesso a esse mesmo sistema pelas pessoas de bem cresce absurdamente, levando a um percentual enorme de gente incapaz de usá-lo, para detrimento de todos -- e no final das contas os grandes criminosos ainda conseguem burlar tudo.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28nostr - Notes and Other Stuff Transmitted by Relays
The simplest open protocol that is able to create a censorship-resistant global "social" network once and for all.
It doesn't rely on any trusted central server, hence it is resilient; it is based on cryptographic keys and signatures, so it is tamperproof; it does not rely on P2P techniques, therefore it works.
Very short summary of how it works, if you don't plan to read anything else:
Everybody runs a client. It can be a native client, a web client, etc. To publish something, you write a post, sign it with your key and send it to multiple relays (servers hosted by someone else, or yourself). To get updates from other people, you ask multiple relays if they know anything about these other people. Anyone can run a relay. A relay is very simple and dumb. It does nothing besides accepting posts from some people and forwarding to others. Relays don't have to be trusted. Signatures are verified on the client side.
This is needed because other solutions are broken:
The problem with Twitter
- Twitter has ads;
- Twitter uses bizarre techniques to keep you addicted;
- Twitter doesn't show an actual historical feed from people you follow;
- Twitter bans people;
- Twitter shadowbans people.
- Twitter has a lot of spam.
The problem with Mastodon and similar programs
- User identities are attached to domain names controlled by third-parties;
- Server owners can ban you, just like Twitter; Server owners can also block other servers;
- Migration between servers is an afterthought and can only be accomplished if servers cooperate. It doesn't work in an adversarial environment (all followers are lost);
- There are no clear incentives to run servers, therefore they tend to be run by enthusiasts and people who want to have their name attached to a cool domain. Then, users are subject to the despotism of a single person, which is often worse than that of a big company like Twitter, and they can't migrate out;
- Since servers tend to be run amateurishly, they are often abandoned after a while — which is effectively the same as banning everybody;
- It doesn't make sense to have a ton of servers if updates from every server will have to be painfully pushed (and saved!) to a ton of other servers. This point is exacerbated by the fact that servers tend to exist in huge numbers, therefore more data has to be passed to more places more often;
- For the specific example of video sharing, ActivityPub enthusiasts realized it would be completely impossible to transmit video from server to server the way text notes are, so they decided to keep the video hosted only from the single instance where it was posted to, which is similar to the Nostr approach.
The problem with SSB (Secure Scuttlebutt)
- It doesn't have many problems. I think it's great. In fact, I was going to use it as a basis for this, but
- its protocol is too complicated because it wasn't thought about being an open protocol at all. It was just written in JavaScript in probably a quick way to solve a specific problem and grew from that, therefore it has weird and unnecessary quirks like signing a JSON string which must strictly follow the rules of ECMA-262 6th Edition;
- It insists on having a chain of updates from a single user, which feels unnecessary to me and something that adds bloat and rigidity to the thing — each server/user needs to store all the chain of posts to be sure the new one is valid. Why? (Maybe they have a good reason);
- It is not as simple as Nostr, as it was primarily made for P2P syncing, with "pubs" being an afterthought;
- Still, it may be worth considering using SSB instead of this custom protocol and just adapting it to the client-relay server model, because reusing a standard is always better than trying to get people in a new one.
The problem with other solutions that require everybody to run their own server
- They require everybody to run their own server;
- Sometimes people can still be censored in these because domain names can be censored.
How does Nostr work?
- There are two components: clients and relays. Each user runs a client. Anyone can run a relay.
- Every user is identified by a public key. Every post is signed. Every client validates these signatures.
- Clients fetch data from relays of their choice and publish data to other relays of their choice. A relay doesn't talk to another relay, only directly to users.
- For example, to "follow" someone a user just instructs their client to query the relays it knows for posts from that public key.
- On startup, a client queries data from all relays it knows for all users it follows (for example, all updates from the last day), then displays that data to the user chronologically.
- A "post" can contain any kind of structured data, but the most used ones are going to find their way into the standard so all clients and relays can handle them seamlessly.
How does it solve the problems the networks above can't?
- Users getting banned and servers being closed
- A relay can block a user from publishing anything there, but that has no effect on them as they can still publish to other relays. Since users are identified by a public key, they don't lose their identities and their follower base when they get banned.
- Instead of requiring users to manually type new relay addresses (although this should also be supported), whenever someone you're following posts a server recommendation, the client should automatically add that to the list of relays it will query.
- If someone is using a relay to publish their data but wants to migrate to another one, they can publish a server recommendation to that previous relay and go;
- If someone gets banned from many relays such that they can't get their server recommendations broadcasted, they may still let some close friends know through other means with which relay they are publishing now. Then, these close friends can publish server recommendations to that new server, and slowly, the old follower base of the banned user will begin finding their posts again from the new relay.
-
All of the above is valid too for when a relay ceases its operations.
-
Censorship-resistance
- Each user can publish their updates to any number of relays.
-
A relay can charge a fee (the negotiation of that fee is outside of the protocol for now) from users to publish there, which ensures censorship-resistance (there will always be some Russian server willing to take your money in exchange for serving your posts).
-
Spam
-
If spam is a concern for a relay, it can require payment for publication or some other form of authentication, such as an email address or phone, and associate these internally with a pubkey that then gets to publish to that relay — or other anti-spam techniques, like hashcash or captchas. If a relay is being used as a spam vector, it can easily be unlisted by clients, which can continue to fetch updates from other relays.
-
Data storage
- For the network to stay healthy, there is no need for hundreds of active relays. In fact, it can work just fine with just a handful, given the fact that new relays can be created and spread through the network easily in case the existing relays start misbehaving. Therefore, the amount of data storage required, in general, is relatively less than Mastodon or similar software.
-
Or considering a different outcome: one in which there exist hundreds of niche relays run by amateurs, each relaying updates from a small group of users. The architecture scales just as well: data is sent from users to a single server, and from that server directly to the users who will consume that. It doesn't have to be stored by anyone else. In this situation, it is not a big burden for any single server to process updates from others, and having amateur servers is not a problem.
-
Video and other heavy content
-
It's easy for a relay to reject large content, or to charge for accepting and hosting large content. When information and incentives are clear, it's easy for the market forces to solve the problem.
-
Techniques to trick the user
- Each client can decide how to best show posts to users, so there is always the option of just consuming what you want in the manner you want — from using an AI to decide the order of the updates you'll see to just reading them in chronological order.
FAQ
- This is very simple. Why hasn't anyone done it before?
I don't know, but I imagine it has to do with the fact that people making social networks are either companies wanting to make money or P2P activists who want to make a thing completely without servers. They both fail to see the specific mix of both worlds that Nostr uses.
- How do I find people to follow?
First, you must know them and get their public key somehow, either by asking or by seeing it referenced somewhere. Once you're inside a Nostr social network you'll be able to see them interacting with other people and then you can also start following and interacting with these others.
- How do I find relays? What happens if I'm not connected to the same relays someone else is?
You won't be able to communicate with that person. But there are hints on events that can be used so that your client software (or you, manually) knows how to connect to the other person's relay and interact with them. There are other ideas on how to solve this too in the future but we can't ever promise perfect reachability, no protocol can.
- Can I know how many people are following me?
No, but you can get some estimates if relays cooperate in an extra-protocol way.
- What incentive is there for people to run relays?
The question is misleading. It assumes that relays are free dumb pipes that exist such that people can move data around through them. In this case yes, the incentives would not exist. This in fact could be said of DHT nodes in all other p2p network stacks: what incentive is there for people to run DHT nodes?
- Nostr enables you to move between server relays or use multiple relays but if these relays are just on AWS or Azure what’s the difference?
There are literally thousands of VPS providers scattered all around the globe today, there is not only AWS or Azure. AWS or Azure are exactly the providers used by single centralized service providers that need a lot of scale, and even then not just these two. For smaller relay servers any VPS will do the job very well.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28 -
@ 1cb14ab3:95d52462
2025-01-08 03:33:11Tree branches, Rock. 4' x 4 [Boulder, USA. 2016]
Introduction
Nestled deep in the forest near Boulder, "Looking Glass" invites viewers to rediscover the quiet beauty of overlooked natural details. By framing the play of light, texture, and shadow through a 4-foot circular lens, the piece shifts focus to the microcosms of the forest, drawing attention to a small and overlooked waterfall.
Site & Placement
The lens is perched amid a cluster of trees, emphasizing a quiet patch of the forest that often goes unnoticed. Positioned 22 feet from the lens, a carefully placed bench offers a perfect vantage point, guiding visitors to linger, observe, and absorb the layered simplicity of the scene.
Impermanence & Integration
True to the ethos of the Earth Lens series, Looking Glass exists only briefly. Its natural materials—branches, wood, and rock—blend seamlessly into the forest and will eventually be reclaimed by it. The fleeting presence of the lens reflects the transient beauty of life, encouraging viewers to appreciate the details that often escape notice in the rush of time.
Reflection
In its short life, Looking Glass offers a moment of stillness and clarity, a chance to peer into the intimate world of the forest. The work becomes a lens not just for the environment but also for introspection, reminding viewers of the quiet wonders that surround them every day.
Photos
More from the 'Earth Lens' Series:
Earth Lens Series: Artist Statement + List of Works
COMING SOON: "Folsom" (Earth Lens 002)
COMING SOON: "Sanctuary" (Earth Lens 003)
COMING SOON: "Platte" (Earth Lens 004)
COMING SOON: "Grandfather" (Earth Lens 005)
COMING SOON: "Chongming" (Earth Lens 006)
More from Hes
All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Boardthreads
This was a very badly done service for turning a Trello list into a helpdesk UI.
Surprisingly, it had more paying users than Websites For Trello, which I was working on simultaneously and dedicating much more time to it.
The Neo4j database I used for this was a very poor choice, it was probably the cause of all the bugs.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Um algoritmo imbecil da evolução
Suponha que você queira escrever a palavra BANANA partindo de OOOOOO e usando só alterações aleatórias das letras. As alterações se dão por meio da multiplicação da palavra original em várias outras, cada uma com uma mudança diferente.
No primeiro período, surgem BOOOOO e OOOOZO. E então o ambiente decide que todas as palavras que não começam com um B estão eliminadas. Sobra apenas BOOOOO e o algoritmo continua.
É fácil explicar conceber a evolução das espécies acontecendo dessa maneira, se você controlar sempre a parte em que o ambiente decide quem vai sobrar.
Porém, há apenas duas opções:
- Se o ambiente decidir as coisas de maneira aleatória, a chance de você chegar na palavra correta usando esse método é tão pequena que pode ser considerada nula.
- Se o ambiente decidir as coisas de maneira pensada, caímos no //design inteligente//.
Acredito que isso seja uma enunciação decente do argumento "no free lunch" aplicado à crítica do darwinismo por William Dembski.
A resposta darwinista consiste em dizer que não existe essa BANANA como objetivo final. Que as palavras podem ir se alterando aleatoriamente, e o que sobrar sobrou, não podemos dizer que um objetivo foi atingido ou deixou de sê-lo. E aí os defensores do design inteligente dirão que o resultado ao qual chegamos não pode ter sido fruto de um processo aleatório. BANANA é qualitativamente diferente de AYZOSO, e aí há várias maneiras de "provar" que sim usando modelos matemáticos e tal.
Fico com a impressão, porém, de que essa coisa só pode ser resolvida como sim ou não mediante uma discussão das premissas, e chega um ponto em que não há mais provas matemáticas possíveis, apenas subjetividade.
Daí eu me lembro da minha humilde solução ao problema do cão que aperta as teclas aleatoriamente de um teclado e escreve as obras completas de Shakespeare: mesmo que ele o faça, nada daquilo terá sentido sem uma inteligência de tipo humano ali para lê-las e perceber que não se trata de uma bagunça, mas sim de um texto com sentido para ele. O milagre se dá não no momento em que o cão tropeça no teclado, mas no momento em que o homem olha para a tela.
Se o algoritmo da evolução chegou à palavra BANANA ou UXJHTR não faz diferença pra ela, mas faz diferença para nós, que temos uma inteligência humana, e estamos observando aquilo. O homem também pensaria que há //algo// por trás daquele evento do cão que digita as obras de Shakespeare, e como seria possível alguém em sã consciência pensar que não?
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Profits, not wages, as the originary factor
Adam Smith says that there were first workers earning wages, but then came the capitalists and extracted profits from those wages.
But in fact if that primitive state ever existed there were no workers, but entrepreneursearning profit. And since they were not capitalists ("capitalist" defined as someone that buys with the intent of selling) they were earning an infinite rate of profit.
When capitalists came they were responsible for introducing costs (investment) reducing thus the rate of profit -- and the more capitalistic the society the smaller the rate of profits.
-- George Reisman in https://www.bobmurphyshow.com/139
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Drivechain comparison with Ethereum
Ethereum and other "smart contract platforms" capable of running turing-complete code and "developer-friendly" mindset and community have been running for years and they were able to produce a very low number of potentially useful "contracts".
What are these contracts, actually? (Considering Ethereum, but others are similar:) they are sidechains that run inside the Ethereum blockchain (and thus their verification and data storage are forced upon all Ethereum nodes). Users can peg-in to a contract by depositing money on it and peg-out by making a contract operation that sends money to a normal Ethereum address.
Now be generous and imagine these platforms are able to produce 3 really cool, useful ideas (out of many thousands of attempts): Bitcoin can copy these, turn them into 3 different sidechains, each running fixed, specific, optimized code. Bitcoin users can now opt to use these platforms by transferring coins to it – all that without damaging the nodes or the consensus protocol that has been running for years, and without forcing anyone to be aware of these chains.
The process of turning a useful idea into a sidechain doesn't come spontaneously, and can't be done by a single company (like often happens in Ethereum-land), it must be acknowledge by a rough consensus in the Bitcoin community that that specific sidechain with that specific design is a desirable thing, and ultimately approved by miners, as they're the ones that are going to be in charge of that.
-
@ a012dc82:6458a70d
2025-01-08 02:56:16Table Of Content
-
Rollercoaster Rides
-
The Impact of Macroeconomic Forces
-
Short-term Projections
-
Ethereum's Steady Stance
-
Week-on-week Comparisons
-
Altcoins in Focus
-
The Laggards
-
Market Overview
-
Conclusion
-
FAQ
September has once again proven itself to be a tumultuous month for the world's most prominent cryptocurrency, Bitcoin (BTC). This month-long rollercoaster ride has historical roots, as September has historically been a challenging period for Bitcoin. However, the first two-thirds of the month showcased remarkable progress, raising expectations. But the recent resurgence of the US dollar has cast a shadow over the entire crypto market, leading to uncertainty among investors and traders.
Rollercoaster Rides
As the calendar pages flipped through September, Bitcoin embarked on a rollercoaster ride that left many in the crypto community holding their breath. Over the weekend, Bitcoin witnessed a significant dip, eroding a substantial portion of its gains for the month. Sunday's trading session saw the BTC/USDT pair drop by 1.2%, closing at $26,250. Monday's early trades further exacerbated the bearish trend, pushing the pair below $26,150. These rapid fluctuations in Bitcoin's value have been a hallmark of its journey in recent weeks.
The Impact of Macroeconomic Forces
In addition to its internal dynamics, Bitcoin has been significantly influenced by macroeconomic factors, particularly the policies and guidance provided by the Federal Reserve and other central banks. Last week, the Fed's unexpected hawkish stance sent shockwaves through financial markets, including the crypto sphere. This policy shift had an adverse effect on risk-on trading sentiment, causing investors to reevaluate their strategies. As the month approaches its conclusion, a less eventful macroeconomic calendar might imply reduced volatility in the coming days. However, the lingering impact of the Fed's decisions remains a source of uncertainty.
Short-term Projections
To gain insights into Bitcoin's short-term trajectory, market analysts have turned to Binance's order book analysis. According to their assessment, a support line appears to be forming at the $25,000 mark, providing some stability in the face of recent turbulence. Conversely, selling resistance has been identified at $27,500, indicating a significant challenge for Bitcoin's upward momentum. These levels are likely to play a crucial role in determining Bitcoin's path in the immediate future, with traders closely monitoring any breaches or rebounds.
Ethereum's Steady Stance
In contrast to Bitcoin's rollercoaster performance, Ethereum (ETH), the second-largest cryptocurrency by market capitalization, has demonstrated a more stable trajectory over the past few days. While Saturday saw minimal fluctuations, Sunday's trades witnessed a modest 0.8% dip, settling at $1,580. As of Monday, Ethereum has maintained this position, indicating resilience in the face of market turbulence. Ethereum's stability, as compared to Bitcoin's wild swings, underscores the unique dynamics at play within the broader cryptocurrency market.
Week-on-week Comparisons
Examining the performance of these two leading cryptocurrencies over the course of the week reveals intriguing trends. Bitcoin has experienced a 2% decline in its value, signaling the challenges it faced amid a shifting financial landscape. Meanwhile, Ethereum has faced a slightly more significant drop of over 3%. These fluctuations underscore the inherent volatility of the crypto market, even among its most prominent players.
Altcoins in Focus
Beyond Bitcoin and Ethereum, the broader altcoin spectrum presents a diverse set of performances. One standout performer has been Solana (SOL), which surged ahead by an impressive 1.75% in the past seven days. This remarkable growth has garnered the attention of investors and enthusiasts alike. Additionally, Ripple (XRP) has maintained positive momentum, adding approximately 0.8% to its value. These altcoins' resilience serves as a testament to the unique dynamics within the cryptocurrency ecosystem.
The Laggards
However, not all altcoins have been able to escape the gravitational pull of Bitcoin's performance. Prominent digital assets such as Binance's BNB token, Dogecoin (DOGE), Cardano (ADA), Polkadot (DOT), and Polygon (MATIC) have mirrored Bitcoin's downward trend. These digital assets have seen marginal losses in terms of their respective market capitalizations, underscoring the interconnectedness of the cryptocurrency market.
Market Overview
At present, the global cryptocurrency market cap stands at an impressive $1.04 trillion, signifying the substantial size and influence of the digital asset market. Bitcoin continues to command a dominant position, with a market dominance of 49.9%. This reaffirms Bitcoin's status as the undisputed leader in the digital asset space, despite the challenges it faces in September.
Conclusion
As September draws to a close, the battle between Bitcoin and the resurgent US dollar remains uncertain. The interplay between internal dynamics, macroeconomic factors, and market sentiment will continue to shape the crypto landscape in the days ahead. Traders and enthusiasts alike will be watching closely to discern the next moves in this high-stakes confrontation. As the dust settles, the cryptocurrency market will likely reveal new trends and opportunities for those who can navigate these uncertain waters with agility and insight.
FAQ
Why is September historically challenging for Bitcoin? September has traditionally been a tough month for Bitcoin, with factors like market sentiment and macroeconomic forces contributing to its volatility during this period.
How is the US dollar impacting Bitcoin's recent performance? The resurgence of the US dollar has cast a shadow over the crypto market, leading to uncertainty and impacting Bitcoin's value.
What are the short-term projections for Bitcoin and Ethereum? Short-term projections for Bitcoin suggest a support line at $25,000 and resistance at $27,500, while Ethereum has maintained relative stability.
Which altcoins have performed well recently? Solana (SOL) and Ripple (XRP) have shown positive momentum, but some prominent altcoins have followed Bitcoin's downward trend.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ b4d9d1f3:8f3dda8c
2025-01-08 01:43:16Creating a real quantum multitemporal messaging system to send messages to the past or interact with it is not feasible with current quantum technology or known physics. However, we can simulate this concept for a fictional or learning environment. Here's a plan:
- Emulating Qubits:
- Use quantum computing libraries like Qiskit to simulate qubits.
- Model how quantum information might be "encoded."
- Messaging Interface:
- An input/output system to send and receive "fictitious" messages.
- Generate altered timestamps to simulate messages sent to the past.
- Temporal Impact Simulation:
- Create logs where the message appears to have been received before it was sent.
- Optionally: Generate interactions based on a "past server."
Python Code: Quantum Multitemporal Messaging Simulation
This script uses Qiskit (quantum simulator) to emulate sending and receiving messages across different times. Install Qiskit first:
bash pip install qiskit
```python from qiskit import QuantumCircuit, Aer, execute from datetime import datetime, timedelta import random import time
def quantum_encode_message(message: str): """ Encodes a message into a quantum circuit. Simulates quantum superposition for multitemporal messaging. """ # Create a quantum circuit with 1 qubit and 1 classical bit qc = QuantumCircuit(1, 1)
# Apply Hadamard gate to put the qubit into superposition qc.h(0) # Encode the message as a "rotation" on the qubit rotation = sum(ord(char) for char in message) % 360 # Message as an angle qc.rx(rotation, 0) # Measure the qubit qc.measure(0, 0) return qc
def send_message_to_past(message: str): """ Simulates sending a message to the past using quantum encoding. """ print(f"Sending message: '{message}'") qc = quantum_encode_message(message)
# Simulate execution on a quantum simulator simulator = Aer.get_backend('qasm_simulator') result = execute(qc, simulator, shots=1).result() state = list(result.get_counts().keys())[0] # Generate a "past" timestamp past_time = datetime.now() - timedelta(minutes=random.randint(1, 60)) print(f"Message encoded in quantum state: {state}") print(f"Message appears to have been delivered on: {past_time.strftime('%Y-%m-%d %H:%M:%S')}\n") return past_time
def receive_message(): """ Simulates receiving a message that was "sent from the future". """ future_time = datetime.now() + timedelta(minutes=random.randint(1, 60)) message = random.choice(["Hello from the future", "Quantum messaging works!", "This is a test message."])
print(f"Received a message: '{message}'") print(f"Message appears to have been sent on: {future_time.strftime('%Y-%m-%d %H:%M:%S')}\n") return message, future_time
Main simulation loop
if name == "main": print("== Quantum Multitemporal Messaging System ==")
# Simulate sending a message to the past send_message_to_past("This is a quantum message to the past.") # Simulate receiving a message from the future receive_message() print("Simulation complete.")
```
How the Code Works 1. Quantum Message Encoding: - Uses a basic quantum circuit with a qubit in superposition (Hadamard gate) to encode the message. - Encoding is simulated as rotations based on the message's content.
- Simulating Messages to the Past:
- Generates fictitious timestamps that make it appear as if the message was delivered to the past.
-
Uses quantum simulation to "encode" the data.
-
Simulating Messages from the Future:
- Generates predefined messages with timestamps that appear to be from the future.
Limitations - This is a simulated system and does not actually interact with the past or future. - It is designed to learn basic concepts of quantum computing and simulation.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28A list of things artificial intelligence is not doing
If AI is so good why can't it:
- write good glue code that wraps a documented HTTP API?
- make good translations using available books and respective published translations?
- extract meaningful and relevant numbers from news articles?
- write mathematical models that fit perfectly to available data better than any human?
- play videogames without cheating (i.e. simulating human vision, attention and click speed)?
- turn pure HTML pages into pretty designs by generating CSS
- predict the weather
- calculate building foundations
- determine stock values of companies from publicly available numbers
- smartly and automatically test software to uncover bugs before releases
- predict sports matches from the ball and the players' movement on the screen
- continuously improve niche/local search indexes based on user input and and reaction to results
- control traffic lights
- predict sports matches from news articles, and teams and players' history
This was posted first on Twitter.