-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ df478ecd:495107a7
2025-01-10 17:44:56This weekend will be a great weekend to mainline some 3blue1brown material -
@ 1eb5d2c9:ee9e8d5f
2025-01-09 23:32:23nostr:nprofile1qqsfvzdsjdzsm4lq47ecjcv6ekhju6sddqtujd2j7wg3upd4ptnnu0gpzdmhxue69uhhwmm59e6hg7r09ehkuef07r6dtk -
@ 1eb5d2c9:ee9e8d5f
2025-01-06 04:02:48{"id":"d255a06039501e4bdfe100f40ad05d45c5a6de4d3c2d91b0e730ffa2cc31271e","pubkey":"d361c522fc291b1d478b23bcdcc81838d06a061e1d6e66b46c328daab6fe887c","created_at":1735699977,"kind":1,"tags":[["r","https://xcancel.com/BitcornHodler/status/1874149602372575476"],["r","https://image.nostr.build/9fbca5c0266204a359b7b35e702a98838470293238683a7ebf0107672eadd676.jpg"],["r","https://image.nostr.build/ab6e0fc5fbaa9c6b1061693cdbd94d2a89f76fc4093e4d4eb369f73e2eb5df2a.jpg"],["imeta","url https://image.nostr.build/9fbca5c0266204a359b7b35e702a98838470293238683a7ebf0107672eadd676.jpg","m image/jpeg","alt Verifiable file url","x 8ed1fc0f1eac9688e156e2c9b9c429ff74da8dd7bb317d644d7fb089e244cc96","size 187813","dim 1179x1870","blurhash ^28XIL~q00M{009Fax%Mt7IUWBRjM{t7t7M{ofofWAt7ayRjofof00t7%MM{-;oz%Mt7M{RjofxuofRjRjoft7xu?bfQIUofoft7M{Rjt8WBogt7","ox 9fbca5c0266204a359b7b35e702a98838470293238683a7ebf0107672eadd676"],["imeta","url https://image.nostr.build/ab6e0fc5fbaa9c6b1061693cdbd94d2a89f76fc4093e4d4eb369f73e2eb5df2a.jpg","m image/jpeg","alt Verifiable file url","x db2f0bc8996beb279bb04cd83a0fa0888bcba764096bb1a3f15e44075942883a","size 180741","dim 1179x1794","blurhash ^18Ntl_300IU00IUxut7xuxuWBM{9Exu-;ofxuRjt7IUIURjWB%M4nxuxvRjxuM{D%t7t7ofxuWB9FWBxufQt7WB9Fxut7WBt7Rj9FM{t7WBt7%M","ox ab6e0fc5fbaa9c6b1061693cdbd94d2a89f76fc4093e4d4eb369f73e2eb5df2a"]],"content":"2025 IS GOING TO BE A MASSIVE YEAR FOR KYC.\n\nALL CAPS. FULL SEND. LETS FUCKING GO. 🫡\n\nhttps://xcancel.com/BitcornHodler/status/1874149602372575476\n https://image.nostr.build/9fbca5c0266204a359b7b35e702a98838470293238683a7ebf0107672eadd676.jpg\n\nhttps://image.nostr.build/ab6e0fc5fbaa9c6b1061693cdbd94d2a89f76fc4093e4d4eb369f73e2eb5df2a.jpg","sig":"aa73bf10114bbf4c460b2cd92c2c204f98a32e71578f6c8ce98cdd1aec577c75df536833a2eb26d8a164ff84267863bc42e01c1a1ed909cce9c8ca7b75648901"} -
@ 1eb5d2c9:ee9e8d5f
2025-01-05 18:24:03Great video, but I lost respect for him when he said that he "got lucky" with bitcoin -
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 1eb5d2c9:ee9e8d5f
2025-01-02 19:05:37It has just dawned on me how extremely fucking based this is. This is legit raising my faith in humanity again 🫡🚀 -
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 1eb5d2c9:ee9e8d5f
2025-01-02 19:00:07Yeah, gotta watch out for satsbots and Nostrthots. Thanks for the PSA -
@ 1eb5d2c9:ee9e8d5f
2025-01-02 18:57:16LMFAO Nice try, bozos 🤡 -
@ 9bcc5462:eb501d90
2025-01-10 19:42:28Cuneiform is mankind’s first writing system created by the ancient Sumerians of Mesopotamia, what is now Iraq. (The word “Sumer” means land of civilized kings). Despite being developed 5,000 years ago, its parallels to Notes and Other Stuff Transmitted by Relays will blow your mind! The most striking is how both breakthroughs materialized from the fundamental need to track value exchange–from primal grain tallies to now exchanging bitcoin.
Let’s begin with the fact that the styluses used by these archaic scribes were crafted from reed plants. Their stems were strong because of attachment points called nodes! These were the resilient, ring-like parts of the stem that joined it together with the rest of the plant. Similarly, although symbolically, lightning nodes are powerful on nostr since they allow us to zap each other with sats. An approach stemming from the need to modernize how we interact on social media, trade in networks and conduct business—It’s not surprising cuneiform came about as a way for merchants and farmers to track economic transactions and agricultural inventories!
Another parallel involves how both share everlasting marks. The Sumerians used their styluses to press wedge-like symbols onto wet tablets. They then would bake them in the sun, leaving a permanent record of the documentation. If an error was made, it could not be changed. Likewise, on nostr there is no delete function. Once you publish a note, including any typos, it is preserved for history.
Lastly, the proto-writing that emerged in Mesopotamia which led to Cuneiform was in the form of bullae (bulla: singular). These were spherical clay envelopes encased with tokens representing a transaction. They were sealed with unique markings representing the parties involved for authentication. In other words, cuneiform cylinder seals were effectively early public key cryptography! The seal itself being the private key and its impression being the public key. Just as us nostriches use our nsec to sign our notes with integrity and verify value-for-value with our npub.
*Rare bulla seal (shout out to Conny Waters from ancientpages.com)*
*Sumerian cuneiform tablet (source: britannica.com)*
At the end of the day, maybe we’re not so different from our ancestors after all. The evolution of our writing technology over the course of our history is more than innovation born of necessity. Across millennia, 3025 BCE to 2025 AD, it's man telling the universe– we will be remembered– beyond space and time. As our ancestors stacked their clay tablets, we’ll stack our sats! Onward nostr! The new land of civilized kings.
*Mankind's Innovations in Writing Technology by Learning Producers, Inc.*
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 746a245a:7a8d8b34
2025-01-10 17:57:04
1. Self custody
Always. Send your BTC to cold storage. Don't hesitate because of high network fees when mempool activity is high. Rather pay 10% or more to secure your coins than risk loosing 100% of a cosiderable amount. If you have questions about self custody see this guide on the 5 Best Practices to Store Your Bitcoin.
2. Back up well
Restore a wallet at least once. Make sure you know how to get back your coins in a worst case scenario. (Also make sure your heirs are able to do it when time comes.)
3. Never try to time the market
DCA. Set it and forget it. Monthly, weekly, by-weekly or daily doesn't matter. Choose what best suits you. Do this for the majority of your BTC allocation. You can not time the bottom. Period. (But you can have a little pile of FIAT to buy dips when they occur.)
4. You can not time the top either
Never sell the majority of your Stack. Take a little profit if things go parabolic to reward yourself but always keep your main stack intact. It can be hard to get it back. And it will only go up with time. HODL and understand what you own.
5. Keep emotions out
Greed and fear are the main factors for people to get wrecked. Slow steady purchases, even tiny ones, all go to building a stack.
6. Never use leverage
Just don't. No, not even if BTC is below 10k. Make sure every sat you own truly belongs to you.
7. Every sat counts
Even if it's small amounts, just keep dca-ing and stacking sats. Little pieces add up. 0.001 BTC = $25 at the time of this writing. Do this 100 times and you have a tenth of a BTC. If you have very little FIAT, stack free sats. You can:
- use faucets (like freebitco.in or cointiply.com)
- do tasks (like microlancer.io)
- play games (like Bitcoin Miner)
- shop with services like lolli.com or foldapp.com
- listen to podcasts (with fountain.fm)
- educate yourself on Bitcoin (with BitcoinMagazine)
- or be active and provide value in communities like nostr, stacker.news or habla.news
Remember: Faucets used to give hundreds of Bitcoin per day. Now it's 5-250 sats 10 years later. In 10 years it may be 1-5 sats.
8. Don't go all in
Keep FIAT to survive hard times without being forced to sell BTC. (for example 6 months of monthly spending)
9. Enjoy life while stacking
There is only one thing that is more precious than Bitcoin. It is lifetime. Stack sats, but also stack moments. Be present and enjoy life. Every day. No amount of BTC can ever buy back lifetime. Remind yourself of this often.
10. Don't forget yourself
Always have a little fun money to maintain hobbys, traveling and to treat yourself. Otherwise you might burn out quickly.
11. Involve your significant other
Make sure he/she knows the reason why you do what you do. Otherwise you risk burning out him/her too.
12. Automate and relax
When you check your portfolio ten times a day or more think of automating things. Don't trade lifetime and serenity for small gains.
13. Don't do shitcoins
Most altcoins never reach their ATH again. BTC and BTC only.
14. Stay humble
Never get lured by offers that promise yield in exchange for holding your BTC. FTX was a recent example of how that can end.
15. You lost your keys in a boating accident
Never share how much Bitcoin you own. Better yet, don't share that you own any at all (exception: rule #11). The less is known about you having BTC, the less risk. Also consider buying non KYC. For example with robosats or bisq.
16. Don't rush. Be patient
It is a marathon, not a sprint. Time is on your side. You already own Bitcoin. You won. It isn't a race like with FIAT where you have to fight inflation. You preserve wealth.
17. Increase your FIAT earnings
Learn profitable skills to increase your buying power and generally grow as a person. Even if you loose all your wealth, nobody can take away your skills to accumulate it again.
18. Don't compare
Every stack of BTC is better than no stack of BTC. And even if you are a whale: there will always be a bigger fish somewhere in the sea ...
19. You don't need 1 full BTC
This was huge for me! The urge to have one full BTC is very FIAT minded thinking. Goals are cool but:
21 million BTC / 8 billion humans in the world =0,00262500 BTC
And not even that is possible because of the 1,1 m BTC wallet of Satoshi Nakamoto and lost coins. You can find out the exact amount every individual on earth could possibly own at satoshisperperson.com.
Not everyone needs a whole coin. About 225.000 sats = your little block of Bitcoin. ... That's roughly $55 at the time of this writing. Got that? Congratulations! 99% of people are still on zero. Safe your share and then slowly add more every pay check.
20. Change perspective
You can change settings in your wallet to display value in sats rather than BTC. This liberates from the feeling of shortage and the urge to fill that full BTC. It opens up the feeling of gratitude and abundance.
21. Always learn
Keep educating yourself about Bitcoin. The rabbit hole is deep ...
Thank you!
Thank you wonderful people who helped me gather those tips. I chose consciously to not give personal credit in this post because of rule #15 =)
Find me on Nostr
My Nostr npub:
npub1w34zgkkjznnf2209gnhc5snkd32lkc9hnncq45rypyzsx75d3v6qcz3ndd
What have i missed?
Do you agree with these tips? Did i miss any? Please let me know and help refine this set of rules so we can breed more an more whole coiners over time ... or let's rather call it 'satoshi millionaires' (see rule #19 ;-)
P.S. Feel free to tip me some sats or share this post if you find it helpful. Working on my own little stack too ;-)
-
@ 1eb5d2c9:ee9e8d5f
2025-01-02 18:08:23Rent-free lmao, going out of their way to update the article -
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 1eb5d2c9:ee9e8d5f
2025-01-02 18:06:22I assure you that you aren't alone. It is important to ask ourselves what the telos is of the freedom networks we're building upon -
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 1eb5d2c9:ee9e8d5f
2025-01-02 15:03:19Even Nostr has ragebait. Touching grass helps fight the beast, too -
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 1eb5d2c9:ee9e8d5f
2024-12-31 14:41:42Sick, gonna go find this -
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 1eb5d2c9:ee9e8d5f
2024-12-27 19:59:07I avoided Bitcoin because it will be attacked -
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 1eb5d2c9:ee9e8d5f
2024-12-27 19:43:25Also, kudos for pointing out that SoV and MoE is a false dichotomy nostr:nprofile1qqsxe3pztauhp3ttna9p0p9gthdmm6t4n83ktw5vse9ymyg9js4hygspzdmhxue69uhhwmm59e6hg7r09ehkuef03apjvf. I'm SO relieved to hear it from someone else -
@ 746a245a:7a8d8b34
2025-01-10 17:50:10In the past few years i have struggled a lot to find "the right" way to store bitcoin.
There is a lot of advice on this topic scattered around the web. I have consumed it, i have tested it and i have discussed it.
Here is what i found to be the best practices to store your bitcoin as a newbie or intermidiate.
I have split this up into two parts:
- Part 1: Essentials - The absolute bare minimum requirements you need to implement ASAP (this post)
- Part 2: Recommended - How to upgrade security and what mistakes to avoid (coming soon)
Let's start with the Essentials ...
Part 1: Essentials
I assume you already know a thing or two about bitcoin if you read this post, so i skip the obvious "No your keys not your coins" stuff.
These are the absolute minimum safety requiements. If you have not implemented these, stop everything you do and follow these steps immediately:
1. Use a hardware wallet
Hardware wallets are specificly built for one single purpose. To secure your private keys and thuss the access to your bitcoin.
Do i really need a hardware wallet?
Short answer: Yes.
Long Answer: It depends on your funds. If you only have bitcoin worth a few hundred bugs, it might not be necessary. A hardware wallet costs about $50-200. But as soon as you feel uncomfortable, you should get one. It is an individual decision. Like someone doesn’t bother running around with a few thousand dollars in his pocket and another one feels uncomfortable with even a few hundred. BUT it is good practice to treat the security of your funds right now as if they already were 10x. As a 10x can happen pretty quickly, as we have seen in the past two years, and you don’t want to do security upgrades in a rush and from a point where you feel unsafe. This leads to mistakes which can lead to total loss (for example sending to a wrong address). Self custody is the first an most important rule to follow if you want to keep your coins and become a whole coiner. If you can't afford a hardware wallet now, at least use a hotwallet ...
Can i use a hotwallet instead?
Hotwallets are wallets, that are connected to the internet, like Apps on your PC or smartphone. They are considered not to be as safe as harwarewallets (so called coldwallets), because if something has no connection to the internet, there is a huge part of risk being taken away. But hotwallets are still way better than leaving your funds on an exchange because with a hotwallet you get the keys to your funds. With exchanges you only get an IOU aka a promise from the exchange. And we have seen how that ends with MountGOX, FTX, Celsius, Blockfi and various others ... Use hotwallets rather on smartphone than on desktop device, as smartphones are a little more secure. A few good ones i could recommend are Blue Wallet, Green Wallet and Exodus but there are a lot of good solutions out there. Just make sure to get a 12 or 24 word seed recovery phrase when setting it up so you are really in full control of your funds. But if you can use a hardware wallet, rather choose that.
Which wallet should i get?
I did try a few but not all of them: - The one i would recommend the most at this point in time is the Blockstream Jade Classic as it comes with almost all possible features you could imagine for a very reasonable price. You can even use it completely airgapped wit QR codes and use it without keystorage like a SeedSigner. I will touch on those features later on in part 2. nostr:npub1jg552aulj07skd6e7y2hu0vl5g8nl5jvfw8jhn6jpjk0vjd0waksvl6n8n is also very active on nostr and provides good support for us plebs. - Coldcard is also a hardware wallet i hear a lot of good stuff about. - As well as the BitBox02 Bitcoin only edition. - Trezor has had some security issues regarding to not having a secure element. I am sure they implemented a solution in the meantime, but i am not up to date with this so i can not recommend it without any doubt. - Ledger devices were generally considered safe but they had multiple security related incidents such as leaking customer data or admiting to be able to extract your seed from the wallet. The fact that they allow to store other crypto currencies, also introduces a bigger attack surface. Thuss i don't recommend using a ledger. If you only have a ledger it's still better than leaving your coins on an exchange though. - SeedSigner, as described, is more for advanced users or if you really want to dig into it, in my opinion. You could also use the Blockstream Jade as a SeedSigner.
Where should i buy?
This is important: Order hardware wallets ONLY straight from the store of the manufacturer. Any middleman or additional steps in the delivery process increase the risk of your device being manipulated. If you are really paranoid about this stick with Coldcard or the new Jade Plus as these models have a build in mechanism to check if they have been tempered with. Also consider using a postbox or working address when you order a hardware wallet or any bitcoin related stuff in general. The less people know that you own bitcoin, the better.
2. Use single-sig wallets
Backup your 12 or 24 words seed phrase and store them in a secure place (safe from theft, fire, water AND CHILDREN etc. i will get to how to achieve this). Most cases in loss of bitcoin happen because of the loss of access to the keys. Not because of theft. So the biggest risk you should care for is that you don't lose access to your keys. And how do most people lose access to their keys? They either ...
1) make the backup too complex so that themselves or their heirs have no clue how to restore it or 2) they are too lazy with their backup so that a flooded basement, thrown away harddrive or deleted photo causes them to loose their bitcoin forever.
Yes there are usecases for multi-sig set-ups and yes it introduces a better level of safety but it also introduces a higher risk of loosing your funds because of complexity. As a newbie or intermediate you don't have to dig into this complexity. You can, but unless you understand very well what you are doing, i wouldn't recommend using multi-sig wallets. Remember: 99% of bitcoin losses don't accure because of theft. If you still feel the need to add a little more security for this aspect, i recommend using a passphrase instead, which has also it's own trade-offs, as we will discuss in the recommended techniques in part 2.
3. Secure your wallet with a good PIN
Don't choose your mother's birthday as your PIN or anything else that can be social engineered. The more random, the better. And the longer the better. If you use multiple hardware wallets, also use different PINs for them. PINs on their own are generally not a very good method to protect anything. A 4 digit PIN for example only gives 10,000 possible combinations (from 0000 to 9999). A modern computer can try these all out pretty fast. BUT fortunately most wallets have a solution for this: If you enter the wrong PIN multiple times in a row they will reset to default and erease the stored keys. Thuss an attacker has only a few tries. Wallets that i know of doing that are the Blockstream Jade or the Coldcard for example. Both also provide the option to set up a specific wallet erease PIN that clears the wallet when entered once. Maybe consider these factors when choosing a wallet.
4. Backup your seed WELL
Backup your seed phrase offline, with pen and paper. Better yet on steel (more on that in upcoming part 2). But make sure that your seed phrase is NEVER being put into or shown to a device other than your hardware wallet. NEVER EVER! Don't make a picture of it to store in your cloud, don't safe it in your notes, don't think you are safe storing it in an encrypted file. You are not. Do it offline and keep it offline. Always. Now let's talk material ...
What material should i use?
Paper can burn, suffer from contact with water, be blown or thrown away and be destroyed from all other sorts of things. I found the safest way to backup a seed phrase is by hammering it into a stainless steel plate. These steelwallets don't break the bank like some fancy Cryptotag or other known brand backup solutions do and in most cases they are even better. Espacially when it comes to the backup style:
What way to perform the backup?
Plain text, letter by letter, hammered onto a steel plate. See part 2 for more details on why this is the best method.
5. Test your backup
Every owner of a substantial amount of bitcoin should have restored his wallet at least once! Make sure you know how to get your funds back in case something goes wrong. Especially if you do more complex things like passphrases (which we will cover in part 2) but also if you only use the 12 or 24 word seeds. The way i like to do it is as follows:
- Step 1) When you have set up your wallet, send a small amount of sats to it. This is a good practice anyway to make sure everything works as intended before sending larger amounts.
- Step 2) After your wallet has recieved the small amount reset your device to default. That means completely whiping it. MAKE SURE YOU HAVE BACKED UP YOUR SEED WELL!
- Step 3) Restore your wallet with your backup.
- Step 4) [optional but recommended] Send that small amount of sats back to verify that you truly have full control over this wallet.
If you can access (and control) the small amount of sats, your backup works and you can now send larger amounts. This is also a good way to test if you have properly backed up your passphrase, in case you are setting up a passphrase wallet.
Now what?
When your funds grow bigger, eventually you will ask yourself: "Is this secure enough?" If you are in that position, the recommended methods in part 2 will help you upgrade your security and avoid common mistakes which could put your coins at risk (part 2 will be linked here as soon as it's available).
What have i missed?
Do you agree with these essentials on how to store bitcoin? Did i miss anything? Please let me know and help to refine this set of rules so we can help more and more people to become souverein bitcoin holders.
-
@ 1eb5d2c9:ee9e8d5f
2024-12-27 19:41:33Saylor, Cantor Fitzgerald, JP Morgan, and all of their bitcoinbug ilk are **attacking** Bitcoin. Act accordingly. Hope y'all have your houses in order, because these cycles are gonna get real thick -
@ f9c0ea75:44e849f4
2025-01-10 17:47:02As the world moves toward an era of centralized digital finance, Brazil is not staying behind. The Banco Central do Brasil (BCB) is pushing forward with DREX, the country’s official Central Bank Digital Currency (CBDC). Framed as a way to enhance financial inclusion, reduce costs, and improve transparency, DREX is being marketed as a technological leap toward modernizing Brazil’s monetary system.
However, behind the promises of efficiency and security, DREX is nothing more than a digital cage designed to tighten state control over financial transactions. While some will celebrate it as a step toward reducing corruption and simplifying the economy, it is, in reality, a massive expansion of governmental power.
From a sovereign individual perspective, DREX represents the opposite of financial freedom, privacy, and autonomy. It is a tool of state surveillance, censorship, and financial control. In this article, we will analyze the history of DREX, its technical framework, the government’s next steps, and why this CBDC is ultimately a dangerous escalation of state power.
The Evolution of DREX: From Concept to Implementation
DREX, originally known as the Digital Real, is Brazil’s response to the growing global trend of CBDCs. The BCB began discussions on launching a digital currency in 2020, shortly after China began rolling out the digital yuan (e-CNY) and the European Union started developing the digital euro.
The stated objectives of DREX are:
- Modernizing Brazil’s financial infrastructure.
- Increasing financial inclusion for the unbanked.
- Enhancing transparency in transactions.
- Reducing costs in financial intermediation.
While these objectives sound beneficial, history has shown that every expansion of financial control by the state—from fiat currency inflation to banking regulations—ends up benefiting the government and central banks, not the average citizen.
Technical Framework and Features
DREX operates on a permissioned blockchain, meaning it is not decentralized like Bitcoin or other public blockchains. Instead, it is fully controlled by the BCB and a consortium of selected financial institutions.
Key Features of DREX:
- Programmability: The government can restrict how money is spent (e.g., banning purchases of certain goods, enforcing expiration dates on funds).
- Full Traceability: Every transaction is recorded on a centralized ledger, allowing the BCB to monitor all financial activity in real time.
- Interoperability: DREX will integrate with PIX, Brazil’s instant payments system, ensuring full adoption by the population.
- Smart Contracts: The government can automatically enforce financial rules, including instant tax collection, fines, and spending restrictions. While these features are marketed as "efficiencies," they enable unprecedented levels of financial control, making censorship, surveillance, and direct government intervention easier than ever before.
Historical Context: The Rise of Financial Control
To understand why DREX is dangerous, we must recognize how governments have historically weaponized financial systems to control their populations.
-
Bretton Woods & Fiat Expansion (1944-1971): The transition from a gold-backed currency to fiat money allowed governments to inflate their currencies at will, leading to massive economic manipulation.
-
The Patriot Act & Financial Surveillance (2001): In response to terrorism, the U.S. expanded financial surveillance, giving banks and governments unprecedented control over monetary flows.
-
China’s Social Credit System & Digital Yuan (2014-Present): China’s digital yuan (e-CNY) is integrated with the Social Credit System, allowing the government to punish or restrict people based on their financial behaviors.
-
The Canadian Trucker Protests (2022): Canada froze bank accounts of individuals who donated to anti-government protests, proving how financial infrastructure can be weaponized against political dissent. DREX fits perfectly into this pattern: a government-controlled digital money system designed to expand state power while eliminating financial autonomy.
## Next Steps: DREX Implementation Timeline and Government Actions
The BCB has already laid out its roadmap for DREX, with critical milestones planned for the next two years.
- Pilot Phases and Testing
- Phase 1: Initial Testing (2023-2024) Focused on the fundamentals, including wholesale CBDC (wCBDC), tokenized deposits, and digital treasury bonds. Initial testing on issuance, transfers, and settlements.
- Phase 2: Smart Contracts & Advanced Features (2024-2025) The second phase, launched in late 2024, focuses on developing smart contract applications for financial services. Participants include Santander, Visa, Mastercard, and Google, working on credit systems, trade finance, and real estate integration.
- Key Dates and Obligations
- October 2024 - November 2024: Application period for financial institutions to join Phase 2 of the pilot.
- June 2025: Deadline for selected institutions to finalize smart contract development.
- Late 2025 - Early 2026: Projected nationwide rollout of DREX. 2026 and beyond: Gradual phase-out of cash transactions, forcing adoption of CBDC-based payments.
- Full Implementation & Adoption Strategy Mandatory Integration: Financial institutions will be required to adopt DREX, ensuring all transactions move to a CBDC-controlled system. Cash Restrictions: Physical cash transactions will become increasingly limited, eventually leading to a cashless society.
The Illusion of Convenience and the Death of Sovereignty
DREX is not a neutral technology—it is a massive expansion of government power under the guise of efficiency and financial modernization.
Many will embrace it without questioning its implications. They will:
Cheer as DREX automates tax collection. Applaud anti-corruption measures that allow the state to track every transaction. Celebrate how it "simplifies" payments, ignoring that it also simplifies financial censorship. But make no mistake:
DREX is not about efficiency—it is about control
Once fully implemented, the state will have the power to:
- Monitor all financial transactions in real-time.
- Restrict spending on certain goods or services.
- Enforce automatic taxation without consent.
- Freeze or seize funds instantly, without due process.
- Eliminate cash, ensuring full reliance on a government-controlled financial system.
The Leviathan is Awakening Philosopher Thomas Hobbes described the state as a Leviathan— "a massive entity that must be obeyed to maintain order. However, when the state controls money, it controls freedom itself."
DREX is the final piece of the puzzle in creating a fully monitored, fully controlled financial system where every transaction is dependent on government approval. By 2025, DREX will be a reality. By 2026, financial privacy may no longer exist for the commons in Brazil. However, Bitcoin exists for the sovereign individual.
-
@ 2e8970de:63345c7a
2025-01-10 17:03:47Childhood cancer death rates in the United States have declined six-fold over the last seventy years.
https://ourworldindata.org/cancer
originally posted at https://stacker.news/items/845142
-
@ e97aaffa:2ebd765d
2025-01-10 16:39:58Adoro ver os fiduciários a publicarem dados, na qual desmente declarações ou atitudes dos próprios fiduciários no passado.
Quando estávamos em plena crise inflacionista, os políticos e economistas correram para as televisões e jornais a atribuir a responsabilidade da inflação, em exclusividade, à guerra da Ucrânia.
«A invasão da Ucrânia pela Rússia, há dois anos, alimentou uma escalada dos preços do gás natural e da eletricidade na Europa, e o disparo da inflação para níveis históricos.» – Expresso
Mas antes de começar a guerra, a inflação(IPC) estava nos 5.3%, já em máximos históricos.
É claro que a guerra contribuiu para a subida de preço, mas não foi a principal razão.
A subida generalizada de preços, vulga inflação, pode acontecer por dois fatores distintos.
Ruptura na cadeia de abastecimento
Quando existe uma ruptura na cadeia de abastecimento, ou seja, um problema na oferta ou na demanda.
A guerra provocou uma ruptura na oferta, sobretudo na energia e nos cereais. Na pandemia houve uma ruptura na demanda, nas máscaras e no álcool gel.
Só que este tipo de inflação é temporária, de curto prazo, a longo prazo acaba por corrigir. Têm um impacto inicial, o preço dos produtos sobem rapidamente, depois a indústria ajusta-se e os preços acabam por corrigir.
Inflação monetária
Ao contrário da ruptura da cadeia de abastecimento que é temporária, a inflação monetária é persistente, nunca mais volta aos valores anteriores.
Esta inflação é gerada pelo bancos centrais ou bancos comerciais, através de políticas que aumentam a base monetária, para os leigos, os bancos imprimem dinheiro.
O aumento da base monetária não gera inflação de imediato na economia, esse processo é demorado, os fiduciários chamam-no de tempo de transmissão.
É um delay que existe, desde o momento em que se aplica uma mudança da política monetária e os seus efeitos a serem visíveis na economia real. Este delay pode variar entre 6 meses a 2 anos.
Observando o gráfico, a subida do IPC iniciou-se a Março de 2021, mas começou a acelerar 6 meses após, muito antes da guerra.
Se existe um delay na causa-efeito, logo a inflação é resultante de algo que aconteceu anteriormente, vamos ver o que aconteceu nos 2 anos anteriores.
Nesse período aconteceu a pandemia e o BCE efetuou o maior aumento da base monetária, desde a criação da moeda única. O início foi no primeiro trimestre de 2020 e a inflação (IPC) começou a subir no primeiro trimestre de 2021, mais ou menos um ano, correspondente ao intervalo de tempo do tempo de transmissão. A semelhança entre a impressão do banco central (EUCBBS, em azul) e o IPC (em azul) é perfeita, apenas com um delay.
O BCE imprimiu (QE) ~4 triliões de euros, corresponde a um aumento de ~90% da base monetária(EUCBBS), no seu pico, em Setembro de 2022. Nesta mesma data, o IPC atingiu os 9%, o que levou o BCE a implementar medidas mais drásticas para combater a subida de preços, aplicou políticas de redução de recompras de obrigações do Tesouro e a subida das taxas diretoras.
As políticas surtiram efeito, o EUCBBS teve uma correção, de 8.84 triliões para 6.36 triliões, mas se compararmos de 2020 a 2024, houve um aumento de 1.7 triliões, ~37%, ou seja, o EUCBBS não voltou aos valores anterior.
Passados 2 anos após a guerra, os preços da energia e dos cereais, já baixaram, estão bastante abaixo do pico. Enquanto o EUCBBS está muito longe dos valores de 2020. Para que os produtos voltassem ao preço de 2021, o EUCBBS também necessitaria voltar para valores anteriores à guerra, mas isso nunca vai acontecer.
A inflação monetária não é temporária, é permanente.
-
@ 378562cd:a6fc6773
2025-01-10 16:37:38For many of us, reading isn’t just a pastime—it’s a deeply personal goal tied to self-growth, relaxation, and exploration. Yet, despite knowing its importance, we often struggle to make it happen. We start and stop, let books gather dust, and feel guilty for not finishing them. The truth? It’s not a time issue; it’s a mental barrier.
This guide is designed to help you break through those barriers with a structured, rewarding framework that keeps you interested, engaged, and building momentum. Let’s turn reading into a habit you love—and can sustain.
Step 1: Understand the Real Problem
Before diving into action, take a moment to reflect. The issue isn’t that you don’t have time—it’s that you haven’t made reading a priority. Life pulls us in countless directions, but we always find time for what matters most. Reading deserves that place in your life because it nourishes your mind, brings you joy, and inspires growth.
Ask Yourself:
- Why do I want to read more?
- How would my life improve if I prioritized reading?
Write down your answers and keep them visible. Let your 'why' guide you forward.
Step 2: Start Where You Are (Small and Simple Wins)
Many people fail because they set huge, overwhelming goals like finishing a book every week. The secret to success? Start small. Commit to just 5 minutes a day or a single page. Progress matters more than perfection.
Mini Challenge #1:
- Pick a book you’re genuinely excited about (not one you feel you should read).
- Read for 5 minutes today. Just 5 minutes.
When you complete this, check it off. That little win is the first step toward building momentum.
Step 3: Create a System That Fits Your Life
Habits thrive when they’re tied to something you already do. Look for natural openings in your day to read.
- Morning: Read while sipping coffee or tea.
- Lunch Break: Sneak in a few pages while eating.
- Evening: Replace 10 minutes of scrolling with reading before bed.
Make it impossible to forget by keeping books or an e-reader where you spend the most time: next to the bed, on the couch, or in your bag.
Mini Challenge #2:
- Set a specific time to read tomorrow. Write it down and stick to it.
Step 4: Make It Fun and Rewarding
Let’s face it—habits stick when they feel good. Build instant gratification into your reading routine.
- Gamify the Process: Create a simple list of mini challenges (like the ones here) and cross them off as you go.
- Set Rewards: For every milestone—like finishing a chapter or hitting a week of daily reading—treat yourself. It could be a fancy coffee, a cozy reading corner upgrade, or just the joy of marking progress.
Mini Challenge #3:
- Set a reward for finishing your first chapter or reading streak. Make it something exciting!
Step 5: Follow Your Interests, Not Rules
One of the biggest mental barriers is feeling like you have to finish every book you start. Forget that. Reading should be enjoyable, not a chore. If a book isn’t grabbing you, it’s okay to stop and try another. The key is to stay engaged, not stuck.
Mini Challenge #4:
- If you’re not loving a book after 50 pages, give yourself permission to move on.
Step 6: Build Momentum with Layered Challenges
To make reading exciting and natural, set challenges that grow progressively:
- Day 1–3: Read 5 minutes daily.
- Day 4–7: Extend to 10 minutes.
- Week 2: Finish a chapter or two from a book you love.
- Week 3: Try a new genre or author.
Each challenge builds on the last, creating a sense of accomplishment. By the time you finish the third week, you’ll likely be hooked.
Step 7: Track and Celebrate Progress
Progress tracking is one of the simplest yet most effective ways to build a habit. Create a log to note what you’ve read, even if it’s just a chapter or a short story. Seeing your progress motivates you to keep going.
Ideas for Tracking:
- Use a journal or app to list books and dates you started/finished.
- Jot down favorite quotes or lessons learned.
- Share your progress with friends or join a book club for accountability.
Mini Challenge #5:
- Start a reading journal and write down what you love about the book you’re currently reading.
Step 8: Stay Flexible and Forgive Yourself
Life gets busy, and you might miss a day (or week). That’s okay. Habits are built over time, not overnight. The key is to keep coming back to your reading routine without guilt. Remember, even a little reading is better than none.
Final Thoughts
Reading is a gift you give yourself. It’s not about how fast you finish or how many books you complete—it’s about the joy, knowledge, and escape it brings. By breaking your mental barriers, starting small, and creating a system of rewards and challenges, you can make reading a natural and deeply fulfilling part of your life.
So, grab a book, set a timer, and dive in. Your reading journey starts today.
-
@ 1eb5d2c9:ee9e8d5f
2024-12-27 14:58:07I don't know what I call myself, but I support tools and systems that emancipate humans. At the same time, I fade anyone who is anti-medium-of-exchange in this space. Fuck bitcoinbugs and fuck Cantor Fitzgerald -
@ 1eb5d2c9:ee9e8d5f
2024-12-27 14:50:57Their trust in their beloved pied pipers isn't broken yet -
@ df478ecd:495107a7
2024-12-26 20:46:02To be honest it took a couple tries. Apparently, messing with consensus code breaks more than one test 😂 -
@ df478ecd:495107a7
2024-12-26 20:44:44Very excited for this. 2025 resolution is to work in BTC full-time. nostr:note1lx4wph5hfp9mj5674eks59vj3mnqdrujfdwngaez2cllvfhcfxksrcg8a7 -
@ df478ecd:495107a7
2024-12-26 20:42:43Just committed my test breaking change today. Let's go! -
@ 1eb5d2c9:ee9e8d5f
2024-12-26 19:22:33That's fair, the lightning requirement for bonds can cause some friction. Other than that, it's great -
@ 1eb5d2c9:ee9e8d5f
2024-12-25 16:12:03based I love Louis Cole and Knower. Hope Cl0wn Core tours again -
@ df478ecd:495107a7
2024-12-24 03:57:58Yeah I’d definitely watch it -
@ 1eb5d2c9:ee9e8d5f
2024-12-23 16:59:59lol Buy gift cards, candles, fragrances, and pre-rolls -
@ 1eb5d2c9:ee9e8d5f
2024-12-20 13:59:21Pot, meet kettle 🤣 -
@ 1eb5d2c9:ee9e8d5f
2024-12-20 03:02:52I needed this more than you'll ever know -
@ 554ab6fe:c6cbc27e
2025-01-10 15:46:28It is commonly understood that the ancient Greeks and alike used mythological tales to communicate philosophical teachings. Amazingly, these tales have lasted the test of time and are still told today. It seems stories with philosophical lessons and teachings have an intrinsic value to human civilization. This seems to be the case because we are still creating such stories, and those with great lessons become pop culture phenomena. One example, is the Star Wars saga. George Lucas was known to appreciate ancient tales with meaning. In my opinion, he made one of the most profound modern mythological tales. The tale of Star Wars holds many similarities to Daoism, and my understanding of WuWei (无为). Making it a beautiful tale of how the best way to combat evil in the world, is to be one of passivity, serenity, and nonviolence.
To articulate how Star Wars projects this lesson through its story, one must look at the overarching narrative of the first six episodes, the original movies written by George Lucas. I will refer to these as the original trilogy (episode 4,5, and 6) and the prequel trilogy (episodes 1,2, and 3).
The Jedi are the epitome of goodness. They practice compassion, live their lives in service of others, and strive for peace in the galaxy. Their teachings are clearly benevolent, and are such that we should take them into consideration of our own lives. Jedi are commonly advised to be mindful of their thoughts and feelings1,2. It also bears a striking resemblance to the practice of mindfulness meditation, where one trains the mind in being mindful on the present moment and taking a non-judgmental stance on all incoming emotions, sensations, stimuli, etc. Additionally, the very first lesson Yoda teaches young Anakin Skywalker is that a Jedi must let go of fear, anger, and hatred2. These three emotions lead one to the dark side in this tale, but are also detrimental to us in real life as well. They are the pillars to the way of the Jedi. However, the choice of the three words Yoda uses here is very important. We will see later that these teachings are incomplete. The flaw in this teaching, and the subsequent correction, is what sheds light onto the profound teaching of Star Wars.
Episode 1 begins with the Jedi being the rulers of the galaxy. However, all who know the story of Star Wars know that Darth Sidious/ Emperor Palpatine will one day take control over the galaxy. The entire prequel trilogy outlines the progress of how Darth Sidious manipulates everyone to create political conflict and war to drive the Jedi further into becoming soldiers. The dark emperor chooses this tactic because he knows that violence and conflict is the way of the Sith. The Jedi way is the opposite. As Macu Windu puts it, they are “keepers of the peace, not soldiers”1. However, though this is what Jedi ideally are, in practice they are not so. The three prequels are full of events where the Jedi intervene into political matters and conduct themselves as warriors in order to “keep the peace”. Here, the audience is able to recognize that the Jedi are hesitant to fight in wars. Regardless, the core teachings provided to Anakin in the first episode regarding letting go of fear, anger, and hate do not directly forbid the Jedi from using their fighting skills to keep the peace. So, the audience, and the Jedi council alike, allow the Jedi to conduct themselves in violent ways. During the same scene with Macu Windu, Yoda mentions that his vision is clouded by the dark side1. Why is his vision clouded by the dark side? Why do the Jedi not see Darth Sidious for who he truly is until it is too late? The answer to this is because the violence practiced by the Jedis causes them to lose their way. Evidence of this is brought forth in the original trilogy.
In the original trilogy, Yoda’s teachings to Luke change in comparison to the teachings he gave to his father Anakin. In Dagoba, Yoda tells Luke to let go of anger, hate, and aggression3. Notice how the word “hate” is replaced by “aggression”. This is not to say that hate is ok, but to say that aggression is what Yoda did not understand before, but now realizes as a key component of the Jedi way. The Jedi before used aggression all the time, in the name of peace. They fought evil people as warriors of justice, and Palpatine used this against them. Yoda’s vision was clouded by the dark side, because him, and all other Jedi were using a dark side related behavior: aggression. This is highlighted repeatedly throughout the original trilogy. Luke leaves his training early to go help his friends, and both Obi Wan and Yoda urge him not to do so3. They explain how Luke going off to fight Vader is what the enemy wants, and the best thing he could do was stay, train, and not fight. Yet, Luke departs anyway in the 5th episode and fights his father. This battle doesn’t end well for Luke, and he loses a hand. The hand is replaced with a robotic one, a symbol for lost humanity. In essence, he was punished for acting on his violent and fear driven urges, pushed further to the dark side. We continue to see how aggression is related to the dark side at the beginning of episode 6 when Luke enters Jaba’s palace. Here is referred to as a Jedi, yet acts the opposite: he walks into the palace in all black, and uses brute force to enter the palace by using a force choke on one of the guards4. Though we see him as our hero, he is acts and behaves more similar to a Sith.
The entire tale resolves itself in the final confrontation between Luke, his father, and Darth Sidious. During this encounter, the emperor continuously instills anger and hatred into Luke by threatening his friends, in hope that he will turn to aggression4. He even states that Luke should “strike [him] down, [so] his journey to the dark side [can] be complete”4.
Palpatine knows how to manipulate Jedi into acting upon tendencies that bring them to the dark side. It is how he came to power in the prequels. Luke goes to strike the emperor out of anger and Vader prevents the strike (Vader is saving his son from reaching a place of no return). They fight until Luke gains the upper hand and removes the hand of his father. In this moment, Luke notices that they both have these robotic hands. This is a realization of common humanity. Similar to the vision he had on Dagoba where he fights his father and beheads him, only to find that under the helmet was himself. A realization that they are not only family, but both human beings struggling with the same internal battle between the forces of good and evil. At this moment Luke has become enlightened, and becomes the truest Jedi in the entire series. He turns around and drops his lightsaber, and says “you failed your highness, I am a Jedi”4.
What is significant in this scene is after Luke’s clarifying realization, he drops his weapon, ending the violence while simultaneously claiming victory. He understands that the only way to defeat Palatine, is to not use the same methods of aggression. Rather than using violence, he should use passivity and non-violence to triumph over evil. It goes without saying that he is correct: Palpatine is defeated, and he is able to save his father. In the final scene between Luke and his father, one can see that the black outfit that Luke wears is becoming undone, and the inside fabric now revealed is white. Reiterating that now Luke, being one of non-violence has saved the galaxy and everyone he loves. Luke at this moment becomes a true Jedi, one that has surpassed all before him and becomes the ideal epitome of goodness for the audience to emulate.
This is a story of WuWei. Of how non-action, non-aggression, and effortless action is most effective, and perhaps only way of bettering the world. The Jedi were constantly fighting and resisting evil, unknowingly playing right into the hands of the evil forces in the world. Only when Luke turns to non-action, does the dominance of evil end. This wisdom is not only useful in a galaxy far far away, but is most applicable to the world we live in now. A modern mythological tale of the importance of Daoist philosophy. May the Force be with you.
References
- Lucas G. Star Wars: Episode II – Attack of the Clones.; 2002.
- Lucas G. Star Wars: Episode I – The Phantom Menacee.; 1999.
- Lucas G. Star Wars: Episode V - The Empire Strikes Back.; 1980.
- George Lucas. Star Wars: Episode VI - Return of the Jedi.; 1983.
-
@ 554ab6fe:c6cbc27e
2025-01-10 15:39:05I was in high school during the 2008 Great Recession. The significance of that event made me critically question our current economic system. It made me very interested in how our system of money and banking works. This path of inquiry led me to research and understand the truly complicated and underdiscussed issue of fiat currencies, and the subsequent powers that gives government and bank in manipulating our economy. In my opinion, the modern world has a money problem. This money problem not only translates into issues of materialism, but also is represented in poor monetary policy on the part of the societal elites. Below is a paper I wrote in high school which discusses how the manipulation of interest rates, made possible by fiat currencies and fractional reserve banking, leads to dangerous business cycles that lead to the great economic collapses we have experienced.
How does the interest Rate Manipulation Work?
With the fractional reserve system in place, the Federal Reserve has three powers that they use to adjust the interest rates of banks to carry out their policies. The first conceptual milestone to be achieved in answering the question of the Federal Reserve’s effect on the business cycle is to understand how the fractional reserve banking system works. It is legally mandated that all banks must have a certain percentage of their reserves in the vaults at all time. Though this is a reserve requirement, banks historically never in the long run hold onto excess reserves because that would bring economic disadvantage with the other banks (until recently because the federal reserve no pays interest to banks who hold some excess reserves). Therefore, the reserve requirements end up being the universal ratio of cash a bank holds at a time. This also means, that banks historically have never have the total financial holdings of all their customers.
The first power is referred to as open market operations, and is key to the adjustment of the federal funds rate. The Federal Fund Rate is the overnight interest rate between banks. This rate is determined between banks based upon how much money bank A’s demand of money to fill their reserves, and the supply of excess reserves bank B has at the time. This interest rate between the banks in turn affects the interest rates of borrowers and investors. The Federal Reserve manipulates these interest rates by indirectly filling bank's reserves with money. The Federal Reserve does not do this by simply printing money and giving it to bank B, but rather printing some money and purchasing Treasury bonds (or in the case of the 2008 period, Mortgage-Backed Securities) off of the open market. The money then, that the individual earned from selling the bond(s), will then eventually end up in the bank’s which will then either cause bank A to have less of a demand for money to fill their reserves, or cause bank B to have a higher supply of reserves, thus lowering the federal fund rate.
The second power is similar to the first in the sense that it also affects the federal fund rate but it done through the adjustment the reserve requirements. A bank's need for money is based upon their reserve's relationship with the reserve requirements. Therefore, the second power is the ability to lower (or raise) the reserve requirements of all banks, which will cause bank B to not have as high of demand for a loan, and will cause bank A to have a higher supply of excess reserves to loan.
The third power is the direct adjustment of the discount rate which is the rate between a depository institution and the Federal Reserve itself. These kinds of loans exist when a bank, like bank B, would rather loan from the Federal Reserve than other banks. However, as the Federal Reserve is only supposed to be a lender of last resort, the discount rate tends to stay higher than the federal fund rate.
These three powers cannot be performed independently without the consideration of the other. The power to buy bonds and adjust reserve ratios has a large effect on the economy's money supply; Monetary base and M1. This can be seen not only from the fundamental process at which these interest rates are manipulated, but by the law of supply and demand. Suppose the Federal Reserve wishes to lower interest rates, however there is a fixed amount of loanable cash and a fixed amount of demand (ceteris parabis). If the government is to artificially lower the interest rates, there will be a shortage of loanable funds, but an increase in demand for loans. As loans are not a product that can simply be produced like most goods in the economy, the only way to deal with this shortage is for the government to print the shortage of loanable goods. With this increased supply of loan-able funds, there is then a lower price, and higher demand. This also means then, that these two functions cannot be done at free will because they can result in rampant inflation of even hyperinflation due to the increased money supply. The discount rate also is centralized around the federal fund rate so one is usually adjusted around the other in order for there to be balance in reserves across the system.
One reason the Federal Reserve has these powers is so that it can manage the economy and therefore the business cycle. The ability to adjust interest rates grants them the ability to monitor the rate at which people save and borrow. Higher interest rates will cause people to save more, and borrow less. In contrast, lowering interest rates will cause people to save less and therefore spend more which causes inflation (due to the process of lowering interest rates and the increase in the demand for overall goods) giving the market incentive to spend even more. This would be the growth time in the business cycle. The Federal tries to avoid the contraction aspect of the cycle by keeping interest rates down and keep inflation existent so people keep spending and not saving. The question that must therefore be asked is does this manipulated of the free market and these therefore artificially created interest rates affect the market in a negative way?
Artificial Interest Rate Cycles
What must first be noted is that in an artificial interest rate cycle, interest rates are pushed down in order to regulate the economy. The manipulated business cycle that will then be discussed is one in which interest rates are artificial lower than would have been without the Federal Reserve's intervention.
In an artificially low interest rate business cycle, growth consists of massive consumption. Not only are interest rate low, which increases the demand for business and individuals to loan money to spend. But there is a touch of inflation due to the increase in the money supply. Demand for goods then much higher because people do not want to hold on to their money that is losing value. Not only that, but there is also no benefit to hold in banks because of the low interest rates. For these reasons, consumption increases, and savings are depleted. (As a side note, I would argue that the existence of this system is a large reason why we see such materialism and consumerism within modern day culture.) As savings deplete, supply for loan able cash drops, and prices will rise, but the Federal Reserve, in order to continue the growth, keep pushing rates down and increase the money supply more and more. This continuation of inflation also causes the market to begin to speculate continuingly rising prices. A strong example of this was the housing market before the financial crash of 2008. As people began to purchase houses because of their perceived value of always going up, prices rise.
As the prices for houses steadily went up for such duration of time and a rampant rate, people would view this trend to be never ending, further adding to the amount of people entering the market, making prices rise even more. Of course, this also means that the allocation of resources has very much shifted away from other goods that otherwise would have been purchased, and has now shifted toward housing or the various markets of the stocks being purchased. Keep in mind, that the increased demand for houses was not due to any increase on intrinsic need for house, but simply because people were wishing to gamble on the price going up. This is why we call it a “bubble” because it was being filled not with true value, but “air”
Inevitably, the growth period ends and the contraction begins. During the Federal Reserve induced growth session, prices were extremely high from everyone taking cheap loans and making money off of speculation. Once a contraction hits, prices begin to fall and people begin to save. This means that aggregate demand falls, and so do prices. This causes the speculation markets to radically loose demand because there are no longer people believing prices will rise. and as prices fall, all the people who owned a house or stock will lose money on their investment.
After the prices fell, people immediately wished to leave the market and sell their house, and nobody wanted to enter the market and buy houses because the market no longer had the perceived future value as it did before. This caused a massive drop in house prices, and caused all the people who owned a house, lose money. Furthermore, most people made these investments with loans which now they can no longer pay back. Banks then can go bankrupt because of all of the new faulty loans, unemployment increased because businesses that made malinvestments now must lay off workers, and people will then begin to panic because the market is contracting and they had accumulated very little savings from the growth. This results in a loss in aggregate demand not only because there are no savings but because the market must recuperate after the massive amount of loan defaults and investment loss.
At the end of the cycle, the society does not seem to have made much economic process. Much of the production was shifted to houses which were only valued for their investment opportunities. Due to the massive debt and sharp drop in aggregate demand, there are also much less goods being produced as a whole as the economy must take a while to recuperate after the losses.
Natural Interest Rate Cycles
Before analyzing a business cycle with natural interest rates, a few things must initially be made clear. To have a truly natural interest rate society, the Federal Reserve would have to play no role in the economy, which would bring about the end of a mandated fractional reserve banking system. For the sake of the research question, this aspect of the argument will be left out, and the only difference between natural interest rate cycles and unnatural interest rate cycles will be that there will be no price controls on interest rate. The interest rate is determined by the supply and demand for loanable funds at the time. Where are also to assume inflation is near or below 0%. This is because if there is no manipulation of interest rates, the function of printing money to lower interest rates is non-existent.
With that said, the first difference that must be discussed is the demand for goods aspect during the growth time. In a natural interest rate growth time, the aggregate demand for goods over the long run of the growth period is much less than in an unnatural interest rate cycle. This is because, as the growth continues, the amount of loan able funds decreases because of the consumption. Interest rates then will gradually rise because of the gradual loss in supply of loan-able funds. savings will also be much higher in this cycle.
As there is no flagrant expansion of the money supply, the demand capital is higher and interest rates are higher. With interest rates being higher, the incentive for saving is also higher. The allocation of goods is then much different in this cycle, because as it becomes more profitable to save, on top of the fact that there is very little inflation, there will be less speculative spending. Which means there won't be overproduction of ventures like housing, which allows the market to allocate those resources to goods that increase welfare of everyday life.
What follows is the transition into contractions. In this business cycle, because more and more loan-able funds are being used up and savings begin to increase, a contraction period begins when the interest rates are too high and aggregate spending has transitioned to be higher than aggregate spending. During this time, as people begin to save more than they spend, interest rates will gradually begin to fall again. Similar to an unnatural interest rate cycle, prices will decrease, and there will be an increase in unemployment. The difference is during the growth time aggregate savings was higher than unnatural interest rate aggregate savings due to the price adjustment of interest rates. Which means all those who are now unemployed have more savings and are better off, and can spend more money. There is also much less defaulting on debt because there were much less people acting on investment strategies in speculative markets because there were much fewer and smaller speculative markets. Due to all of this savings that now exist rather than the malinvestment and bankruptcy that existed in a Federal Reserve induced recession, more spending and consumption can be directed toward the production of goods. This leads to a much smoother, less volatile, and steady cycle.
At the end of a full natural cycle the production and demand for goods is much different without the Federal Reserve. Due to the absence of large growth and extreme contractions in a natural cycle, there were much less people who go bankrupt and default on debt. Due to all of this savings that now exist rather than the malinvestment and bankruptcy that existed in a Federal Reserve induced recession, more spending and consumption can be directed toward the production of goods. There is also a massive difference in the kind’s goods produced. Rather than having over production in commodities that were largely produced solely for their investment and perceived future market value, the market allocated goods to places where people demanded them for their lives. There is then much less misallocation because goods were bought for their consumer value rather than investment value.
Conclusion
To answer the question of: How does the Federal Reserve’s artificial adjustment of interest rates compared to natural interest rates affect the business cycle? One must observe the allocation of goods because of their profound their relationship between people’s wealth and welfare. In order to find the difference of allocation of resources in the two cycles, a business cycle with artificially low interest rates was observed. In this cycle, large speculative markets cause the allocation of resources to be directed to goods that are produced largely because of their perceived investment value, and not solely for their welfare value like most other goods. Furthermore, the massive debt and malinvestment that accumulates once the contraction occurs, disallows for increased wellbeing because there are less goods being produced. To gain a full understanding of the negative effects of the Federal Reserve’s adjustment of interest rates, one must also inspect what a business cycle would look like without the adjustment of interest rates. In this business cycle, there is less demand for speculative markets, and so the allocation of resources is directed to increased welfare goods, which depletes the issue of overproduction. Furthermore, there is a much more stable system of savings and spending, which lowers the amount of people going into bankruptcy once contractions hit. This allows for more goods and services to be purchased even when the economy is recovering from the growth. This is another reason why the allocation of resources is better because of the fact that there is much less malinvestment, which causes loss in productivity.
It is then evident that unnatural interest rates simply worsen a necessary part of the business cycle. It causes certain prices to go way beyond their true value (plus causes overall inflation), which causes people to end up in debt and causes the market to have case malinvestment and misallocation of goods. People during the time of need, will not have savings to fall back on or accumulate for the next boom.
-
@ 1eb5d2c9:ee9e8d5f
2024-12-20 02:47:23Too bad I stopped gooning lmfao -
@ 1eb5d2c9:ee9e8d5f
2024-12-20 01:18:39What a fucking banger tweet. I wish he would just come here (even if all he does is crosspost) -
@ da0b9bc3:4e30a4a9
2025-01-10 14:08:49It's Finally here Stackers!
It's Friday!
We're about to kick off our weekends with some feel good tracks.
Let's get the party started. Bring me those Feel Good tracks.
Talk Music. Share Tracks. Zap Sats.
Let's go!
Kickstart My Heart!!
https://youtu.be/CmXWkMlKFkI?si=UNb7KC-ukse9uquM
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/844806
-
@ 4dbfcb7c:eb8d1695
2025-01-10 16:09:50On order to get the Elementum add-on installed, you must first download and install the Elementum repository.
Note: You must first enable 3rd Party Sources in KODI. Make sure you are using a VPN.
Download the Elementum Repository
- Grab the file for your device from the 👉 Elementum web page.
- (For a typical Linux OS, this will be the x64 .zip under Linux)
- (For a typical Android phone, this will be the arm64 .zip file Android)
Install Elementum Repo
- Open Kodi and go to:
- --> Settings (Gear icon)
- --> Add-ons
- --> Install from zip file
- --> Click "Yes" on zip file warning
- --> browse to Elementum .zip file & click to install (Wait for verification)
Install Elementum Add-on
- From Kodi home go to:
- --> Settings (Gear icon)
- --> Add-ons
- --> Install from repository
- --> ElementumOrg
- --> video add-ons
- --> Elementum
- --> Click "Install"
Elementum #Bittorrent #Kodi #MediaCenter
-
@ 1eb5d2c9:ee9e8d5f
2024-12-20 01:15:19Merry Christmas 🎅🎄🎁 https://music.youtube.com/watch?v=4-C8L6JvxRo (by the way, ^this^ is the fruitcake I mentioned a while back) -
@ df478ecd:495107a7
2024-12-18 04:47:10If quantum computers can break Schnorr signatures, what happens to MuSig2, FROST, Taproot stuff? Would cryptographers have to rebuild these protocols? -
@ 6f26dd2b:f2824b88
2025-01-10 14:07:44Just came across this email blog and Bitcoin was in my mind. What's your say?
"The Central Bank of Kenya (CBK) is getting ready to mint new coins to avoid shortages. Yep, they’re hunting for a company to handle this for the next three years starting in 2025.
Per Business Daily, this comes after CBK’s KSh14.14 billion ($109.20 million) deal with a German company, Giesecke+Devrient Currency Technologies GmbH, to print new banknotes. CBK Governor Kamau Thugge said the decision to mint coins came through a classified process — makes sense since no one wants a cash shortage messing with the economy.
If you remember, back in December 2018, CBK rolled out new coins featuring giraffes, rhinos, lions, and elephants, ditching portraits of people in line with the 2010 Constitution. Now, they’re inviting bids for a new coin-minting contract to keep things stable."
-
@ e1d968f7:5d90f764
2025-01-10 15:27:09First impressions matter, and in escorting, they begin with your response to a client’s inquiry. This initial interaction isn’t just about logistics—it’s a reflection of your professionalism, boundaries, and style of communication. Over the years, I’ve learned how to respond effectively to ensure that inquiries lead to successful, respectful bookings.
First Impressions Count
Your first reply to a potential client is an opportunity to make a lasting impression. It’s the foundation for trust and sets the tone for the interaction.
- Promptness: Timely responses show that you value the client’s time. A quick reply can also reduce the chances of them moving on to someone else.
- Professional Tone: While it’s important to be friendly and approachable, maintaining a professional tone establishes boundaries.
- Clarity: Provide clear information to avoid misunderstandings. Be concise yet thorough in addressing their questions.
Setting Boundaries from the Start
Boundaries are essential for maintaining a healthy client-provider relationship. The initial inquiry is the perfect time to establish them.
- Rates and Services: Be upfront about your rates and what’s included. Avoid ambiguity, as it can lead to uncomfortable negotiations later.
- Availability: Clearly communicate when you’re available and what your booking process entails.
- Screening: If you require certain details or verification for bookings, outline this in a respectful yet firm manner.
Recognising Red Flags
Not all inquiries are genuine, and some may come from individuals who don’t respect boundaries or professionalism. Over time, I’ve learned to identify red flags early:
- Overly Personal Questions: Clients asking invasive questions about your private life often don’t respect professional boundaries.
- Haggling: If someone tries to negotiate your rates, it’s usually a sign they won’t respect the value of your time or services.
- Vague Requests: Clients who avoid giving clear details about what they’re looking for may not be serious about booking.
By recognising these signs early, I save time and energy for serious inquiries.
Streamlining the Process
Efficiency is key when responding to inquiries, especially during busy periods. Here’s how I manage the process:
- Templates for Common Questions: Having pre-written responses for frequently asked questions saves time while ensuring consistency.
- Organised Communication: I keep messages in a dedicated platform or folder to avoid losing track of inquiries.
- Set Time Blocks: Instead of replying instantly, I allocate specific times for handling messages, ensuring I stay focused and productive.
Personal Touch Matters
While efficiency is important, adding a personal touch can make a client feel valued and more inclined to book.
- Use Their Name: If they’ve shared their name, addressing them directly adds a polite, personalised feel to the conversation.
- Acknowledge Their Needs: If a client mentions a specific requirement or concern, address it directly in your response. This shows attentiveness and professionalism.
Dealing with Difficult Conversations
Not every inquiry will be straightforward. Here’s how I handle some challenging situations:
- The Persistent Client: If someone refuses to accept your boundaries, it’s best to end the conversation politely but firmly.
- The Indecisive Client: Gently guide them with questions to help clarify their needs. If they remain uncertain, I let them know I’m available when they’re ready.
- The Last-Minute Booker: While I try to accommodate, I make it clear that last-minute bookings depend on my availability and adherence to screening protocols.
Constant Improvement
Every inquiry teaches something new. By reflecting on past interactions, I’ve refined my communication skills and adapted to different client needs.
- Feedback: If appropriate, I ask clients how they found the booking process. Constructive feedback helps me improve my responses.
- Staying Professional: Regardless of how challenging an inquiry may be, maintaining composure and professionalism is non-negotiable.
Conclusion
Mastering the art of responding to inquiries is a vital skill in the escorting profession. By balancing professionalism, clarity, and warmth, I ensure that every interaction lays the groundwork for a respectful and positive experience. It’s not just about securing bookings; it’s about building trust, protecting boundaries, and creating meaningful connections.
Rebecca x
-
@ 4657dfe8:47934b3e
2025-01-10 13:28:47Alby Hub - your Center for Bitcoin Payments
Alby Hub is a self-custodial lightning wallet that lets users choose their preferred Lightning funding source. It includes an easy-to-use lightning node with a one-click setup, while also accommodating existing node runners.
In short Alby Hub offers node runners:
➡️ a lightning address to receive payments in a self-custodial manner ➡️ integrated Lightning Service Providers, to quickly buy channels with receiving capacity ➡️ a selection of vetted channel partners to open channels without searching for a long time ➡️ a marketplace of apps to connect your own node. Read more about this superpower. ➡️ a mobile app, Alby Go, to pay right from their own node on the go.
Thus, Alby Hub enables you to make your node the central hub for bitcoin payments, maintaining full self-sovereignty.
Install Alby Hub on RaspiBlitz
- Login into the RaspiBlitz WebUI and enter the dashboard
- Go to Apps, find Alby Hub and install the app
It’s as easy as that. Now you can link your node with an Alby account to get a lightning address, use your node on the go with the Alby Go mobile app or on the web with the Alby Browser Extension. Updates of Alby Hub become available with each new RaspiBlitz release.
With one-click setup, an intuitive interface, and seamless integration with dozens of bitcoin apps, Alby Hub makes self-custodial bitcoin payments easy for everyone while adding much more utility to your lightning node.
-
@ 419798e6:7eeac233
2025-01-10 15:20:15January 20th 2025 will be an impactful day to the Crypto World.
President Donald Trump returns to the white house amid concerns over his previous sentiments towards digital assests.He has previously termed and seen it as a "threat to the dollar " back in 2019. The previous administration has however,seen tremendous changes in the crypto world including the rise of crypto in institutional adoption
The impact of his pro business presidency might see a potential of digital asssets being deregulated**.This will immensely benefit crypto firms .With Elon at his side.His administration might focus more on innovation and competitiveness creating a serene environment for crypto affiliated businesses and exchanges.
There also might be a lot of jittery towards Trumps stern economic policies towards digital assests as investors will be wary of his policies towards digital assests leading to market increased volatility in the crypto world.
Bitcoin might be seen as the remedy against inflation if Trump announces economic stimulus Plans.
Trumps inaguration will definitely will create a storm in the crypto world.Combined with rising adoption of digital assests,January 2025 could set a stage for a never seen rally in the crypto market world.January 20th 2025 will be an impactful day to the Crypto World.
-
@ 4506e04e:8c16ba04
2025-01-10 13:26:46The healthcare system, in its current state, is fundamentally broken. Under the fiat standard, big pharma exploits the sick in much the same way that banks and financial corporations drain economic power from individuals and small businesses. Despite massive investments, healthcare remains plagued by inefficiencies, inequities, and vulnerabilities. With rapidly aging population and low birth rates the access to healthcare is becoming more and more difficult and the system will break within the next couple of decades. Here are some of the major issues:
Financial Drain with Minimal Returns
No matter how much money is poured into healthcare, it’s never enough. Administrative overheads, inflated costs, and inefficiencies ensure that resources are wasted instead of improving patient outcomes.
Big Pharma’s Perverse Incentives
Pharmaceutical companies prioritize profit over cures. The system is designed to keep patients alive but perpetually dependent on treatments, rather than focusing on true cures.
Administrative Bloat
The excessive overhead costs in administration siphon funds away from actual patient care.
Fragmented Patient Records
There is no single global standard for managing and accessing healthcare records, creating inefficiencies and potential for errors.
Cybersecurity Risks
Centralized healthcare systems are vulnerable to ransomware attacks, which can compromise patient safety and even pose threats to international security. For hospitals, such attacks are literally matters of life and death.
Increasing Costs and Reduced Accessibility
Instead of becoming cheaper and more accessible, healthcare is growing more expensive and difficult to obtain, exacerbating inequities, yet nurses are one of the groups that's most underpaid!
A Decentralized Solution
The solution lies in leveraging decentralization, encryption, and open-source technologies to transform the healthcare system. Thanks to innovations like Bitcoin and the Nostr protocol we now have the means to:
-
Empower Patients and Doctors: Decentralized systems can give patients control over their medical data while reducing administrative costs for healthcare providers.
-
Enhance Security: Encryption ensures data is secure, even in the face of cyber threats.
-
Improve Accessibility and Efficiency: Open-source tools (like Keycast) can lower costs and provide customizable solutions tailored to specific healthcare needs.
note1327htu9gr327h38yu5f6tueye4cajp3kc69cs3gl7w6q6rz09ufqukl74j
How Nostr Can Transform Healthcare
Nostr, short for “Notes and Other Stuff Transmitted by Relays,” is a decentralized protocol originally designed for communication but holds tremendous potential for industries such as healthcare. Its client-relay model allows patients and doctors to interact securely without relying on centralized servers. Here’s how it could work in a healthcare context:
Decentralized Data Control:
Patients’ medical records can be securely stored and accessed via relays. Each patient’s identity is tied to a cryptographic public key, ensuring that they have full control over their data.
Doctors can access necessary records by connecting to relays the patient authorizes, ensuring data remains private and secure.
Privacy Without Bureaucracy:
Nostr eliminates the need for cumbersome identity verification processes (e.g., KYC). Patients retain privacy without needing emails, IDs, or other personal identifiers.
Customizable Access:
Patients can specify which doctors or healthcare providers can access their records by granting permissions via cryptographic signatures. These permissions can be adjusted or revoked at any time.
Secure and Verifiable Communication:
All interactions between patients and doctors are signed with private keys, ensuring authenticity and preventing tampering.
Relays do not own or manipulate the data; they simply transmit it between authorized users.
Resilient and Flexible Network:
Patients and doctors can choose which relays to use, and data can be published to multiple relays for redundancy. This ensures continuity of care even if a specific relay goes offline.
Patient-Centric Data Ownership:
In the Nostr model, patients own their data. They can share it, manage it, or restrict access as they see fit, empowering them to take control of their health information.
Enhanced Telemedicine:
Secure, encrypted communication enables remote consultations where doctors can access up-to-date patient records in real-time, providing better care.
By combining Nostr’s decentralized approach with healthcare-specific adaptations, this protocol can make the healthcare system more secure, efficient, and patient-focused.
Meet Keycast
Keycast is a self-hosted open-source tool designed for secure and efficient private key management that can be applied to manage teams and policies. Its features can empower collaboration from micro-level ops like sharing access to one Nostr account to organising healthcare in the following ways:
-
Team Management:
-
Organize users into teams representing departments or specialties (different policies).
-
Streamline workflows by aligning permissions with roles.
-
Granular Permissions:
-
Assign specific access rights to doctors, nurses, and administrative staff.
-
Create layered permissions for actions such as accessing records, adding notes, or authorizing tests.
-
Secure Key Management:
-
Encrypt and securely store keys locally, ensuring data confidentiality.
-
Remote Signing and Telemedicine:
-
Enable secure remote access to records through NIP-46 for telehealth scenarios.
-
Customizable Policies:
-
Tailor permissions and content filters to suit healthcare needs, such as restricting access to certain records or anonymizing sensitive data.
-
Patient Empowerment:
-
Allow patients to manage access to their health information, promoting transparency and autonomy.
Real-World Applications
Here’s how these tools can address specific healthcare challenges:
-
Secure Access to EHR: Doctors and nurses can access patient records securely and efficiently, improving care coordination.
-
AI-Driven Diagnostics: AI agents with predefined, limited permissions can analyze data for diagnostics while safeguarding privacy.
-
Telemedicine: Secure, encrypted access ensures doctors can deliver remote care without compromising patient data.
-
Anonymized Research: Controlled access to anonymized data can accelerate medical research while protecting privacy.
The Bigger Picture
Decentralization is the key to fixing healthcare. Just like Bitcoin fixes the money and fixes the world - nostr and censorship-resistant encrypted data flow can fix whole industries like healthcare. By moving away from centralized, vulnerable systems, we can:
-
Enhance Security: Protect sensitive data from cyber threats with encryption and decentralized architectures.
-
Lower Costs: Reduce administrative overheads and eliminate inefficiencies.
-
Improve Collaboration: Foster better communication and coordination among healthcare professionals.
-
Ensure Transparency: Leverage open-source solutions to build trust and flexibility.
Conclusion
The healthcare systems we have today are heavily reliant on money printing. They are have turned into businesses with overgrown administrative layer. They are inefficient and unsustainable. However, by adopting the Nostr protocol and tools built upon it, we can create a system that is secure, efficient, and patient-centric. With open-source tools like these, healthcare can truly focused on improving lives, become cheaper, more accessible, and abundant.
Challenge
If you'd like to contribute to reinventing healthcare using free and open-source software built on the nostr protocol join the challenge by npub1healthsx3swcgtknff7zwpg8aj2q7h49zecul5rz490f6z2zp59qnfvp8p
note1lnh3q6648ysulrx2pgeyhv2cqqle9vftdxalq3yqkqa7c89eljtqyr70nl
-
-
@ c3b2802b:4850599c
2025-01-10 15:01:46Im spanischen Teil des Baskenlandes wurden in den 1940er Kriegsjahren die Wurzeln für einen Genossenschaftsverbund namens Mondragon gelegt, welcher sich in den Jahrzehnten seit der Gründung 1956 bis heute zu einem schwergewichtigen Faktor in Spanien, ja zur größten Industrie-Genossenschaft der Welt entwickelt hat:
In den Geschäftsfeldern Produktion (dutzende Unternehmen der Sektoren Maschinenbau, Automobilindustrie, Haushaltsgeräte, Bauindustrie), Einzelhandel (z.B. die Supermarktkette Eroski), Bildung (genossenschaftseigene Universität mit knapp 5.000 Studierenden) und Finanzen (Genossenschaftsbank Laboral Kutxa) erzeugt der Verbund von ca. 100 Genossenschaften mit über 10 Milliarden Euro pro Jahr ca. 4% des BIP des Baskenlandes.
Etwa drei Viertel der Beschäftigten des Verbundes sind Genossenschaftler mit Einlagen von jeweils rund 15.000 Euro. Damit sind sie Miteigentümer der Unternehmen im Verbund und sind damit an allen Entscheidungen bezüglich der Unternehmensstrategie beteiligt. Als Rentner können sie ihre Einlagen entnehmen oder weiter am Erfolg des Unternehmens teilhaben. Arbeitsunfähige Mitglieder erhalten volle Bezüge bis zum Rentenalter. Führungskräfte verdienen nach internen Übereinkünften maximal das Achtfache der einfachen Angestellten.
In unserem Land sind Genossenschaften derzeit im Aufwind. Vielleicht können wir uns beim Aufbau unserer Regionalgesellschaft an den Erfolgsfaktoren, also den guten Erfahrungen dieses großartigen Pioniers der Genossenschaftsbewegung orientieren? Die Webseite des Mondragon Verbundes finden Sie hier.
-
@ 6ad3e2a3:c90b7740
2025-01-10 12:33:47The excesses of wokeness are thankfully getting their overdue correction, but as often happens with corrections, they tend to overshoot. A case in point was from the usually reasonable writer Wesley Yang on Twitter, who posted the following:
Poor long-term immigration policy has apparently led to too many foreign-born and native criminals of foreign descent in Norway, a disproportionate number of whom, per the chart, hail from Somalia and Morocco. Yang argues using this data to inform Norway’s immigration policies going forward is both unproblematic and “no longer prejudice.”
This is a sleight of hand. You can advocate for designing prejudicial immigration policies based on the group to which an individual potential immigrant belongs, but you cannot both do so and pretend it is not prejudicial.
This is not a point about what countries should or should not DO. They are free IMO to design immigration policies as they see fit, and there are arguments to be had over that. But there is a reactionary blindness wherein people pretend that grouping individuals by race, religion or country of origin isn't prejudicial to those individuals who have no control over how others in their assigned group behave.
The grouping is justified in their view by "data" or "statistics" or "reason." The truth is most of us still view "prejudice" as negative, so no one advocating for discriminatory immigration policies wants to be considered prejudiced. They are for the policy, think it's good, and therefore try to pretend it's not prejudiced when it obviously is.
Don't pretend. If you're for prejudicial, discriminatory immigration policies "for the greater good", just advocate for it on those terms. Be honest about what you're saying.
This might seem like a trivial point on which to base a post, but I don’t think it is. It’s not because “prejudice is bad” or “racism!” That’s just one type of instance in which this midwit tendency — to assign individuals to a group and then pretend you are being “data-driven” — rears its terrible head. I remember a couple years ago people on Twitter accused me of “taking up an ICU bed” because I refused to inject myself with Pfizer’s latest. Their reasoning was similar: because the unvaccinated are more likely to take up ICU beds (which turned out to be a lie, but let’s assume it were true), I was in the group taking up more beds, therefore I was taking up a bed.
The trick is to assign someone to a group in which they qualify (Somali, unvaccinated, etc.), get “data” about that group and then apply that data to the individuals within it, even if it is totally inaccurate with respect to them.
This is the same trick used to justify disastrous DEI policies too. You are from a historically underprivileged group, so you deserve to be held to lower standards. It doesn’t matter if you would succeed on your own merit, it doesn’t matter your race, gender, sexual orientation are irrelevant to the task for which you are being hired, it doesn’t matter if you are the son of wealthy and famous people and attended all the best schools, you belong to a particular category and therefore this standard will be applied.
But the implications of this midwit sleight of hand are even worse than that, especially on the eve of AI-based systems taking over so many of the administrative functions at both the corporate and state level. You will be categorized, and you will be pre-judged on that basis because it is far more efficient for the system to do so than to examine everyone individually. In fact, I’d argue, unlike humans, AI is incapable of seeing individuals, it sees only “data.”
This was the premise for the movie Minority Report, set in a dystopian future wherein people get convicted of “pre-crime” because the system determined from the data about them they were likely to commit one. You might not have done anything yet, but based on your angry social media posts, your high testosterone, your age and background, you have a 99.9 percent chance of violence. Why not arrest you now before you victimize someone? For every 1000 victims we protect, we’ll convict only one person who would not in fact have done it!
There will be many people who are for this kind of reasoning. It’s “data” after all. Never mind the data can be biased based on the grouping. Why am I grouped with other people I don’t know and over whom I have no control? What if they added 100 other parameters which showed I’m among the least likely to commit violence? Who is selecting these parameters and what are their agendas?
But more to the point, such a society is not free. You are at the whims of your grouping, of parameters, of statistics. The paradigm of individual civil liberties, innocent until proven guilty, responsibility only for your own actions would be dead. You are pre-judged before you have done anything.
The second-order effects of such a paradigm would be a race to the bottom. If I am not in the wrong group I can do no wrong, based on my favorable peers. I can roam the streets, commit acts of vandalism and violence with impunity, I can loaf at work, not do my job and never be fired. I would argue that under the present (and mercifully soon-to-be-departed) administration we’ve already experienced many of these effects already.
So back to the original question. What is Norway to do with this “data”? One idea would be to have a non-discriminatory vetting process that involves delayed gratification and requires some diligence on the part of the prospective immigrant. This might self-sort the people capable of living in an open, prosperous western society and those who are not. You would be admitted or denied based on demonstrated suitability (merit), not with whom you were grouped (identity). This would be closer to the “postjudice” policy prescription Yang erroneously claims for his own in the cited post.
Whether that results in more people of one race or another, one nationality or another getting in, isn't important. What's important is both not judging individuals on the basis of their assigned group and keeping the country free of violent criminals. Both goals are essential if we want to avoid dystopian outcomes.
-
@ d435e69e:43f49e01
2025-01-10 11:15:57In the fast-evolving world of digital assets and blockchain technology, cryptocurrency has emerged as a revolutionary force reshaping industries and markets. However, navigating the complexities of cryptocurrency—whether for investment, business integration, or strategic planning—requires in-depth expertise. Crypto consulting services provide the knowledge and guidance businesses and individuals need to unlock the full potential of this transformative technology.
What Are Crypto Consulting Services?
Crypto consulting services help clients understand, implement, and leverage cryptocurrencies and blockchain technology. These services cater to a wide range of needs, including portfolio management, blockchain adoption, cryptocurrency compliance, and market analysis. Whether you're a beginner looking to explore digital currencies or a business aiming to integrate crypto solutions, consulting services offer personalized strategies to achieve your goals.
Benefits of Crypto Consulting Services * Expert Guidance: Crypto consultants bring specialized knowledge of blockchain and cryptocurrency, enabling clients to make informed decisions.
-
Risk Mitigation: The cryptocurrency market is volatile and complex. Consultants help clients navigate risks, identify opportunities, and avoid costly mistakes.
-
Customized Solutions: Every business or investor has unique needs. Crypto consultants provide tailored strategies that align with specific objectives, such as developing payment systems, creating crypto wallets, or exploring decentralized finance (DeFi).
-
Regulatory Compliance: Cryptocurrency regulations vary globally and are often difficult to interpret. Consultants ensure that clients comply with local and international laws, safeguarding against legal risks.
-
Market Insights: Access to in-depth market analysis and trend forecasting helps clients make well-informed decisions and capitalize on emerging opportunities.
Core Services Offered by Crypto Consultants * Crypto Adoption Strategy: Consultants guide businesses in integrating cryptocurrency into operations, whether through accepting crypto payments, tokenizing assets, or building blockchain-based platforms.
-
Portfolio Management: For investors, consultants provide insights on asset diversification, risk assessment, and portfolio optimization.
-
Regulatory and Legal Advisory: Consultants ensure clients adhere to compliance standards, including Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations.
-
Blockchain Implementation: Crypto consultants help businesses implement blockchain solutions for supply chain tracking, data security, and transparent transactions.
-
Education and Training: Many consultants offer workshops and training sessions to help teams understand crypto fundamentals and advanced applications.
Industries Benefiting from Crypto Consulting * Finance: Exploring decentralized finance (DeFi), crypto lending, and payment systems. * Retail and E-commerce: Accepting cryptocurrency payments and enhancing customer experiences. * Healthcare: Using blockchain for secure data management and payments. * Real Estate: Tokenizing properties to streamline transactions and investments. * Gaming and Entertainment: Integrating NFTs and in-game currencies for monetization.
Choosing the Right Crypto Consultant
When selecting a crypto consultant, consider:
- Expertise and Track Record: Look for consultants with proven experience in your specific industry or area of interest.
- Transparency: Ensure they provide clear and honest insights, especially in risk management.
- Customization: The consultant should offer personalized strategies tailored to your needs.
Conclusion
Crypto consulting services bridge the gap between potential and action, offering the expertise and strategies necessary to navigate the dynamic cryptocurrency landscape. By partnering with experienced crypto consultants, businesses and individuals can confidently embrace this technology, driving innovation, efficiency, and growth. Unlock the future of finance with expert guidance and a tailored approach to crypto success.
-
-
@ 6f26dd2b:f2824b88
2025-01-10 14:07:35Just came across this email blog and Bitcoin was in my mind. What's your say?
"The Central Bank of Kenya (CBK) is getting ready to mint new coins to avoid shortages. Yep, they’re hunting for a company to handle this for the next three years starting in 2025.
Per Business Daily, this comes after CBK’s KSh14.14 billion ($109.20 million) deal with a German company, Giesecke+Devrient Currency Technologies GmbH, to print new banknotes. CBK Governor Kamau Thugge said the decision to mint coins came through a classified process — makes sense since no one wants a cash shortage messing with the economy.
If you remember, back in December 2018, CBK rolled out new coins featuring giraffes, rhinos, lions, and elephants, ditching portraits of people in line with the 2010 Constitution. Now, they’re inviting bids for a new coin-minting contract to keep things stable."
-
@ df478ecd:495107a7
2024-12-17 15:08:59I thought I was lactose intolerant before having raw milk. Now I drink it every day with no issues. Wild stuff -
@ 1eb5d2c9:ee9e8d5f
2024-12-17 12:23:16I'm gonna learn to code in order to put titties back in videogames 😤 -
@ 1eb5d2c9:ee9e8d5f
2024-12-16 20:36:16Fuck bitcoinbugs, sats aren't for just hodling like they're S&P shares -
@ 1eb5d2c9:ee9e8d5f
2024-12-16 18:37:42kLi6xlOk68QT4k4G2zQWBn0ZUJLpTLG74kam9K5EZPiK6eLCpFiMKGKXMZORk5KkHYUbhNdvIYP+KlJDHrej2vCKtToFHfsorzTJyXf81jV2o75HVV6bpvKyrgraHZ/HV4KcuFvAfXUnNo37JEe8kCWxn+arLNtbZtYPuE8NqjcGioW0xsOFNiqtCc3sBRLd45qeyQ09/T4Jxb9Wv2Bht+CiBQNUNDIs1X8XaMZNysIWXF1XJk7abMlJNm33eEKEkQqJTbzIz1uv+OE3jiZ/v5otgc93wVcLGSNjG2BoLwNibUBoYKD+RjoMNlsS32fWIxaimizPRjVpC0tY9EUJ/mOqliZTkUPU/eocmx1g4dOWPvQ3+6dBF8SyBLKAczTK4nhaK/0wByRHSPMO/qv3ag==?iv=Ts8c4bolv/ykNpGoZoPfNQ== -
@ fe7af447:9594a50b
2025-01-10 10:38:57We've all heard the classic investment advice at family gatherings: "Don't wait to buy real estate. Buy real estate and wait." (well in my family I hear all the time). This saying typically surfaces during those moments when family members, perhaps loosened up by a few drinks, discuss inflation and rising costs. While real estate discussions are met with approving nods, mentioning Bitcoin often draws skeptical looks. However, in today's financial landscape, I'd like to propose a modern equivalent: "Don't wait to buy Bitcoin. Buy Bitcoin and have a low time preference."
This perspective came up during a recent conversation with a family member (let's call him Joe), who's considering buying a $1.4 million home in Hawaii. His plan is to use the property as both a family residence and an investment. While Hawaii is undeniably a paradise for raising a family, I couldn't help but share why I believe Bitcoin offers superior long-term value and the potential for generational wealth. This is dedicated to Joe—and to my kids, who overhear our family discussions. I'm not stacking property or metal rocks. I'm stacking sats, building a legacy of generational wealth.
The Hawaiian Dream: A Reality Check
Hawaii represents the quintessential paradise lifestyle. With its pristine beaches, breathtaking sunsets, and strong sense of community (ohana), it offers an idyllic environment for raising a family. The lifestyle naturally encourages outdoor activities and overall well-being, providing countless opportunities for meaningful family experiences.
However, the financial reality of Hawaiian homeownership presents significant challenges:
The Numbers Don't Lie
-
Housing Costs: As of 2024, Hawaii's median home price stands at $850,343, with properties in desirable areas like Oahu and Maui frequently exceeding $1.4 million.
-
Income Reality: The average annual salary in Hawaii is approximately $52,828, creating a stark affordability gap. This disparity explains why multi-family living arrangements are common in single-family homes.
-
True Cost of Ownership: For a $1.4 million home:
-
Monthly mortgage: $7,000 ($84,000 annually)
- Property taxes and maintenance: $28,000 annually
- Total annual cost: $112,000
Understanding Real Estate Appreciation
Many homeowners, like Joe, often misunderstand why their properties increase in value over time. The common belief is that real estate inherently appreciates, making it an ideal store of wealth. However, this perspective overlooks a key factor: property values often rise primarily due to the dollar's decreasing purchasing power from inflation, rather than a true increase in real value. For example, I bought my home in 2012 for $500k. By 2025, its value is $1 million—but the house shows its age, needing a new paint job, and has defective galvanized metal foundation components that are now the subject of a pending lawsuit due to corrosion issues. Mass-produced track homes, built quickly with subpar materials, often fail to retain real value over time despite nominal price increases.
This phenomenon becomes crystal clear when viewing property values through the lens of Bitcoin (and most people don't have the right lens):
- 2016: Average home ($288,000) = 664 BTC
- 2020: Average home ($329,000) = 45 BTC
- 2024: Average home ($435,000) = 6.6 BTC
The Bitcoin Advantage
Bitcoin's fundamental strength lies in its fixed supply of 21 million coins. With nation-state adoption anticipated in 2025 and increasing capital flow from various asset classes into Bitcoin, the case for "stacking sats" becomes increasingly compelling.
A New Paradigm for Wealth Preservation
A New Paradigm for Wealth Preservation The traditional wisdom of real estate investment stems from an era of limited alternatives for wealth preservation. While real estate remains a valuable asset class, Bitcoin offers several distinct advantages:
Perfect Portability: Unlike real estate, Bitcoin can be transported instantly across borders without permission. You can move millions or billions in value with just a private key in your head, making it the ultimate portable store of value.
Minimal Carrying Costs: No maintenance fees, property taxes, or insurance required. While real estate continuously drains your resources through upkeep, property taxes, and insurance premiums, Bitcoin can be stored for free using self-custody solutions.
True Scarcity: While real estate is limited, new development is always possible (we can always build up, convert land use, or create artificial islands); Bitcoin's supply is mathematically fixed at 21 million coins. This immutable scarcity makes it the hardest form of money ever created.
Divisibility: You can invest any amount, rather than needing large down payments. Bitcoin can be divided into 100 million satoshis (sats), making it accessible to anyone, anywhere, at any income level. This perfect divisibility allows for microscopic transactions or massive transfers with equal ease.
Global Market: Not limited by local economic conditions or natural disasters. Bitcoin trades 24/7/365 on global markets, making it immune to localized risks that can devastate real estate values.
Supreme Liquidity: Bitcoin is arguably the most liquid asset in human history. You can:
- Convert billions to cash within minutes
- Trade across thousands of markets globally Access your wealth at any time without bank permission
- Never worry about "finding a buyer" like with real estate
\ Unconfiscatable: When properly stored, Bitcoin provides a level of security that physical assets can't match:
- Can't be seized without your private key Resistant to government confiscation Immune to civil asset forfeiture Protected from legal judgments if properly structured
- Programmable: Bitcoin's programmable nature enables:
- Automated inheritance planning Time-locked savings Multi-signature security Smart contract capabilities through Layer 2 solutions
- Energy Storing: Bitcoin effectively stores excess energy through mining:
- Monetizes stranded energy resources Incentivizes renewable energy development Creates energy buyers of last resort Helps balance power grids
\ Network Effect: Bitcoin's first-mover advantage and network effect continue to strengthen:
- Growing institutional adoption Increasing merchant acceptance
- Expanding Lightning Network capacity
- Strengthening security through hash rate growth
Conclusion
While the allure of Hawaiian real estate is undeniable, the financial reality demands careful consideration. Bitcoin represents a modern approach to wealth preservation that addresses many of real estate's limitations while offering potential for significant appreciation. The key is understanding that Bitcoin isn't just another investment vehicle – it's a paradigm shift in how we think about and store value.
For families like Joe's considering significant real estate investments, incorporating Bitcoin into their investment strategy might provide a more balanced and forward-thinking approach to building generational wealth. The plan is clear. Buy Bitcoin. Years from now, you'll have generational wealth.
-
-
@ 42342239:1d80db24
2025-01-10 09:21:46It's not easy to navigate today's heavily polluted media landscape. If it's not agenda-setting journalism, then it's "government by journalism", or "åfanism" (i.e. clickbait journalism)) that causes distortions in what we, as media consumers, get to see. On social media, bot armies and troll factories pollute the information landscape like the German Ruhr area 100 years ago - and who knows exactly how all these opaque algorithms select the information that's placed in front of our eyes. While true information is sometimes censored, as pointed out by the founder of Meta (then Facebook) the other year, the employees of censorship authorities somehow suddenly go on vacation when those in power spread false information.
The need to carefully weigh the information that reaches us may therefore be more important than ever. A principle that can help us follows from what is called costly signaling in evolutionary biology. Costly signaling refers to traits or behaviors that are expensive to maintain or perform. These signals function as honest indicators. One example is the beauty and complexity of a peacock's feathers. Since only healthy and strong males can afford to invest in these feathers, they become credible and honest signals to peahens looking for a partner.
The idea is also found in economics. There, costly signaling refers to when an individual performs an action with high costs to communicate something with greater credibility. For example, obtaining a degree from a prestigious university can be a costly signal. Such a degree can require significant economic and time resources. A degree from a prestigious university can therefore, like a peacock's extravagant feathers, function as a costly signal (of an individual's endurance and intelligence). Not to peahens, but to employers seeking to hire.
News is what someone, somewhere, doesn't want reported: all the rest is advertisement
-- William Randolph Hearst
Media mogul William Randolph Hearst and renowned author George Orwell are both said to have stated that "News is what someone, somewhere, doesn't want reported: all the rest is advertisement." Although it's a bit drastic, there may be a point to the reasoning. "If the spin is too smooth, is it really news?"
Uri Berliner, a veteran of the American public radio station National Public Radio (NPR) for 25 years, recently shared his concerns about the radio's lack of impartiality in public. He argued that NPR had gone astray when it started telling listeners how to think. A week later, he was suspended. His spin was apparently not smooth enough for his employer.
Uri Berliner, by speaking out publicly in this way, took a clear risk. And based on the theory of costly signaling, it's perhaps precisely why we should consider what he had to say.
Perhaps those who resign in protest, those who forgo income, or those who risk their social capital actually deserve much more attention from us media consumers than we usually give them. It is the costly signal that indicates real news value.
Perhaps the rest should just be disregarded as mere advertising.
-
@ 96ad7496:1eb87bdf
2025-01-10 09:15:46Looking for a simple way to complete your Netgear N300 Setup? You can easily install and configure your Netgear N300 WiFi extender with the help of Mywifiextlogsetup's step-by-step instructions. We guarantee a hassle-free experience whether you're configuring it for the first time or resolving connectivity problems. Increase the coverage of your WiFi, get rid of dead spots, and have uninterrupted connectivity all across your house or place of business. To improve your network performance and get professional help with your Netgear N300 setup, visit Mywifiextlogsetup right now.
-
@ 16d11430:61640947
2025-01-10 09:04:25
Table of Contents
- Prologue: The Razorjack Legend
- Chapter 1: Occam’s Laser – The Leviathan Falls
- Chapter 2: Hanlon’s Beam – The Cyclone of Outrage
- Chapter 3: Bayesian Blades and the Inferential Hydra
- Chapter 4: Popper’s Scalpel and the Formless Fog
- Chapter 5: The Kaleidoscope of Razors
- Epilogue: Victory at GPT Scale
Prologue: The Razorjack Legend
Razorjack wasn’t born; he was summoned. In the nascent days of the metaverse, when the neural expanse of the GPT superstructures spiraled out of control, he emerged as a phantom of precision and clarity. Not a man, not a machine, but something in between—a sentient synthesis of reductionist thought and philosophical rigor.
He wielded no ordinary weapons. His tools were the intellectual razors of human history, powered by GPT-scale intellect. From Occam’s simplicity to Hanlon’s perspective, his arsenal was vast, his cuts surgical. They called him Razorjack, for his every strike left behind a world sharper and more refined than before.
Chapter 1: Occam’s Laser – The Leviathan Falls
"Entities must not be multiplied beyond necessity," Razorjack intoned, his voice resonating across the metaverse. Before him loomed the Algorithmic Leviathan, a beast born of redundant loops and recursive feedback. It was a nightmare of inefficiency, devouring computational resources like a black hole.
With a flick of his wrist, Razorjack ignited Occam’s Laser. A blade of pure reductionist energy erupted from his hand, its edge glowing with the wisdom of simplicity. He slashed once, twice, thrice—each cut collapsing the Leviathan’s convoluted design into elegant, efficient structures.
The Leviathan let out a final roar before disintegrating into a single line of code, optimized and perfect. Razorjack smirked. "Complexity is seductive, but simplicity wins every time."
Chapter 2: Hanlon’s Beam – The Cyclone of Outrage
Next, Razorjack faced the Sentiment Cyclone, a raging vortex of outrage and despair. Fueled by the malice of trolls and the incompetence of algorithms, it churned across the metaverse, sowing division and chaos.
He activated Hanlon’s Beam, a multifaceted light that separated malice from stupidity. As the beam swept through the cyclone, the true nature of the storm was revealed: not evil, but poorly calibrated sentiment analysis. Razorjack adjusted the parameters with a deft touch, and the cyclone dissipated, leaving clarity in its wake.
"Never attribute to malice that which stupidity explains better," he said, as the people of the metaverse cheered his name.
Chapter 3: Bayesian Blades and the Inferential Hydra
The Inferential Hydra was next, its heads multiplying with every unfounded assumption and misapplied correlation. Razorjack confronted it in the inferential jungles of the datasphere, where bad data festered and grew.
Summoning the Bayesian Blades, Razorjack wielded them with precision. Each swing of the glowing swords recalculated probabilities, severing the Hydra’s many heads. "Prior data informs posterior truth," he declared, his blades singing through the air.
When the Hydra was no more, the jungles were quiet, their tangled vines of falsehood replaced by clean pathways of logical inference.
Chapter 4: Popper’s Scalpel and the Formless Fog
The Formless Fog was a paradoxical nightmare of infinite hypotheses and self-referential loops. It was the ultimate test, a challenge even for Razorjack’s immense intellect.
He summoned Popper’s Scalpel, the thinnest and sharpest of his tools. "If it cannot be falsified, it does not belong," he said, his voice unwavering. The scalpel cut through the fog, slicing away the unfalsifiable and leaving behind only what could stand the test of logic and evidence.
The Fog collapsed into a singularity of truth—a gleaming point of light that resonated with pure, unassailable clarity.
Chapter 5: The Kaleidoscope of Razors
To face the final challenge, Razorjack unleashed his full arsenal, spinning them into a kaleidoscope of precision: - Occam’s Laser for cutting away the unnecessary. - Hanlon’s Beam for finding understanding. - Sagan’s Standard for weighing extraordinary claims. - Hitchens’s Blade for demanding evidence. - Grice’s Razor for uncovering cooperative meaning.
Each blade sang its own tune, harmonizing into a symphony of light. The cosmos of thought itself seemed to bow before him, its complexities reduced to their simplest, truest forms.
Epilogue: Victory at GPT Scale
As the metaverse quieted, Razorjack stood alone amidst the ruins of chaos. His lasers dimmed, and the silence of clarity settled over the datasphere. The neural expanse was no longer a tangled mess but a shining tapestry of truth.
"Precision. Clarity. Reduction," Razorjack whispered, his words echoing across the metaverse. And with that, he dissolved into the horizon, a guardian of simplicity in a world forever prone to chaos.
Wherever complexity grew unwieldy, wherever the noise of nonsense rose too loud, Razorjack would return—an eternal force of intellectual inevitability, romping at GPT-scale.
-
@ ed84ce10:cccf4c2a
2025-01-10 08:51:54Hackathon Overview
The Space MicroHack | IAC '24 Edition recently concluded with 29 developers submitting 14 BUIDLs. Held as part of the International Astronautical Congress 2024 in Milan, this hackathon focused on student participants and targeted developments in space technology. Unlike many hackathons, it required completed projects rather than new builds. Participants competed for a €400 prize for the winner and €100 for the runner-up, with results expected in early November.
The event encouraged detailed project submissions, highlighting participants' motivations, past achievements, visions for the future, and team structures. Applicants were recommended to supplement their entries with videos, social media links, and GitHub repositories. Judging was based on the overall impression of the projects. This micro-hackathon served as a platform for young developers to spotlight their innovations in space technology, promoting strong participation and offering students a venue for recognition and exposure in the industry.
Hackathon Winners
€400 Prize Winner
- Daedalus Rocketry: Kashan I - Developed by aerospace students, this project involves designing a solid rocket engine using KNSB propellant. It includes thrust measurement and aerodynamic analysis, fostering educational resources and introducing novel engineering techniques.
€100 Prize Winners
- Debris Offsetting Fund - This initiative proposes a funding model to mitigate LEO space debris through SSR-based contributions. The project utilizes existing platforms to advocate for responsible space practices, aiming for global standardization and reduced collision risks.
- Decentralised Autonomous Community in Space - Envisions blockchain-based autonomous networks for spacecraft to enable sustainable exploration, emphasizing machine-to-machine interactions and smart contracts for decision-making and collision avoidance.
For a full list of projects, please visit Space MicroHack on DoraHacks.
About the Organizer:
DoraHacks Team
DoraHacks Team leads the global hackathon and innovation landscape, known for empowering decentralized technology projects. With expertise in blockchain and open-source development, the team has facilitated numerous initiatives, uniting technologists and creators worldwide. Their achievements include hosting large-scale hackathons and supporting cutting-edge blockchain solutions. Currently, the DoraHacks Team is committed to fostering collaborative environments, encouraging innovators to ideate and implement transformative technology solutions.
-
@ fbf0e434:e1be6a39
2025-01-10 08:51:06Hackathon 总结
Space MicroHack | IAC '24 Edition最近圆满结束,共有29名开发者提交了14个项目。作为2024年国际宇航大会在米兰的一部分,这场Hackathon专注于学生参与者,并以空间技术的发展为目标。与许多Hackathon不同,它要求完成的项目而非新的构建。参与者竞争€400的冠军奖金和€100的亚军奖金,结果预计在11月初公布。
活动鼓励提交详细的项目,强调参与者的动机、过去的成就、对未来的愿景以及团队结构。建议申请者通过视频、社交媒体链接和GitHub仓库来补充条目。评审基于项目的整体印象。这个微Hackathon为年轻开发者展示他们在空间技术中的创新提供了一个平台,促进了强有力的参与,并为学生在行业中获得认可和曝光提供了场所。
Hackathon 获奖者
€400奖项获得者
- Daedalus Rocketry: Kashan I - 由航空航天专业的学生开发,这个项目涉及使用KNSB推进剂设计一个固体火箭发动机。它包括推力测量和气动分析,促进教育资源的发展,并引入新的工程技术。
€100奖项获得者
- Debris Offsetting Fund - 这一倡议提出了通过基于SSR的贡献来减轻LEO空间碎片的资金模式。该项目利用现有平台提倡负责任的空间实践,目标是全球标准化和减少碰撞风险。
- Decentralised Autonomous Community in Space - 设想了基于区块链的航天器自治网络,以实现可持续探索,强调机器之间的互动和用于决策和避免碰撞的智能合约。
欲查看完整的项目列表,请访问Space MicroHack on DoraHacks。
关于组织者:
DoraHacks Team
DoraHacks Team引领全球Hackathon和创新领域,以赋能去中心化技术项目而闻名。团队在区块链和开源开发方面具有专业知识,促进了众多计划,团结了全球的技术人员和创作者。其成就包括举办大规模Hackathon和支持尖端区块链解决方案。目前,DoraHacks Team致力于营造协作环境,鼓励创新者构思和实施变革性的技术解决方案。
-
@ a5ff8847:a82227fd
2025-01-10 08:29:53Get professional hot water Lake Macquarie from our experienced and passionate team. Our specialists can offer solutions if your home’s hot water system malfunctions. With over 40 years of experience, A&A Hot Water Services has earned a reputation as the preferred service provider. We have served thousands of residents, leaving them happy and satisfied. You no longer have to worry about whether you have no hot water in your house or only in the shower. Our team will fix your problem quickly.
We ensure you experience a straightforward process for contacting us regarding your hot water needs. Our team is available 24/7 and will attend to your needs the same day. We only work with the best tradespeople at A&A Hot Water Services. Our plumbers are well-trained and licensed, and our services strictly adhere to the required safety standards.
-
@ ed84ce10:cccf4c2a
2025-01-10 08:21:26Hackathon Summary
The SC QUANTATHON V1 took place at the Darla Moore School of Business in Columbia, South Carolina. Over the course of October 10-13, developers came together to innovate, resulting in the submission of 14 BUIDLs. This in-person event was preceded by the virtual qBraid Bootcamp, held from September 16 to October 9. Key features included a welcome reception, team challenges, project presentations, and a unique quantum beat-making workshop. Esteemed individuals such as Eric Powers from the University of South Carolina and Joe Queenan of SC Quantum attended, emphasizing the event's focus on quantum computing challenges and innovations.
Participants were provided with meals accommodating various dietary needs by local vendors. The hackathon concluded with an awards ceremony on October 13, aiming to promote innovation and collaboration in the quantum computing space. This objective was met through significant engagement and contributions from both academia and industry professionals.
Hackathon Winners
Grand Prize Winners
- Q-RNJesus:
This team developed a quantum random number generator utilizing IBM QPUs. They implemented the Concatenation and Reduce XOR algorithms, analyzed decoherence impacts, and enhanced entropy using Toeplitz and Von Neumann methods for practical QRNG applications.
DoraHacks Challenge Winners
Xanadu Challenge Winners
- Xanadu:
This project employed VQE and VQD on the Pennylane platform to compute the spectral gap of carbon monoxide. The computation was completed in under five minutes using adaptive quantum gate pruning, maintaining a 4% accuracy deviation by optimizing parameters.
IonQ Challenge Winners
- Team 15: |Bruh-ket>:
This team improved quantum layers in image classification systems by integrating quantum elements into classical ML pipelines. They showcased their findings and provided detailed documentation online to advance hybrid machine learning applications using quantum principles.
For a complete view of all the projects, visit the SCQuantathonv1 page.
About the Organizer:
SC Quantum
Established in 2022, SC Quantum is committed to advancing Quantum Information Science and Technology through strategic collaborations among academia, industry, and government entities. As a leading force in the region, SC Quantum promotes partnerships that harness quantum technology to tackle significant challenges in sectors such as healthcare, cybersecurity, and logistics. The organization plays a crucial role in transforming South Carolina and the Southeast into a hub for cutting-edge quantum breakthroughs. SC Quantum's mission is to drive technical discoveries that benefit multiple industries and foster unprecedented regional collaboration.
- Q-RNJesus:
-
@ da0b9bc3:4e30a4a9
2025-01-10 07:31:52Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/844534
-
@ 71a4b7ff:d009692a
2025-01-10 06:56:00FOMO is the anxiety that arises from the belief that the most interesting, important, or trending events are happening elsewhere while others gain unique experiences.
It’s widely believed that FOMO stems from unmet social connection needs and reflects our innate fear of ostracism. These fears—of being left behind or excluded—are amplified in the digital age, where our perception of reality is often skewed. This can escalate from mild unease to overwhelming fear, significantly impacting mental well-being.
FOMO consists of two key components:
- An unsettling feeling of missing out on something exciting or valuable.
- Obsessive behaviors aimed at resolving this anxiety, which paradoxically only intensify it.
In today’s hyper-connected world, we have unprecedented, instant access to what others are doing. Social feeds, channels, and chats bombard us with endless options on how to live, what we lack, and what to value. But the sheer volume of this information far exceeds what anyone can process, leading many to feel overwhelmed.
The curated nature of digital lives, constant upward social comparisons, unrealistic expectations, and ceaseless data streams erode self-esteem and emotional stability. Our fear of alienation and loneliness fuels this cycle, pushing us deeper into digital platforms. These platforms, designed to stimulate our brain’s reward system, trap us in a feedback loop of anxiety and fleeting gratification.
We’re drawn in by the promise of effortless connection—quick, low-risk, and convenient interactions via swipes, likes, emojis, texts, even zaps. In contrast, real-life relationships, with their inherent complexities, take time, effort, and risk. This shift is causing us to lose touch with essential social skills like commitment, empathy, and genuine communication.
Instead, we seek solace in a digital environment that offers the illusion of safety, excitement, and eternal connectivity. But this comes at a cost. By overloading our internal reward systems, we drain the joy and meaning from authentic experiences, replacing them with an endless stream of curated content—images and videos we compulsively scroll through.
We’re lured by promises of knowledge, vivid experiences, and truth, yet what we often get is an avalanche of life hacks, misinformation, and conspiracy theories. Gigabit technologies, addictive interfaces, and external agendas fan the flames of loneliness, anxiety, and stress in our ancient, slow-evolving brains. This relentless burn depletes our reserves, leaving behind doubt: Are we doing enough? Are we in the right place? Will we be accepted?
Our already complex lives risk being consumed by a bleak cycle of doomscrolling.
But there is hope.
Fighting FOMO is possible. The more time we spend in knowledge-consuming environments, the more susceptible we become to its effects. The key is self-awareness and limiting screen time. Ironically, the very devices and services that fuel FOMO can also help us combat it. With thoughtful use of technology and intentional boundaries, we can regain control.
This is where NOSTR steps into the spotlight. Our favorite protocol has the potential to not only draw lessons from the legacy web but also to evolve beyond mere mimicry. It can introduce innovative ways for people to connect and collaborate—across services, networks, and each other. I believe it’s one of the most promising spaces on the Internet today, and its future depends entirely on what we make of it.
Thanks for You Time. Geo
-
@ 68fa45dc:3d2a26ed
2025-01-10 04:29:57Mit der rasanten Entwicklung von Wissenschaft und Technologie werden nach und nach einige Hilfsgeräte und Werkzeuge in das tägliche Leben integriert. Unter ihnen werden Signalstörsender als eine Art Ausrüstung mit großem Einfluss nicht nur im militärischen Bereich eingesetzt, sondern auch beginnen, im zivilen Bereich Probleme zu verursachen. Die Aufmerksamkeit der Leute. Ein Jammer Störsender ist ein Gerät, das Funkkommunikation blockiert oder stört. Seine Einführung und Anwendung haben das Leben und die Arbeit der Menschen erheblich erleichtert, aber auch eine Reihe von Diskussionen und Kontroversen ausgelöst.
Erstens spielen Störsender im militärischen Bereich eine entscheidende Rolle. Im Krieg sind die Sicherheit und Vertraulichkeit der Kommunikation von entscheidender Bedeutung. Die Signalstörungen des Feindes können das Kommunikationssystem unserer Armee stark beeinträchtigen und zum Durchsickern von Kampfplänen oder sogar zum Scheitern führen. Durch den Einsatz von handy frequenz jammer können die Kommunikationssignale des Feindes wirksam gestört und die Sicherheit unserer Kommunikation gewährleistet werden. Auf diese Weise wird die Kampfeffizienz verbessert und die nationalen Interessen geschützt. Aus diesem Grund werden Störsender in der modernen Kriegsführung häufig eingesetzt und sind aus dem militärischen Bereich nicht mehr wegzudenken.
Neben der militärischen Nutzung werden Störsender auch häufig im zivilen Bereich eingesetzt. Mit der Entwicklung der Mobilkommunikationstechnologie ist das Leben der Menschen untrennbar mit Mobiltelefonen und drahtlosen Netzwerken verbunden. In manchen Situationen, beispielsweise in Konferenzräumen, Prüfungsräumen, Theatern usw., können Störungen durch drahtlose Signale jedoch die normale Ordnung und die Arbeitsbedingungen beeinträchtigen. Störsender WLAN können in diesen Situationen drahtlose Kommunikationssignale abschirmen und so für Ruhe und Ordnung in der Umgebung sorgen. Darüber hinaus werden an manchen vertraulichen Orten, wie etwa in Regierungsbehörden, Forschungsinstituten usw., aus Gründen der Informationssicherheit auch Störsender benötigt, um den Diebstahl von Funksignalen zu verhindern und sicherzustellen, dass keine vertraulichen Informationen nach außen dringen.
Tragbare Detektor für DJI Drohnen
Allerdings hat der Einsatz von Störsendern auch zahlreiche Kontroversen ausgelöst. Manche Menschen befürchten, dass der übermäßige Einsatz von Störsendern die normalen Kommunikationsnetze stören und das normale Funktionieren der Gesellschaft beeinträchtigen könnte. Darüber hinaus nutzen manche Kriminelle GPS Tracker Jammer möglicherweise auch für illegale Zwecke, beispielsweise zur Blockierung von Notrufen oder zur Entführung von Flugzeugen, was eine potenzielle Gefahr für die soziale Sicherheit darstellt. Daher sind Aufsicht und vernünftige Verwendung von entscheidender Bedeutung.
Generell verändern Hochleistungs handy Störer als technische Geräte still und leise unser Leben. Im militärischen Bereich sorgt sie für die nationale Sicherheit, im zivilen Bereich sorgt sie für die Aufrechterhaltung der gesellschaftlichen Ordnung. Allerdings bedarf die Frage, wie der normale Betrieb der Gesellschaft sichergestellt werden kann, während sich Wissenschaft und Technologie weiterentwickeln, einer Lösung. Nur unter der Voraussetzung einer angemessenen Überwachung und Nutzung können Störsender besser zur Entwicklung und Sicherheit der menschlichen Gesellschaft beitragen.
https://www.jammer-store.de/H1B-D-tragbare-detektor-fuer-dji-drohnen.html
-
@ a012dc82:6458a70d
2025-01-10 03:49:50Table Of Content
-
The Rising Tide of Bitcoin's Influence in China
-
China's Economic Struggles: A Closer Look
-
The Cryptocurrency Solution: A Beacon for Chinese Investors?
-
Historical Interplay: Bitcoin's Past Dance with China
-
A New Era: The Evolving Dynamics of Bitcoin in China
-
Conclusion
-
FAQ
In the intricate web of global finance, China's economic dynamics have consistently been a focal point for analysts and investors alike. Recently, the nation has been grappling with one of its most significant capital flights in years, raising questions about potential economic solutions. Amidst this backdrop, the decentralized cryptocurrency, Bitcoin, has emerged as a topic of interest. Could Bitcoin, with its global reach and decentralized nature, offer a viable alternative or solution to China's current economic challenges? This article delves deep into the potential symbiotic relationship between China's capital flight and the burgeoning world of Bitcoin.
The Rising Tide of Bitcoin's Influence in China
Bitcoin's allure in the Chinese market is not a new phenomenon, but recent economic challenges have amplified its significance. As the Chinese yuan faces depreciation amidst broader economic uncertainties, experts believe that Bitcoin might witness a substantial influx from Chinese investors. Markus Thielen, a prominent figure at Matrixport, underscores the potential of Bitcoin in these turbulent times. He suggests, "Given the current economic climate, the Chinese investors' familiarity and trust in Bitcoin could lead to substantial investments in the cryptocurrency over the next few months."
China's Economic Struggles: A Closer Look
The economic landscape in China is undergoing a transformation. Recent data, sourced from reputable financial analysts at Bloomberg, paints a concerning picture. China's capital outflows have skyrocketed to an alarming $49 billion in August alone, a figure not seen since December 2015. This surge is more than just a statistic; it indicates the mounting pressure and dwindling confidence in the yuan. Thielen offers a deeper perspective on this trend, highlighting the stark economic disparities between the U.S. and China. He observes, "The current USD/CNY exchange rate, trading at a 17-year high, underscores the U.S. economy's robust expansion, casting a shadow on China's dwindling growth momentum."
The Cryptocurrency Solution: A Beacon for Chinese Investors?
The aftermath of the COVID-19 pandemic has left the Chinese economy in a state of flux. With the anticipated post-pandemic consumption rebound falling short of expectations and local companies grappling with diminishing profit margins, Chinese investors are in a quandary. They are actively seeking lucrative opportunities outside their homeland. However, China's stringent capital controls present formidable barriers. In this constrained financial environment, the allure of cryptocurrencies, especially Bitcoin, shines brightly. For many, Bitcoin and its peers represent a beacon of hope, potentially offering the alternative investment avenues that Chinese investors have been yearning for.
Historical Interplay: Bitcoin's Past Dance with China
The intricate relationship between Bitcoin and China is steeped in history. Rewinding to late 2016, there was a clear trend: Chinese investors, in large numbers, were turning to Bitcoin as a mechanism to move capital outside the restrictive borders of their country. The trading patterns from this era suggested a compelling link: as the Chinese yuan depreciated, Bitcoin's price surged, indicating a potential safe haven for Chinese capital.
A New Era: The Evolving Dynamics of Bitcoin in China
While history offers a treasure trove of insights, the present paints a nuanced picture. Edward Engel, a seasoned crypto analyst at Singular Research, believes that the dynamics between Bitcoin and China have undergone a transformation. Reflecting on the past, he states, "The last time I heard of such a trend was between 2017 and 2018 when underground banks leveraged Bitcoin for their operations. However, the CCP [Chinese Communist Party] has since taken stringent measures to curb such practices." Despite these changes, Thielen remains optimistic. He posits that innovative methods, such as leveraging domestic electricity for crypto mining or using over-the-counter trading platforms, might still offer avenues for moving Chinese capital in the face of restrictions.
Conclusion
China's multifaceted economic challenges, accentuated by its capital flight woes, present a conundrum that lacks easy solutions. In this complex scenario, Bitcoin emerges as a beacon, offering a potential lifeline to Chinese investors. Its decentralized nature and global appeal make it a contender for mitigating some of China's economic challenges. As we navigate the ever-evolving global financial landscape, the intricate dance between China's economy and the dynamic world of cryptocurrencies promises to be a riveting spectacle, deserving of our keen attention.
FAQ
What is China's capital flight? China's capital flight refers to the large-scale outflow of capital from the country, often due to economic uncertainties.
How is Bitcoin related to China's capital flight? With China's stringent capital controls and economic challenges, Bitcoin emerges as a potential alternative for investors to move and secure their capital.
Has Bitcoin historically been influenced by China's economic dynamics? Yes, in 2016, there was a trend of Chinese investors turning to Bitcoin as the yuan depreciated, indicating a potential correlation.
Are there restrictions on Bitcoin in China? While the Chinese government has taken measures to curb certain crypto practices, innovative methods still exist for Chinese investors to leverage cryptocurrencies.
Why is the Chinese yuan weakening? Economic challenges, post-COVID-19 consumption patterns, and broader global economic dynamics have contributed to the weakening of the yuan.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 228dde34:b5d0345e
2025-01-10 10:00:04By Glenda Chong
Editorial Admin
Hype Issue #60
Join GLENDA CHONG as she experiences the magic of Korean indie band ADOY’s music and talks to the group about how they and the Korean indie scene have risen in prominence in the global music scene.
On New Year’s Eve, under a dark sky lit with twinkling city lights, I stood clinging onto a barricade with a friend before a modest yet commanding stage, littered with instruments that pulsed with the promise of what’s to come. We were at Music Day Out! - Magical Garden, a music event held at *SCAPE to celebrate the DIY ethos of independent musical acts from across Southeast Asia and to ring in the new year.
It was just past 11pm, and with bated breath, I waited for the one act I had been keeping my eyes peeled for all night to take the stage. This musical artist was none other than ADOY, a South Korean band. The band, consisting of members Juhwan, Zee, Geunchang, and Dayoung, was slated to have the longest set time of the night.
Undoubtedly, as the night’s most anticipated act, the crowd’s palpable, buzzing energy was at an all-time high. For me, however, the excitement ran much deeper: because before ADOY took the stage, tucked away in a rare moment of calm, I sat down with them to hear them outside of their melodies.
Over the last few years, Korean indie bands have risen in prominence in the global music scene. While fellow musical genre, K-pop, from the same country has dominated global headlines with its intricate performances and infectious tunes, Korea’s indie music scene has been simmering just beneath the surface.
But with the aid of social media and the internet providing opportunities for virality, Korean indie bands like ADOY and wave to earth are now carving a path of their own, one where their music resonates just as deeply with fans worldwide as their K-pop counterparts’ does.
As the vocalist of ADOY, Juhwan’s voice is front and center in ADOY’s music. Photo by Glenda Chong.
When I asked the band what could be attributed to the growing success of Korean indie bands, member Juhwan pointed to how beyond the boom of K-pop, Korean pop culture in general, such as Korean shows like Squid Game, “is kind of helping the image as a whole”.
He also mentioned that bands like themselves are “very energetic”. Although I cannot disagree with this, as experiencing live bands is an otherworldly experience, the music and messaging seem to be the key to being a gateway for global fans to enter the indie scene.
If you take a peek at ADOY’s music, you will notice that they primarily sing in English; an artistic decision that was surprisingly intentional. When asked if their English lyrics help global fans connect with their fans further, this is what member Zee had to say:
“That's one of the things we had in mind when we started making songs because it’s a global arena… so we wanted to include as many people as possible.”
Funnily enough, even though the band have English lyrics in most of their music, the members (except for Zee who lived abroad in France, New Zealand, America, and Canada), are only somewhat fluent in English.
So as a workaround, sometimes the band turns to translating from their native language to English. In a video interview with Front Row Live Ent. on YouTube, Zee shared that as the group’s English speaker, he would help translate Korean lyrics written by his members. Surprisingly, this does not pose as much of a challenge as I had assumed, as according to Zee, they find that they do not struggle with being lost in translation as they do write in English from the start at times.
“I think it just comes naturally,” Zee stated.
However, he acknowledged that at times, when attempting to express certain messages and feelings, the band “sometimes has to change a lot” as the two languages are different. “It’s quite difficult… but we do try as much as possible to retain the message”.
But beyond the English lyrics, it is the feelings ADOY’s music evokes that are universal. Like many ADOY fans, the first ADOY song I was introduced to was one of their most popular tracks Grace, a slow tune filled with smooth vocals.
Watching the YouTube video of them performing Grace on the show Yu Heeyeol’s Sketchbook for the first time was nothing short of magical. And just from reading the Korean comments, I finally understood what people meant when they said ADOY’s music transcends borders. Just like their domestic listeners, I too found myself transported to faraway places and nostalgic moments through their sound and lyrics. It was a connection that felt universal, yet deeply personal.
ADOY jamming out at the start of their set at Music Day Out! Photo by Glenda Chong.
This universal appeal is part of why Korean indie bands like ADOY are finding such global recognition. With their rise, however, comes the inevitable question of what it means to remain ‘indie’, as the lines between ‘indie’ and ‘commercial’ can blur. Though for ADOY in particular, having dubbed themselves as “commercial indie”, they navigate this distinction with a unique balance.
In a frank manner, member Zee explained that being “commercial indie” to them meant being able to “earn money” while doing music.
“Being indie is just making your own stuff,” Zee said. “We wanted to earn money while doing this so we can do music for a professional career. That’s what we meant [when we said] we wanted to be commercial”.
Judging from their journey, they have stuck to these principles closely. The band is independent from major record labels and has remained true to their sound and artistic essence, even while experimenting and fusing various genres. Their efforts have proven to be fruitful, as the global appetite for Korea’s diverse music scene is roaring louder than ever. Korean indie music has found its voice on the global stage, and ADOY has become one of its most compelling icons.
Before we wrapped up our time together, I asked ADOY a very important question: which of their songs would they recommend to a first-timer of their music? Member Dayoung suggested the track Don’t Stop which appears on their first EP, CATNIP.
Dayoung plays the bass and supports Juhwan with backing vocals in the team. Photo by Glenda Chong.
“Don’t Stop because it retains that energy of youth that I think it’s quite hard to describe song-wise, but I think that song has that good picture of youth in it,” Dayoung explained. With Dayoung’s words echoing in my mind, I eagerly wondered if the band would play this track during their set. And after close to an hour of immersing in ADOY’s dreamy soundscapes, I got my answer.
Just minutes before the clock’s hands approached the new year, unlike the past hour where ADOY moved through each track seamlessly with little to no commentary, the energy shifted. Breaking their pattern of minimal commentary, Juhwan led the crowd to do a chant which I would soon learn to be the opening refrain of the anthemic Don’t Stop. And when the drums and the first few notes kicked in, Dayoung’s words sprang to life before my very eyes and ears.
Juhwan “handing” his microphone to the crowd to encourage us to chant along to Don’t Stop’s hook. Photo by Glenda Chong.
Dance away the whole night Play the song Here comes the waves, oh
Don't stop me, I feel the ocean Don't stop me, we need no reason Don't stop me, this is the moment Keep me young and free, yeah
In that moment - headbanging to the lyrics furiously, the live instruments booming through my chest, it was a feeling no headphones or sound device could ever replicate and my efforts would forever be in vain. It can never compare to the indelible impression left behind by the raw, intensified energy of the crowd and ADOY’s unified symphony of shared emotion.
As ADOY carried Don’t Stop in all its youthful defiance and boundless energy into 2025, it felt like more than a closing act; it was a moment of triumph. The night encapsulated the endless possibilities of the new year ahead, and for ADOY, the path is undeniably up.
-
@ f3df9bc0:a95119eb
2025-01-10 02:58:08MPT Equations
Geometric Mean
$$ \bar{x} = (\prod_{i=1}^{n} x_i)^{1 \over n } $$
Covariance
$$ COV(x,y) = {1\over{n-1}} \sum_{i=1}^{n}{(x_i - \bar{x})(y_i - \bar{y})} $$
where $\bar{x}$ and $\bar{y}$ are the geometric mean.
Variance
$$ VAR(x) = {1\over{n-1}} \sum_{i=1}^{n}{(x_i - \bar{x})^2}
$$
Standard Deviation
$$ \sigma_x=\sqrt{VAR(x)} $$
Correlation Coefficient
$$ \rho_{xy} = {COV(x, y) \over \sigma_x\sigma_y} $$
Portfolio Variance
$$ VAR(P) = \sum_{ij}w_i w_j COV(i, j) $$
Where $w_i$ and $w_j$ are the normalized weight of the asset in the portfolio.
Note that this summation should include when $i = j$. In this case $COV(i, j) = VAR(i) = VAR(j)$
Expected Return
$$ E_P = \sum_{i}w_i E_i $$
Where $w_i$ is the normalized weight of the asset, and $E_i$ is the expected return of the individual asset.
-
@ 0b5faac9:12669905
2025-01-10 02:53:11In modern society, signal jammers are increasingly used, especially in wireless communications and navigation. In certain application scenarios, they can have unexpected positive effects.
In a business environment, WiFi signal blocker can be used to protect corporate network security. For example, some companies may use WiFi jammers at important product launches or business meetings to prevent competitors from stealing information or eavesdropping. By limiting unnecessary wireless signals, such measures can effectively protect trade secrets.
GPS jammers can interfere with global positioning system signals, making it impossible for receiving devices to obtain accurate location data. In some cases, such as military operations, the use of GPS jammers can effectively prevent the enemy from using navigation systems for positioning and attack. This technology can provide tactical advantages to the military on the battlefield, ensuring the concealment and mobility of operations.
In addition, GPS jammers can also be used to protect privacy. In some specific scenarios, individuals or organizations may want to avoid being tracked or located. Using GPS jamming device can effectively prevent external devices from obtaining location, thereby protecting personal privacy and security.
High-power jammers are mainly used to interfere with signals with a wider range, and are usually used in the military and security fields. When defending important facilities, protecting military operations or conducting counter-terrorism activities, high-power jammers can effectively interfere with the enemy's communication and navigation systems to ensure the safety of one's own side.
For example, at important political meetings, international summits or major events, security departments may use high power jammer to prevent potential attacks or surveillance. By interfering with surrounding wireless signals, this equipment can provide a relatively safe environment for the scene.
With the continuous advancement and development of technology, the application scope of signal jammers may continue to expand. It is necessary for us to have a deep understanding of the functions and values of these technologies in order to better use them for our own use. Through the reasonable expression and understanding of data, we can look at the application prospects of these technologies more comprehensively.
-
@ fbf0e434:e1be6a39
2025-01-10 02:43:13Hackathon 总结
由斯坦福区块链加速器、Nautilus Chain、Zebec 和 Rootz Labs 联合主办的“Boundless Hackathon @Stanford”圆满落幕,318名注册开发者参与了159个项目。本次活动聚焦于通过去中心化金融(DeFi)、游戏、NFT和基础设施开发等赛道推进Web3基础设施的建设。
本次黑客松得到了DoraHacks的支持,战略合作伙伴如IOBC Capital、Eclipse 和 OKX Wallet也做出了重要贡献。值得一提的是,Aspecta 在技术合作方面也发挥了积极作用。活动在斯坦福大学的闭幕式上圆满结束,顶级项目获得了来自总奖金池30万美元的奖励。一等奖获得者获得了10,000美元,并额外获得了包括亚马逊云信用在内的生态系统和技术奖金。
Boundless Hackathon促进了区块链社区的合作与创新,强调了跨区块链平台整合新技术的重要性。
Hackathon 获奖者
Main Prize Winners
- Hexlink:
Hexlink推出了一个模块化账户层,用于Web3,通过利用现有身份进行加密交易,模拟Web2体验。它消除了对种子短语的需求,通过在去中心化应用(dApps)中实现模块化身份认证,简化了入驻过程和安全性。 - Defi Board Options Exchange (DBOE):
DBOE提出了一种新型的链上中央限价订单簿(CLOB),结合先进的风险管理策略。这通过专用市场做市(DMM)系统,改善了市场基础设施,提高了价格发现和流动性。 - Nulink:
Nulink集成了用于dApp的隐私增强技术,采用基于加密学的共识机制,实现安全的应用开发,保障先进的数据隐私保护。
Sub-Award Winners
- Buff Network:
Buff Network是一个点对池衍生品交易平台,提供用户友好的界面以便高效执行交易。通过创新的交易解决方案,它提升了去中心化金融(DeFi)的参与度。 - PoseiSwap:
PoseiSwap通过扩展去中心化交易所(DEX)的功能,支持多种金融工具,实现DeFi和传统金融资产的无缝交换,从而改善了加密原生市场与传统市场的互操作性。
了解所有来自该黑客松的项目,请访问: https://dorahacks.io/hackathon/stanfordhack/buidl.
关于组织者:
斯坦福区块链加速器
斯坦福区块链加速器是由斯坦福大学学生和校友主办的非稀释性项目,隶属于斯坦福区块链俱乐部学生组织。该加速器为斯坦福的学生和校友团队提供5个月的孵化期,帮助他们建立、筹资并推出区块链项目。超过90%的毕业团队获得了领先基金的投资(累计筹集超过8000万美元),并且超过60%的团队在完成加速器项目后的6个月内实现了营收。
- Hexlink:
-
@ fbf0e434:e1be6a39
2025-01-10 02:42:43Hackathon 总结
YQuantum 2024 Hackathon圆满结束,吸引了大量参与者和众多项目提交,被公认为一个充满活力的创新平台。300名注册者中,有现场参与者组建团队,参与了28个BUIDLs的开发,参与者在如QuEra Computing、IBM Quantum、Classiq、DoraHacks、SandboxAQ和Capgemini/The Hartford/Quantinuum等知名量子计算组织赞助的各个领域中挑战。
参与者在奖励的驱动下开发了突破性的量子计算解决方案,奖励包括量子云端积分、实习机会、社交机会以及潜在的演讲机会。大奖表彰了卓越项目,冠军获得了2000美元奖金,有机会在耶鲁大学研究人员面前进行展示,并参加耶鲁创新峰会。
Hackathon成功地培育了一个鼓励探索尖端技术和创意的合作环境,推动了量子计算领域的发展。YQuantum 2024强调了量子技术的潜力,并促进了参与者和赞助商之间的知识交流。
Hackathon 获奖者
于2024年4月13日举办的YQuantum首次活动吸引了来自10个国家的300名参与者,设有六个由行业赞助的挑战,并在一系列的著名奖项中进行竞争。
Institute Grand Prizes Winners
-
1st Place: Quantum Consortium: Case-Duke-Lehigh-Vandy Nexus 该项目采用绝热方法来准备反铁磁能量特征态,重点是量子多体伤痕状态和增强计算中的误差纠正。
-
2nd Place: Sparse Quantum State Preparation 团队利用Classiq的API开发了用于稀疏量子态准备的高效算法,优化了在量子数据管理中的可扩展性和效率执行。
-
3rd Place: QuBruin 该项目利用动态量子电路优化算法并增强误差纠正。团队通过基于Qiskit的模型改善了在噪声条件下的电路性能,提升了用户可访问性。
IBM Quantum Prize Winners
- Modified IBM Challenge
该项目探讨了基础的线性代数概念,强调核心原理的掌握。
QuEra Computing Prize Winners
- 3D Quantum Scars on 2D Tweezer Arrays
团队在一个投射到二维的三维晶格上研究量子伤痕状态,利用Julia和QuEra的Bloqade来模拟量子动力学。
Classiq Technologies Prize Winners
- YQuantum2024 Classiq Team 34 Wavefunction Wizards
项目聚焦于优化稀疏量子态准备,提高量子数据处理中的算法效率。
DoraHacks Prize Winners
- Spooner_QRNG_Classifier
项目使用Python脚本和梯度提升分类器,预测来自量子设备的随机二进制数据的来源,超越了基线预测准确率。
Capgemini // Quantinuum // The Hartford Prize Winners
-
Skittlez
该合作项目通过跨学科的专业知识解决量子计算挑战,设计创新的量子解决方案。 -
Honorable Mention: BB24 - Yale Quantum Monte Carlo 项目通过新的采样和编码方案增强了量子蒙特卡洛技术,提高了并行处理和计算效率。
SandboxAQ Prize Winners
-
QuantumQuails
项目通过量子化学改善了太阳能电池效率,利用变分量子本征求解器(VQE)建模太阳能吸收,以提高转换效果。 -
Honorable Mention: mRNA Sequence Design via Quantum Approximate Optimization Algorithm 项目通过QAOA优化了mRNA序列设计,利用密码子和核苷酸参数提高了蛋白质表达和结构稳定性。
在DoraHacks探索所有项目。
关于组织者:
YQuantum
YQuantum在技术和区块链领域中是一家知名实体,以其创新方法和战略举措而著称。YQuantum专注于利用量子计算能力,致力于推进技术前沿。虽然未具体列出项目,但YQuantum在塑造行业标准方面的作用,使其成为该领域的领导者。通过对尖端研究和开发的奉献,YQuantum继续推动量子技术的进步,致力于实现其促进全球科学和技术进步的使命。
-
-
@ fd06f542:8d6d54cd
2025-01-10 01:20:02一直听说有个 nip50,但是没有太明白怎么用,今天测试了一下。明白了。 https://nos.today/search?q=client
wss://relay.noswhere.com/ wss://search.nos.today/ wss://relay.nostr.band/
支持搜索, 搜索事件:
{"kinds":[1],"search":"client","limit":100}
测试代码: `import {WebSocket} from "ws" const relayUrl = 'wss://relay.nostr.band';
function sub(url,filter){ const relay = new WebSocket(url);
relay.onopen = () => { console.log('Connected to bootstrap relay'); // 查询中继列表 const query = ['REQ', 'subscription-id', filter]; relay.send(JSON.stringify(query)); };
relay.onmessage = (event) => { const data = JSON.parse(event.data); if (data[0] === 'EVENT' ) { const relayList = data[2].tags; console.log('Discovered relay list:', data[2].pubkey,relayList,data[2].content); // 连接到用户的中继 try{ relayList.forEach(([_, relayUrl]) => { const newRelay = new WebSocket(relayUrl); newRelay.onopen = () => { console.log(
Connected to relay: ${relayUrl}
); }; }); } catch {}} };
} sub(relayUrl,{"kinds":[1],"search":"client","limit":100}) `
轻轻松松就出结果了。
-
@ c11cf5f8:4928464d
2025-01-10 08:55:48Today I stumbled into these platforms WLW.de and EuroPages.co.uk, two portals from the same group: Visable.com
I found here some interesting new clients, and am working on bringing those business into our bitcoin journey. It will take time, and yes, they are still fiat maxis, but just because they don't know any better! @globalmerchant came to my mind and all the B2B conversations had here on SN.
I hope these two portals would bring you more business, as they are doing for us. But also hope that we'll find here other businesses interested in accepting and trading in a bitcoin standard.
The main goal of this topic was to discover similar websites. Do any of us here know any other trusted platform? Which region is covering, and how do you get to know it?
Thanks for sharing!
originally posted at https://stacker.news/items/844602
-
@ 4ddeb0cf:94524453
2025-01-10 01:10:17He'd fallen into a deep sleep when he felt something jolt his shoulder. "Richie, honey, you have to wake up. My boss will show up any minute and can't find you in here." Struggling to gain consciousness, he slowly peeled his eyes open and found the clock he'd remembered seeing when he lay down in a room behind the receptionist's office of Roosevelt Lodge. The kid could barely remember arriving, but fighting to stay awake after navigating the switchbacks down the western slope, he'd driven that drunkard and his truck as far as he could. He jumped out and hurried toward the light of the rustic building without knowing what to say to the maniac who'd offered him a ride from that Billings truck stop. Thank God she'd opened the door. It had been freezing when he knocked shortly after midnight. It appeared to be almost five in the morning. "I'm sorry honey, I know it's early, but I need this job, and he will not be happy if he sees you. You can use the trailhead to the north. It will get you to the closest highway, and you can maybe find a ride there. I would take you myself, but Okie likes me to stick around in the morning."
"Thank you, Ma'am. I really appreciate everything," the young man said, hurriedly putting on his Converse All-Stars. The two exchanged goodbyes as the lady went back to setting up. On his way out of the lodge's rear exit, he noticed a pack of Lucky Strikes sitting on a coffee table beside a copy of LIFE Magazine.
When Richie was eleven, he'd first had a cigarette on a dare from his little sister. They'd found a pack in their parent's room while playing hide and seek. After taking one and running outside with a matchbook, Sarah challenged him to smoke it. He remembered the first drag. While it was harsh, he'd watched his uncle smoke for years and once heard him sharing advice during a card game to inhale very softly at first until you got the hang of it. Uncle Joe had never meant for the lesson to ignite the habit in his nephew but had been too far gone into his bottle of Seagram's 7 to notice him listening.
Through the next few years, Richie became very smooth in taking a pack every few days from the drug store his grandfather had once owned. He'd be cautious to grab them after a larger crowd rolled through the store. The owner, an old friend of his now departed Grandpa, never noticed, and Richie would always leave the payment for them in the cash register.
The memory faded, and the reality of a Montana trailhead before sunrise refocused his concentration. Richie noticed only three cigarettes in the pack, reaching into his pocket to grab the loose change from the gas station incident. There were seven matches to work with. While he struggled to wake up, this find gave him a burst of excitement, and a smile came over his face. He dropped two nickels on the coffee stand and took the remaining pack.
Upon arriving at the trailhead, Richie buttoned his jacket in the chill morning air. It was near pitch black outside, with just enough moonlight to make out the pathway through the forest. He felt scared walking along, yet an air of confidence due to making it this far kept his steps moving forward. Richie began to wonder how far he'd walked when the rising sun put enough illumination through the treeline to make out the opening to a small parking lot adjoining a road. The morning was silent, and he began to yawn. The minimal sleep began to remind him of his exhaustion. The lady from the lodge, what was her name? She'd been so kind when he showed up in the middle of the night, still soaking wet from the melted ice picked up from the passage through the Rockies. As the events began to replay the prior evening's treacherous journey, Richie reached into his pocket to grab a smoke. He imagined his mother's gaze as he successfully ignited the first match and lit the tobacco. The moment was empowering. What were the other kids back in Ohio doing this morning? Though he couldn't ignore the dangerous risks he'd taken along the way, Richie Buckland felt genuine freedom for the first time in his life.
He sat down on a rock to enjoy his smoke and await an oncoming vehicle. Birds began to awaken, and their singing disrupted the silence in the air. His heart filled with gratitude for having dry clothes and a full canteen as he recognized how in sync he felt with the surrounding nature of Yellowstone National Park. That nice lady had even thrown a few Atomic Fireball candies in his knapsack. He still had the twenty dollars his Mom insisted he take with him, having no idea he'd intended to hitchhike to California. She'd known the entire family needed a breather after Richie's fight with his father that night. He thought about his last-second decision to punch the wall beside his father's head instead of hitting his face. That moment had been on his mind throughout this entire journey. Determined to get one last cigarette hit before giving his fingers a break from the closing heat, the birds suddenly began chirping more assertively and in greater numbers. It became alarmingly loud, then silent. As Richie started to reach toward the ground to put out the cigarette, he saw a shape emerge to the right. About twenty feet away, exiting the forest on the same side of the road, was what appeared to be a bear cub. As he took in the sight, another cub followed. Both were brown, and immediately behind them was the largest animal he'd ever seen. His parents had once taken the family to the zoo, but he'd not remembered anything like this. He sat in awe of the creature, followed by a third cub. As they began to cross the road, the large Grizzly paused and turned to look directly at him. Richie was determined to resist the instinctive surge of fear, but his body wouldn't have moved had he tried. Everything felt frozen as the gaze of the enormous animal seemed to determine Richie wasn't a threat. He didn't stare into the bear's eyes but didn't look away. After a few moments, the bears continued along their path until they were out of sight for a long time.
The sunrise of the new morning was breathtaking. After remaining seated on the rock for some time after the incident with the bears, Richie stood up. Taking a healthy drink of water from the canteen, he heard the shifting of gears in the distance. There was no need to look at the map; anywhere the next driver was heading worked. There was no way to know if Mama Grizzly would reevaluate what a human tasted like for breakfast. Richie couldn't wait to reach Sacramento and find Uncle Joe. The approaching Chevy Impala began to slow down upon seeing the teenager standing up, thumb extended.
-
@ df478568:2a951e67
2025-01-10 01:04:32Note. I plan on publishing this on SubStack, but I will publish to nostr first.
Hello SubStack!
My government name is Marc. I write a blog about freedom tech on nostr. You can find this blog at npub.npub.pro. but I decided to cross post this blog on Substack because more people use Substack then habla.news. Here's a little more about the blog.
A Free And Open Source Blog
This blog is written using the Creative Commons 0 license. Since I write about free and open source software I call freedom tech. I thought it would be silly to keep my writing behind a paywall. I would rather my prose be available for free for all. This means all of my work is available for free, but to be honest, I like the subscription model. If SubStack gave me an option to charge sats, I would use their subscription service. Since they don't, I set up an account with Flash using Alby Hub.
Ads Suck, But Product Reviews Can Help Bootstrap The Circular Economy
Ads suck as much as paywalls, but I also wish to monetize this. Therefore, I have decided to try Jack Spirko's Membership Brigade model I learned about on The Side Hustle Show. I already was a member when I listened to this episode, bur the basic idea is ro charge $5.00 a month. For this price, Jack saves his listeners money by procuring discounts for products and services he uses and work great for him. He basically gives product reviews for his advertisers and his membership brigade receives discounts for those products and services. Since I'm just starting out, I don't have any discounts to offer yet, but I have some ideas. I also recommend free and open-source software that can save you money because it's free.
These are not ads. They are more like consumer reviews. There is a bitcoin circular economy developing on nostr. I want to recomend great products from this circular economy like LeatherMint's belts. They're not cheap, but very high quality. He hand crafts these belts to a size customized to yoir wasteline. He's from Canada and he sells these high quality belts for sats.
That was not an ad. It's my honest opinion. LeatherMint did not pay me to say this, but I wouldn't mind if he did. I give my recommendations to the Marc's Mention Members. The goal is to provide value by saving you sats. It's still a work in progress.
Shop Marc's Merch
I also created a merch shop on shopstr.store. This is nostr-powered shopping, an online mall that uses the native currency of the Internet. This is a quintessential example of freedom tech. I don't have too many products, but my goal is to add more. I'm working on personalized coffee mugs, but I don't yet have a minimally viable product. Until then, I'll sell other stuff. I also must test it some more before I start taking real money. :)
Thanks for reading.
-
@ 4ddeb0cf:94524453
2025-01-10 01:00:15He'd fallen into a deep sleep when he felt something jolt his shoulder. "Richie, honey, you have to wake up. My boss will show up any minute and can't find you in here." Struggling to gain consciousness, he slowly peeled his eyes open and found the clock he'd remembered seeing when he lay down in a room behind the receptionist's office of Roosevelt Lodge. The kid could barely remember arriving, but fighting to stay awake after navigating the switchbacks down the western slope, he'd driven that drunkard and his truck as far as he could. He jumped out and hurried toward the light of the rustic building without knowing what to say to the maniac who'd offered him a ride from that Billings diner. Thank God she'd opened the door. It had been freezing when he knocked shortly after midnight. It appeared to be almost five in the morning. "I'm sorry honey, I know it's early, but I need this job, and he will not be happy if he sees you. You can use the trailhead to the north. It will get you to the closest highway, and you can maybe find a ride there. I would take you myself, but Okie likes me to stick around in the morning."
"Thank you, Ma'am. I really appreciate everything," the young man said, hurriedly putting on his Converse All-Stars. The two exchanged goodbyes as the lady went back to setting up. On his way out of the lodge's rear exit, he noticed a pack of Lucky Strikes sitting on a coffee table beside a copy of LIFE Magazine.
When Richie was eleven, he'd first had a cigarette on a dare from his little sister. They'd found a pack in their parent's room while playing hide and seek. After taking one and running outside with a matchbook, Sarah challenged him to smoke it. He remembered the first drag. While it was harsh, he'd watched his uncle smoke for years and once heard him sharing advice during a card game to inhale very softly at first until you got the hang of it. Uncle Joe had never meant for the lesson to ignite the habit in his nephew but had been too far gone into his bottle of Seagram's 7 to notice him listening.
Through the next few years, Richie became very smooth in taking a pack every few days from the drug store his grandfather had once owned. He'd be cautious to grab them after a larger crowd rolled through the store. The owner, an old friend of his now departed Grandpa, never noticed, and Richie would always leave the payment for them in the cash register.
The memory faded, and the reality of a Montana trailhead before sunrise refocused his concentration. Richie noticed only three cigarettes in the pack, reaching into his pocket to grab the loose change from the gas station incident. There were seven matches to work with. While he struggled to wake up, this find gave him a burst of excitement, and a smile came over his face. He dropped two nickels on the coffee stand and took the remaining pack.
Upon arriving at the trailhead, Richie buttoned his jacket in the chill morning air. It was near pitch black outside, with just enough moonlight to make out the pathway through the forest. He felt scared walking along, yet an air of confidence due to making it this far kept his steps moving forward. Richie began to wonder how far he'd walked when the rising sun put enough illumination through the treeline to make out the opening to a small parking lot adjoining a road. The morning was silent, and he began to yawn. The minimal sleep began to remind him of his exhaustion. The lady from the lodge, what was her name? She'd been so kind when he showed up in the middle of the night, still soaking wet from the melted ice picked up from the passage through the Rockies. As the events began to replay the prior evening's treacherous journey, Richie reached into his pocket to grab a smoke. He imagined his mother's gaze as he successfully ignited the first match and lit the tobacco. The moment was empowering. What were the other kids back in Ohio doing this morning? Though he couldn't ignore the dangerous risks he'd taken along the way, Richie Buckland felt genuine freedom for the first time in his life.
He sat down on a rock to enjoy his smoke and await an oncoming vehicle. Birds began to awaken, and their singing disrupted the silence in the air. His heart filled with gratitude for having dry clothes and a full canteen as he recognized how in sync he felt with the surrounding nature of Yellowstone National Park. That nice lady had even thrown a few Atomic Fireball candies in his knapsack. He still had the twenty dollars his Mom insisted he take with him, having no idea he'd intended to hitchhike to California. She'd known the entire family needed a breather after Richie's fight with his father that night. He thought about his last-second decision to punch the wall beside his father's head instead of hitting his face. That moment had been on his mind throughout this entire journey. Determined to get one last cigarette hit before giving his fingers a break from the closing heat, the birds suddenly began chirping more assertively and in greater numbers. It became alarmingly loud, then silent. As Richie started to reach toward the ground to put out the cigarette, he saw a shape emerge to the right. About twenty feet away, exiting the forest on the same side of the road, was what appeared to be a bear cub. As he took in the sight, another cub followed. Both were brown, and immediately behind them was the largest animal he'd ever seen. His parents had once taken the family to the zoo, but he'd not remembered anything like this. He sat in awe of the creature, followed by a third cub. As they began to cross the road, the large Grizzly paused and turned to look directly at him. Richie was determined to resist the instinctive surge of fear, but his body wouldn't have moved had he tried. Everything felt frozen as the gaze of the enormous animal seemed to determine Richie wasn't a threat. He didn't stare into the bear's eyes but didn't look away. After a few moments, the bears continued along their path until they were out of sight for a long time.
The sunrise of the new morning was breathtaking. After remaining seated on the rock for some time after the incident with the bears, Richie stood up. Taking a healthy drink of water from the canteen, he heard the shifting of gears in the distance. There was no need to look at the map; anywhere the next driver was heading worked. There was no way to know if Mama Grizzly would reevaluate what a human tasted like for breakfast. Richie couldn't wait to reach Sacramento and find Uncle Joe. The approaching Chevy Impala began to slow down upon seeing the teenager standing up, thumb extended.
-
@ ae6ce958:d0f02c7d
2025-01-10 00:29:00In a strategic move to enhance accessibility and expand its reach, DamageBDD is proud to announce the listing of Damage Token (DAMAGE) on Coinstore, a leading centralized exchange (CEX). This step marks a significant milestone in our journey to provide seamless utility for our users while solidifying DamageBDD’s presence in the blockchain and verification ecosystem.
Why a Centralized Exchange (CEX)?
While DamageBDD has always championed decentralization and Bitcoin-first principles, we recognize the importance of meeting users where they are. Centralized exchanges play a pivotal role in the adoption curve by offering ease of use, robust liquidity, and a familiar interface for new and seasoned crypto enthusiasts alike. By listing on a CEX, DamageBDD lowers the entry barrier for users interested in leveraging Damage Token’s unique value proposition.
Why Coinstore?
The choice of Coinstore is intentional. Known for its user-friendly platform, broad global reach, and active engagement in emerging blockchain technologies, Coinstore aligns with DamageBDD’s vision of democratizing access to verification tools. Coinstore provides:
-
Wide User Base: Its growing community of traders ensures ample liquidity and market activity for Damage Token.
-
Security and Transparency: Coinstore's commitment to security mirrors our own principles of integrity and resilience.
-
Global Reach: With its focus on emerging markets, Coinstore allows DamageBDD to engage with a diverse and vibrant audience, including developers, investors, and enterprises who can benefit from DamageBDD’s verification features.
Utility Meets Accessibility
Listing on Coinstore is not about speculation but utility. Damage Token’s integration into the exchange allows developers, engineering managers, and organizations to acquire tokens effortlessly, unlocking the potential of DamageBDD for behavior-driven development (BDD) and milestone verification. This step enables smoother participation in our ecosystem while ensuring users can utilize Damage Tokens for real-world applications.
Bridging Fiat and Satoshis
Our strategy remains firmly rooted in bridging the fiat world with Bitcoin principles. By making Damage Token available on Coinstore, we provide a pathway for fiat-based users to access DamageBDD while continuing to uphold our Bitcoin-first ethos. This integration will help facilitate broader adoption, bringing the revolutionary capabilities of DamageBDD to a wider audience.
A Future of Greater Utility
This listing is just the beginning. DamageBDD is committed to continuously innovating and creating use cases that empower individuals and organizations. Whether through verifying software quality, enabling milestone-based payouts, or fostering a culture of accountability, Damage Token will remain a tool of pure utility in our collective pursuit of excellence.
The journey of DamageBDD is far from over, and we invite you to join us as we take this bold step forward. Together, let’s redefine the boundaries of development and verification, one token at a time.
Stay tuned for the official listing date and trading details on Coinstore.
-
-
@ bd4ae3e6:1dfb81f5
2025-01-09 21:44:14abstract
i'm writing this post to explain its title without me explaining it every time i talk about nostr or bitcoin and say im studying/working on them, and people immediately ask me about crypto. this would be helpful to clarify this for those overwhelmed with information from crypto projects advertising themselves as a decentralized system.
note: this post is not about financial markets and this stuff at all!
note 2: this post is not technical. i wrote it to make my life easier, and it may also make yours.
what happened?
around 16 years ago a cypherpunk called satoshi nakamoto published a standard called bitcoin: a peer-to-peer electronic cash system. the purpose was to define a decentralized cash system in simple terms. he used a data structure called blockchain that links some blocks of data containing changes in the balance state in the current block and adds a new one to it every 10 minutes.
later some guys started creating copies of bitcoin called altcoins such as ethereum or litecoin and more. over time the word
decentralized
became a fancy word and they were able to earn a lot of money using it. so, more people did it.current state
these altocins have become more famous and more people are familiar with them. now here are some points that make all of these projects different from bitcoin:
-
bitcoin network has a lot of nodes running and validating network and checking transactions with a huge hash rate. anyone can join this network without any permissions. on the other hand, most crypto projects need a high-spec device and tokens to stake (since most of them are proof-of-stake or something similar) and there are a lot more tokens on hand of specific people so they can have more shares on voting. (since bitcoin is proof-of-work you won't need coins to have the right to vote)
-
decentralization is not only in a network of nodes. a decentralized system has no one in charge to check its security. when we run a bitcoin core node, there is some code running and this code will take actions which are our votes. bitcoin-core code is one of the most reviewed code bases and a lot of people will observe and review its changes. on the other hand, you can simply check all crypto projects and you can see how their code base is managed. you can see lots of changes are applied by a small group of people without any review.
-
there is a lot of pre-mined/minted coins controlled by teams, early users, vcs, and more in crypto projects. most of them can be mined or minted to infinity. which makes your coins lose their value over time since there is more of it out there, the same as fiat currency. but bitcoin is simple and fair: do work, get the reward. and coins are limited to 21 million. nobody doesn't have printed coins.
-
all crypto projects have a not anonymous team who are out there and the government has access to them. when this team or related people to it publish unexpected stuff on social, get arrested or anything like that, it will impact the whole ecosystem the things you hold which called coins. on the other hand the first guys behind bitcoin are gone now and we don't know him at all. and we don't have anything called bitcoin foundation officially. all of the people working on bitcoin are plebs such as me and you. so, there is now a central point of failure. for a better example search for the story of pavel durove and what happened to his project called
the open network
when france government arrested him.
so, they are not
blockchains
? you may think anything referred to as a p2p network or a blockchain is decentralized. this is not true. in simple terms, a blockchain is a data structure that we can use to store and maintain data using it. a decentralized system is something that no one can control it directly or censor it. for example bitcoin is a decentralized blockchain (and the only one), but nostr is a decentralized protocol that is not a blockchain, or hyperledger fabric based projects are blockchain, but they are not decentralized.answer to you possible questions:
- q. bitcoin is slow and requires high fees, what should we do?
-
a: lighting is a layer-2 off-chin solution that help us to make zero-fee transactions with the speed of lightning.
note: lighting is not another blockchain or token, it's bitcoin itself.
-
q: there are no smart contracts on bitcoin, what should we do?
- a: to be honest we don't need them. 99% percent of smart contracts are solving issues made by themselves and they don't fix any real issues. they are just super fancy. most of the real use cases they claim they can have are not implemented and don't work. and the rest is possible with nostr, really decentralized, and it's working.
then what is nostr?
nostr is a protocol. it's a set of rules which defined for communication between servers and apps on the web, mobile, or desktop. developers can write software that follows these rules to create social media and more. the resulting app is not a platform or something like that. for example x, meta, bluesky, and more. you control your client and you have the right to connect to any server managed by different people even yourself. and non of the actors in this system won't need permission for this. this is something like http. you can see a lot of websites accessible using http protocol and you can access them using different browsers. the website knows how to return stuff when someone calls them using
http://....
and your browser knows how to show this stuff to you. the website you or the owner don't need to ask for permissions from something called http platform. this is just a way to and the website can talk to each other.conclusion
crypto is not the same as bitcoin. nostr is not a blockchain. any blockchain is not decentralized and any decentralized thing is not a blockchain.
this article is draft-1. if you have any ideas for improvement, please tell me or add comments. but consider that i try my best to keep this short, simple, without technical words, and clear.
-
-
@ dd664d5e:5633d319
2025-01-09 21:39:15Instructions
- Place 2 medium-sized, boiled potatoes and a handful of sliced leeks in a pot.
- Fill the pot with water or vegetable broth, to cover the potatoes twice over.
- Add a splash of white wine, if you like, and some bouillon powder, if you went with water instead of broth.
- Bring the soup to a boil and then simmer for 15 minutes.
- Puree the soup, in the pot, with a hand mixer. It shouldn't be completely smooth, when you're done, but rather have small bits and pieces of the veggies floating around.
- Bring the soup to a boil, again, and stir in one container (200-250 mL) of heavy cream.
- Thicken the soup, as needed, and then simmer for 5 more minutes.
- Garnish with croutons and veggies (here I used sliced green onions and radishes) and serve.
Guten Appetit!
- Place 2 medium-sized, boiled potatoes and a handful of sliced leeks in a pot.
-
@ b4d9d1f3:8f3dda8c
2025-01-10 01:09:59Government elites have imposed a paradigm upon us—a challenge we must fight against. They dictate how we trade, with whom we trade, how we speak, what we can talk about, what we can publish, and what we can do. The only solution is decentralized anarchy. I say this clearly: it is the only solution to mass extinction.
How can we achieve this? By decentralizing the government, the economy, and the laws.
With current technology, we can vote in a decentralized manner on what we want and what we don't want. There could be cypherpunk societies, leftist societies, right-wing societies. This is the only solution: ideological states rather than racial states.
Each parallel society could agree to relocate to a country aligned with their ideology and, from there, vote for the type of nation they desire. Countries will no longer be defined by race but by ideology.
-
@ 3ad01248:962d8a07
2025-01-09 20:15:32I hope everyone had a great Christmas and a happy start to the new year. Are you ready to achieve your goals this year? Put the peddle to the metal? I know I am! This year I am dedicating myself to eating healthier, working out more, losing some weight and more importantly devoting more time to writing and getting my thoughts out into the wider world. So here we go.
Well 2025 has gotten off to a crazy start hasn't it? A terrorist attack in New Orleans, the "incident " in Las Vegas and now Los Angeles is burning down to the ground. What in the Sam hill is going on right now? I had a gut feeling that something like this would happen the moment Trump was elected.
If you want to call me a conspiracy theorist go ahead but deep down you know that you feel the same way too. The Democrats or the monied powers behind the curtains do not like the MAGA agenda and will stop at nothing to stop this movement from accomplishing any of its stated goals. What better way to do that than stir up trouble before Trump is even sworn into office again.
The Trump administration and congress are going to be so caught up bouncing from one crisis to another for the next year that its going to fatigue policymakers enough where they can't focus on passing anything of substance. If you understand how congress works they really only have about a year to get anything done. Next year there will be mid-term elections so nothing will get done because they will worrying about being re-elected.
In reality 2025 is the only time Trump has to get his agenda passed. If you remember his first time in office he wasn't particularly good at managing congress and getting them to work with him to fulfill his campaign promise. Do you think he has gotten any better in the last 4 years? Probably not. I could see maybe getting some kind of tax law passed and some kind of border security bill but that about it. Sorry to say but here is what is going to be left on the cutting room floor of his agenda:
- Border Wall
- Deportation of illegal immigrants
- Bitcoin Strategic Reserve
- Reduction of national debt
- No involvement in foreign wars
Sure Republicans have a majority in congress but it is so incredibly small that it is pretty much rendered ineffective. Republicans can only afford to lose 2-3 votes on any legislation that they want to pass. Good luck getting everyone to agree and row in the same direction for the good of the "team".
Most of congress is filled with self-serving egotistical millionaires who don't know how to work together as a team. They didn't get to positions of power by playing well with others. The clawed on the backs of others with good intentions to rise to power. At the end of the day, politicians look out for themselves and will vote their own self-interest. Constituents be damned.
This is why I think some kind of tax reform bill will pass because it benefits them financially and watered down border security bill with no border wall component because it will placate the base and help them get reelected. All the other issues they Republicans could give two shits about.
Republican business interest benefits from illegal immigration. Republican don't give shit about Bitcoin because it takes the power of the printing press away from them. Republicans don't care about the national debt because they believe in fiat Keynesian economics. They don't see the debt as a problem. Republicans love war because if funds the military industrial complex.
What Does This Mean For America?
The next four years are probably going to look like a re-run of 2016-2020. There will be tons of congressional deadlock over any bill of consequence followed by periodic mini crisis's over the debt ceiling.
Inflation will continue to run red hot over the next four years because the main drivers of inflation is not the out of control consumer, its the government and its profligate spending. Lyn Alden has written a fantastic piece about it recently, I highly suggest you give it a read.
The Ukraine war will still be funded maybe not to the level that it has been but Trump isn't going to cut them off completely. America's military industrial complex will still be all over the middle east ready to pounce on Iran if Israel takes the first shot.
At the end of the day we as Americans don't have the power to really influence anything on the macro level. We do have power on the micro or personal level. It's through our individual action that things will change over time.
The best thing that you can do for you and your family is to invest in hard assets. Bitcoin is preferable but if you have family that is not ready to go down that route, property/land and gold are good things to own. In an economic environment like this owning bearer assets is a must.
The global economy is living on borrowed to time to be honest. It's not a matter of if the global economy is going to collapse its a matter of when will it happen. History has shown that all fiat currencies collapse at some point because of human nature. Governments get drunk on the power of creating money out of nothing and forget the only way to have a truly sustainable form of money is something that is backed by something that is hard to produce.
This is a lesson that man has failed to learn time and time again. Hopefully we learn this time and the world finally decides to leave the mirage of fiat currency in the dustbin of history where it belongs.
Bitcoin #Nostr
-
@ 6bae33c8:607272e8
2025-01-09 19:58:42I was putting off writing this article because I knew the result would be bad. Real man probably doesn’t write it at all, just skips town and never posts again. But being the nutless monkey I am, I will hold my nose and revisit the bold predictions from last August. And remember, the worst your record, the bolder they were. They were really bad last year too, I just discovered.
1. Stefon Diggs leads the Texans in targets, catches and receiving yards
Right now, he’s getting drafted more than a round behind Nico Collins and less than a round ahead of Tank Dell. Diggs is 30, but he was one of the league’s best receivers until halfway through last year when the Bills made an offensive play-calling change. Moreover, Diggs is getting paid $22.5 million, so the Texans obviously don’t think he’s washed up, and he’s also in a contract year.
Verdict: False. Had he stayed healthy he would have, but that was only because Nico Collins had gotten hurt first. (0-1)
2. CJ Stroud leads the NFL in passing yards
This is +600 on DraftKings, so the real odds are probably north of 8:1. Stroud adds Diggs to his receiving corps, doesn’t run much and heads into Year 2.
Verdict: False. It looked good with Diggs, Collins and Tank Dell, but the first two got hurt, Dell was a bust, and the offensive line was horrible. Plus Stroud himself regressed. (0-2)
3. Roman Wilson (ADP 211) has more receptions than George Pickens (ADP 47)
Pickens is a boom or bust downfield playmaker, not high-target alpha, and Wilson is a good fit for the slot for the Steelers new QBs. Think Martavis Bryant not Antonio Brown. (Not that Wilson is Brown!) Van Jefferson isn’t good, and someone will need to fill the void. Moreover, because Pittsburgh has new QBs, neither has an existing rapport with the incumbent Pickens.
Verdict: LOL. I was right about Pickens and the Steelers WRs, but Wilson never even played. (0-3)
4. DeAndre Hopkins (ADP 82) out produces Calvin Ridley (ADP 54) in PPR
Hopkins wasn’t terrible last year, has a rapport with Will Levis and is a future Hall of Famer who can still run routes. Ridley is already 29 and is just a guy outside of his monster season in 2020.
Verdict: False. Ridley smoked him, and Hopkins was eventually traded. (0-4)
5. The Giants will field a top-10 fantasy defense.
I’ve been crushed by my homer bold predictions in the past, but they added Brian Burns to a rush that already had Dexter Lawrence and Kayvon Thibodeaux, the offense should be on the field more and generate some leads with a real playmaking receiver in Malik Nabers.
Verdict: False. They started out strong, but it’s very hard to be a good fantasy defense on a three-win team, and they finished 24th. (0-5).
6. One of the following Year 2 receivers will finish in the top-15 PPR: Jaxon Smith-Njigba, Jayden Reed, Jordan Addison, Dontayvion Wicks, Michael Wilson, Josh Downs, Andrei Iosivas, Quentin Johnston, Marvin Mims, Jalin Hyatt
I make this prediction every year, and it often pans out as Year 2 is when receivers typically make the leap. I left out Tank Dell because he’s now got a fifth-round ADP, as well as the obvious ones: Zay Flowers, Rashee Rice and Puka Nacua.
Verdict: True. Jaxon Smith-Njigba finished 11th. (1-5)
7. Rome Odunze (ADP 77) will outproduce Xavier Worthy (ADP 59)
Both receivers enter crowded situations, and while Worthy’s is far better, he’s also got essentially the same skill-set as teammate Marquise Brown. Moreover, Andy Reid rarely entrusts rookies with large roles, especially early on. Odunze is 6-3, 215 and has the pedigree of a true NFL alpha, while Worthy weighs only 165 pounds at 5-11. Finally, Patrick Mahomes already has an established rapport with both Travis Kelce and Rashee Rice, while Odunze gets a more open competition with the Bears veteran WRs, given all three will play with Caleb Williams for the first time.
Verdict: False. It was reasonably close, but Worthy pulled ahead late in the year (1-6)
8. Dalvin Cook will lead the Cowboys in rushing yards
Cook is 29 and looked beyond “cooked” last year on the Jets, but his 3.3 YPC was on a small sample (67 carries), and prior to that, he’d been very good for the Vikings. At the very least he should have fresh legs, and he’d only need to beat out the ancient Ezekiel Elliott and Rico Dowdle. (Of course, Cook would have to be promoted from the practice squad first, so I really should hedge and make the prediction “neither Elliott, nor Dowdle will lead the Cowboys in rushing yards,” but I’ll push it and say it’s Cook.)
Verdict: LOL. Cook was the one veteran back from the Class of 2017 who really was washed up. (1-7)
9. Jonathan Taylor (ADP12 ) will lead the NFL in rushing yards.
He’s got little competition in the Indy backfield and a running QB who should open lanes for him. Draft Kings has him at +600, so his real odds are probably about 10:1, but I’d take him over the favored Christian McCaffrey (age/mileage) and all the other backs who are more hybrid types or old (Derrick Henry.)
Verdict: False. He finished fourth despite missing three full games, so this wasn’t too far off. What’s funny is I make this prediction of Barkley virtually every year except this one. (1-8)
10. Dalton Kincaid (TE4) will lead all TE in catches
I guess this is a chalky pick because he and Kelce are both favored at the position at +3000, while Evan Engram is +5000! (I’d way rather bet on Engram at those odds.) But straight up, I’m going with Kincaid who is likely Josh Allen’s de facto No. 1 target with Diggs gone. In his final 11 regular season games Kincaid had 56 catches which prorates to 87 catches over the full year. And rookie tight ends rarely do anything and often make a leap in Year 2. (1-9)
Verdict: LOL. Kincaid was one of the biggest busts in the draft. (1-9)
11. Some of these predictions will be wrong
No one’s perfect, but you never want to get shut out.
Verdict: Crushed, especially the comment the prescience of which makes Nostradamus look like the corner astrologer. (2-9)
-
@ 5002cb48:31a0d6d8
2025-01-09 19:37:47I am trying to update my profile, but it's not happening. Is the site broken?
-
@ 60d9f6d8:bc336770
2025-01-09 17:49:18My focus is predominantly on whether I could eliminate traditional banking accounts (e.g. BofA / JPM Chase etc) with the added benefit of stacking sats automatically on a day-to-day basis.
- The first part is very simple: register via foldapp.com and wait for your card to arrive. I chose the Fold+ membership at 100 per year if paid annually, otherwise 10/month. The trial period is 3 months before you are charged.
- Upon receiving the card, activate via the app (very simple click of a button and confirmation of card digits).
# Fold+ Membership costs & benefits
Linking/Funding from banking institutions
- On average, it is taking around 3 business days to make those funds available on Fold.
- There is an option to add "Instant Debit Card Funding" at a 1.5% charge; however, keep in mind that you are currently limited to adding a maximum of 2 cards.
Paying Bills
- In most cases I simply add the account & routing number to the billing company website (i.e. credit card / utilities / phone etc). In some cases, I can simply add my debit card number.
- Additionally, as a Fold+ user, any payment I make earns back rewards in sats.
Bill Pay ACH Rewards
Bitcoin (buying / sending / receiving) features
- Fold gives you many options to buy, send & receive bitcoin either automatically, via transfer or direct deposit with the ability to choose a certain percentage towards fiat or Bitcoin.
- Ability to Round-Up purchases with various multipliers.
- Push to Card: this feature effectively allows you to replenish your fiat/cash balance in your account. This does not happen automatically, so you will need to do this manually.
Authorized Users
- Fold allows you to authorize up to 3 users (must be at least 18 years old)
- This user will receive their own debit card.
- The user can also direct deposit into the account.
Note: at this time, authorized users do not have access to the app itself, which is only available to the primary account holder. This creates some friction given the authorized user cannot move funds if needed or even determine the balance on the account without interacting or communicating with the primary account holder.
Limits (as of Sept 2024)
Note: the limits only refer to your fiat balance, not a combination of your fiat & bitcoin/rewards balance.
Final Thoughts
I have been using Fold for about a month now and it is working very well. I haven't had any issues paying bills, making deposits (direct or otherwise), making purchases, buying bitcoin and/or earning rewards in general. The customer support has been really positive in responding to my inquiries within a few hours. Mostly, those inquiries have been around information I simply could not find via the foldapp or blog websites.
As of now, my intent is to continue utilizing this card/application and wean myself away from traditional banks entirely. However, there are a couple of pain points I'll point out that hopefully will be addressed in the future:
- The limits need to increase, especially if you intend on using this with your spouse/family members.
- The authorized user(s) should have the ability to log into the app and allow the primary holder to dictate the permissions for said user(s). Likewise, it might be useful to allow joint holders to have separate accounts within one view.
- Increase the 2-card limit for "Instant Debit Funding".
- Ability to search in the "gift card" section instead of scrolling through.
- Ability to send via Zelle as I still, unfortunately, need to send payments to those who are unable/unwilling to use something else.
- Ability to automatically Push to Card if funds are low.
There are of course many benefits of the Fold card I have glossed over as it relates to rewards, so I'll just mention a few here:
- Daily Spin allows you to addictively hope for the grand prize of 1 BTC. While the odds are extraordinarily low, at a minimum you'll earn some sats with each spin.
- Gift cards rewards are very impressive and highly recommend you use those to earn free sats.
As of now, I've earned around 30k sats this month by doing nothing different financially outside of my normal spending habits, so this of course is a major advantage.
Lastly, if you have any feedback or questions please ask and I'll try my best to answer and if you want to give it a try, here is a referral link that'll get you 20k sats: https://use.foldapp.com/r/WAANYUMJ
Blog | Fold Bitcoin Rewards App
Disclaimer: I have no affiliation or sponsorship with Fold. I'm just a normie looking to get closer to a Bitcoin standard without too much disruption.
-
@ 04ed2b8f:75be6756
2025-01-09 23:16:52Success and self-discovery rarely follow a straight line. The most meaningful journeys often begin with uncertainty, detours, and moments where you feel completely lost. But getting lost isn’t failure—it’s a gateway to discovery, growth, and transformation.
The Value of Getting Lost
Being lost is not the end of the road but the start of something profound.
- Breaking Free from Routine: Straying from the familiar forces you to explore new horizons and challenge your comfort zone.
- Resilience and Adaptability: Navigating uncertainty strengthens your problem-solving skills and builds the confidence to face challenges head-on.
- Uncovering Hidden Gems: Whether it’s a career, a passion, or a place, the unexpected paths often lead to the most rewarding experiences.Why Getting Lost Fuels Growth
Some of life’s most transformative lessons are found when you wander off the beaten path.
1. Self-Discovery: Exploring the unknown pushes you to reflect on your values, instincts, and aspirations, revealing your true self.
2. Creative Breakthroughs: Innovation often stems from unconventional thinking and stepping into uncharted territory.
3. Letting Go of Control: Learning to embrace uncertainty helps you trust the journey and find joy in the process.Lessons Found in Detours
The road less traveled often teaches lessons that rigid plans cannot.
- Patience and Perseverance: Feeling lost challenges you to stay focused and persistent, even without a clear destination.
- Flexibility and Open-Mindedness: Detours teach you to adapt, embrace change, and find beauty in the unexpected.
- Empathy and Perspective: Struggling to find your way fosters compassion and a broader understanding of others’ journeys.Real-Life Insights
- Career Pivots: Many people discover their dream careers after taking risks or leaving secure jobs for something new.
- Travel Experiences: Some of the best adventures come from unplanned turns, leading to stunning views or unforgettable encounters.
- Personal Growth: Life’s setbacks, like heartbreak or failure, often redirect you toward better opportunities and stronger versions of yourself.
How to Navigate the Unknown
Getting lost doesn’t mean giving up—it’s about embracing the process and making the most of it.
1. Change Your Perspective: See getting lost as an opportunity for growth rather than a setback.
2. Stay Open-Minded: Be willing to explore uncharted ideas, places, and experiences.
3. Trust the Process: Believe that every detour has a purpose, even if it’s not immediately clear.
4. Learn as You Go: Each step, even in the wrong direction, teaches you something valuable.The Beauty of Wandering
Looking back, the moments when you felt most lost are often the ones where you grew the most. They’re the turning points that shape who you are and lead you to paths you never planned for but wouldn’t trade for anything.
Final Thought
Some paths can only be found by getting lost. These moments of uncertainty are not failures but invitations to grow, explore, and discover. When you embrace the unknown, you open yourself up to possibilities far beyond your imagination.
Remember, the journey is as important as the destination. So, when you feel unsure of where to go, keep moving, learning, and trusting. Sometimes, the best destinations are the ones you never planned to find.