-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ c8ea6fc4:54426263
2025-01-16 11:33:54Book Bangalore to Coorg cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ c8ea6fc4:54426263
2025-01-16 11:33:16Book Patna to Gaya cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c8ea6fc4:54426263
2025-01-16 11:32:28Book Chennai to Tirupati cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c8ea6fc4:54426263
2025-01-16 11:31:27Book Shimla to Delhi cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c8ea6fc4:54426263
2025-01-16 11:30:33Book Shimla to Chandigarh cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:29:59Book Jaipur to Chandigarh cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ ee7d2dbe:4a5410b0
2025-01-16 11:29:41Offering MVP Development services and teams to create quick yet powerful MVPs of your digital idea. Build your investor and user-ready MVPs with Agicent!
An MVP is more than just a test—it’s the starting line for your vision and the first promise you make to your users. That’s why we don’t just build MVPs; we craft them to be resilient, adaptable, and future-ready, even if we’re startinag with just a few core features. After more than a decade of helping 500+ startups and SMBs, we know how to create MVPs that shine today and grow with you tomorrow.
Our MVP Development Services Offerings
- Prototype Designing
Before diving into development, we create interactive prototypes to help you visualize your idea, refine its features, and gather feedback from stakeholders and potential users. This ensures the MVP’s design aligns with your vision and also saves time during development.
- Pilot MVP Development
We focus on building a functional, minimal version of your product to test core features in real-world scenarios, ensuring you get valuable insights with minimal investment.
- Feasibility Analysis
Our team conducts thorough market and technical feasibility studies to ensure your MVP is aligned with demand and can be built efficiently with the right tools and technologies.
- User-Centric Design
We prioritize designing intuitive and engaging UX/UI that resonates with your target audience, creating a seamless experience from the start.
- Custom Development
Every product is unique, and so is our approach. Using modern technologies, reusable libraries, and scalable architecture, we tailor your MVP to meet your specific goals and adapt to future needs.
MVP Solutions by Agicent
Every industry has unique needs, and we specialize in crafting tailored MVPs that cater to specific market demands. At Agicent, we’ve developed MVPs across diverse industries, combining deep domain expertise with cutting-edge technology.
E-Commerce MVP Solutions
Launch your online store quickly with core features like product listings, payment gateways, and user-friendly navigation. We’ve built scalable MVPs for eCommerce startups that later evolved into full-fledged marketplaces.
Social Media MVP Solutions Develop community-driven platforms with essential social features like profiles, feeds, and messaging. From niche networks to global platforms, we help you create scalable and engaging social media MVPs.
Why Choose Us for MVP Development?
I hope you also believe that creating a Minimum Viable Product (MVP) isn’t just about development—it’s about crafting a strategic launchpad that minimizes risks, maximizes impact, and accelerates market entry. And, we keep all in mind while building an MVP. So let’s see why startups and enterprises consistently choose us for their MVP development:
- Tailored MVP Development Strategy
We know that every startup or enterprise is unique. So, our team invests time in understanding your vision, market dynamics, and user expectations to create an MVP roadmap tailored to your specific needs. From defining core features to ensuring scalability, every step of our process is designed with precision.
- Proven Expertise with Successful MVPs
With a portfolio featuring MVPs like Irth (featured for its impactful solution for women of color), HASfit (a leading fitness app), Wellcure, and more we bring hands-on experience across diverse industries. Our solutions have helped startups attract funding, build user bases, and grow into successful businesses.
Source: https://www.agicent.com/mvp-development-services
-
@ c1adca38:5c6dd4f8
2025-01-16 11:29:40Book Pushkar to Jaipur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c8ea6fc4:54426263
2025-01-16 11:29:20Book Gurgaon to Agra cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:27:56Book Jaipur to Pushkar cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:27:37Book Agra to Jaipur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:27:00Book Jaipur to Agra cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c8ea6fc4:54426263
2025-01-16 11:26:47Book Gurgaon to Agra cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:24:28Book Jaipur to Ajmer cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:23:20Book Jaipur to Khatu Shyam Ji cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:22:43Book Jaipur to Gurgaon cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:20:51Book Gurgaon to Jaipur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:20:34Book Jaipur to Delhi cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:20:07Book Delhi to Jaipur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:16:20Book Agra to Vellore cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:15:58Book Vellore to Gudiyatham cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:15:29Book Vellore to Tirupati cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:12:12Book Vellore to Yelagiri cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:11:49Book Tirupati to Vellore cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:11:21Book Chennai to Vellore cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:03:41Book Haridwar to Allahabad cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 11:03:22Hire taxi in Prayagraj at best price. Book local and outstation cab in Prayagraj. Confirmed cab, Real time driver details. Price starts ₹1300
-
@ c1adca38:5c6dd4f8
2025-01-16 11:02:34Hire taxi in Ooty at best price. Book local and outstation cab in Ooty. Confirmed cab, Real time driver details. Price starts ₹2000
-
@ c1adca38:5c6dd4f8
2025-01-16 11:02:14Hire taxi in Vellore at best price. Book local and outstation cab in Vellore. Confirmed cab, Real time driver details. Price starts ₹1800
-
@ c1adca38:5c6dd4f8
2025-01-16 11:01:35Hire taxi in Nellore at best price. Book local and outstation cab in Nellore. Confirmed cab, Real time driver details. Price starts ₹1800
-
@ c1adca38:5c6dd4f8
2025-01-16 11:01:18Hire taxi in Kaithal at best price. Book local and outstation cab in Kaithal. Confirmed cab, Real time driver details. Price starts ₹1400
-
@ c1adca38:5c6dd4f8
2025-01-16 10:55:02Book Delhi to Mussoorie cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:54:45Book Delhi to Mathura cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:54:26Book Delhi to Dehradun cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:53:34Hire taxi in Madurai at best price. Book local and outstation cab in Madurai. Confirmed cab, Real time driver details. Price starts ₹1800
-
@ c1adca38:5c6dd4f8
2025-01-16 10:53:19Hire taxi in Rajkot at best price. Book local and outstation cab in Rajkot. Confirmed cab, Real time driver details. Price starts ₹1300
-
@ c1adca38:5c6dd4f8
2025-01-16 10:30:42Book Bilaspur to Raipur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:30:24Book Raipur to Korba cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:30:01Book Raipur to Jagdalpur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:27:58Book Surat to Navsari cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:27:38Book Surat to Bharuch cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:27:18Book Surat to Mumbai cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:14:39Book Vadodara to Bharuch cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:14:20Book Vadodara to Anand cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ 5adb967d:ac1f7d04
2025-01-16 10:02:22In this era of ubiquitous radio waves surrounding us, the issue of communication security is receiving increasing attention. The leakage of radio signals may bring great danger to governmental organizations, enterprises and the general public. Effective blocking of radio waves, constructing an absolutely safe “quiet zone”, has become the urgent needs of many people. Advanced communication gps blocker, with its powerful electromagnetic shielding ability, is to meet this demand is the magic weapon. It can be described as an invisible “quiet cage”, all radio signals completely isolated.
Communication shielding using the physical principle of electromagnetic shielding, in a specific range to form an effective isolation of radio waves “quiet zone”. As long as in this area, whether it is the most advanced eavesdropping and monitoring equipment, or intended to harass the interference of radio waves, all have no way to start, from the root to eliminate the risk of communications leaks.
As an unbreakable radio “copper wall”, communications shielding can be widely used in a variety of military, government, business and other communications security requirements are extremely high places. Just open the shielding function, the entire region will become an absolutely safe and reliable “quiet cage”, where you can freely carry out classified meetings, conversations, deliberations and other work, no worries.
Even if the region within the deployer has a “mole” carrying eavesdropping equipment, will also be completely “off”. There will be no radio interference signal infiltration, so that the most stringent confidentiality work can also be foolproof, so as to escort the security of important confidential information.
In addition to fixed places, communication wifi jammer can also be installed in a variety of special vehicles, trains, ships and other mobile carriers for the transportation of classified materials and important personnel to provide solid communication protection. Whether traveling in any environment, just turn on the mobile shielding mode at any time, the entire transportation will become an absolutely safe and controllable “quiet cage”. Any radio waves on the road can not spy, eliminating the risk of sensitive information leakage in transit.
The latest generation of communication shielding, but also has the ability of intelligent frequency selection. They can be based on specific needs, 2G/3G/4G/5G, WiFi, GPS and other specific radio frequency bands to accurately and selectively implement the signal jammer, the other wireless communication functions to be retained. This “semi-closed static area” effectively realizes the organic combination of convenience and communication protection.
It is worth mentioning that nowadays there are portable communication UAV jammer device. This compact, plug-and-play products, you can easily carry, so that the protection ability to extend to a variety of business trips, outdoor conversations and other scenarios. No matter where they are, users only need to flick the switch, you can build an absolutely safe and reliable “quiet cage”.
It can be said that the communication recording jammer is with its impenetrable electromagnetic protection ability, for us to build an isolation of radio waves “quiet cage”, effectively guarding the absolute security of communications and information. At a time when the risk of information leakage is increasing, this “silent guardian” will play an increasingly important role in protection, and become an important guarantee to ensure communications security. Whether in the military, government, enterprises and other fields, or business travel, daily life, it will be a solid backing for communications protection.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:01:12Book Ahmedabad to Bharuch cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 10:00:54Book Ahmedabad to Patan cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 09:59:11Book Ahmedabad to Unjha cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 09:56:50Book Ahmedabad to Anand cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 09:55:48Book Ahmedabad to Nadiad cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 09:55:27Book Ahmedabad to Gandhidham cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ c1adca38:5c6dd4f8
2025-01-16 09:54:38Book Ahmedabad to Jamnagar cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ fbf0e434:e1be6a39
2025-01-16 09:54:26Hackathon 总结
Aptos Code Collision Hackathon 圆满结束,吸引了658个注册项目和来自全球2,658名开发者参与。该Hackathon以混合格式进行,旨在通过研讨会和训练营推进Aptos平台上Web3发展的区块链创新。
活动提供超过500,000美元的奖金,吸引了众多热衷于创建有意义应用程序的参与者。评审由行业专家进行,包括来自Aptos Labs的Mo Shaikh和Avery Ching,以及其他著名区块链和投资公司领导人。
Hackathon 突出展示了Aptos技术,如Keyless用户认证和链上随机性,支持开发人员创建安全高效的应用。通过提供详尽的参与者手册,增强了新手和高级用户的学习和开发。活动展示了显著的参与和有前景的创新,旨在增强Aptos区块链生态系统。
Hackathon 获奖者
DeFi / RWA 奖项获奖者
- Panana Predictions:一个通过Aptos智能合约进行事件预测的去中心化平台,提供透明交易和社区治理市场。
- Sentra Restaking Protocol:通过再抵押层加强Aptos安全性,提供池化安全和可定制惩罚措施。
- Legato:利用AI进行BTC价格预测并使用智能合约管理流动性池的DeFi市场平台。
- eVault:结合DeFi和TradFi,为Aptos上的未服务社区提供金融服务。
- MeowFi:使用NFT作为贷款抵押品,支持Aptos上的透明借贷。
游戏 / NFTs 奖项获奖者
- Jeton:使用zk-SNARKs确保公平的Aptos去中心化扑克平台。
- On-Chain Treasure Hunt Multiplayer!:完全链上游戏,利用智能合约确保透明机制和奖励。
- Forged Realms - IP Incubation with Games:通过代币化和社区驱动的方法支持游戏IP孵化。
- Aptos Legacy:在Aptos上提供代币化资产增强玩家所有权的3D RPG游戏。
- appToss Friends:提供链上赌场基础设施,利用流动性池和好友注册表。
AI / DePIN 奖项获奖者
- ChatEDU:利用AI支持的教育系统,通过区块链积分激励内容共享。
- Unity Network:通过联邦学习协议促进AI模型的数据货币化。
- ProxiRun:通过Aptos智能合约管理的去中心化计算市场。
- FLock Move GPT:使用高级调优和分类方法训练符合Aptos编码标准的大型语言模型(LLM)。
- Antikythera:通过执行交易和识别实时机会来增强Aptos交互的AI代理。
社交奖项获奖者
- Cook App:基于Telegram的应用,通过区块链支持的滑动界面策划加密新闻。
- BiUwU:直播平台,特色包括AI驱动的影响者和互动的区块链支持参与。
- FundMate:提供社交消息传递和加密交易的平台,具有去中心化支付管理。
- Enthro:利用区块链增强视频内容创建以促进市场增长机会。
- StreamAd:一个专注于Twitter的平台,通过智能合约自动化管理活动和奖励分发。
意外奖项获奖者
- ActionX:通过将流程转化为可操作链接简化区块链交互。
- Compensate:运用零知识证明,实现安全透明薪水交易的工资管理创新。
- Khizab:提供反应式区块链能力,通过模块化、类型安全的工具进行应用开发。
- Aptos Extension:提升Aptos生态系统内生产力和协作的开发工具。
- Aptotic: Industrial Robotic Automation on Aptos 🤖:通过区块链集成安全操作,为工业自动化提供MaaS。
UI 挑战奖项获奖者
- PlayStop:一个社交小游戏平台,结合数字资产所有权和实时竞赛。
- EdenX:一个Web3学习平台,特色包含通过Telegram bot进行游戏化学习赚钱体验。
- Vortex:为玩家对玩家游戏提供安全流动性管理的GameFi平台。
最佳公共利益奖项获奖者
- Scaffold Move:一个开发Aptos上dApps的开源工具包,包括部署脚本和模块热重载。
- build 3 (fka Aptos Bounty App):支持任务完成并附带分析仪表板的去中心化劳动力市场。
- Aptos Extension
Aptos Indexer Challenge with Nodit 奖项获奖者
- Panana Predictions
- Wavefy Network - Decentralized Network for Generative AI Inference:使用P2P网络解决AI内存问题,实现分布式模型推理。
- Compensate
远见选择:消费者应用程序悬赏奖项获奖者
- BiUwU
- Cook App
- eVault
- Antikythera
- ChatEDU
Mirana悬赏奖项获奖者
- Sentra Restaking Protocol
- BiUwU
- FLock Move GPT
MEXC Venture's 选择奖项获奖者
- AGDEX:一个用于杠杆交易的去中心化永久交易平台,特点包括AGLP代币。
- EdenX
- Panana Predictions
- 紅包拿來:将传统红包文化与区块链结合,实现安全的数字资产分享。
- Inbox-to-Earn using Telegram + Mizu:通过Aptos代币支付优先消息,货币化Telegram收件箱。
Mizu Wallet's Telegram Integration Challenge 奖项获奖者
- AGDEX
- Panana Predictions
- Apt Date:通过区块链确保互动安全的约会平台,使用链上随机性进行用户匹配。
有关所有项目的详细信息,请访问 https://dorahacks.io/hackathon/code-collision/buidl。
关于组织者
Aptos Foundation
Aptos Foundation 在区块链技术领域占有重要地位,提供一个采用Move编程语言的Layer 1区块链以增强可扩展性。其每秒可处理高达30,000笔交易,并每日处理20亿笔交易,该基金会重视交易效率和安全性。致力于持续创新,其使命是通过成本效益高且稳健的解决方案演进区块链基础设施。Aptos Foundation 积极投入技术开发,促进动感和安全的数字生态系统。
-
@ c1adca38:5c6dd4f8
2025-01-16 09:54:17Book Ahmedabad to Himmatnagar cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ fbf0e434:e1be6a39
2025-01-16 09:54:04Hackathon 总结
Hackmos 2024 活动在迪拜圆满结束,作为 Cosmoverse 2024 的一部分,该活动吸引了 53 个注册项目和 101 位开发者参与。Hackathon 为学生和非学生团队提供了展示平台,每个团队在特定时间段展示项目,由针对不同赛道类别的评审小组进行评估。此次活动展现了 Cosmos 生态系统的创新成果,促进了开发者与区块链爱好者之间的交流。
参与者被鼓励开发展示技术创新和实用功能的项目。活动的结束阶段,项目展示以技术创新、功能性、可用性和安全性为评估标准。通过接触更广泛的加密社区,Hackathon 展示了具有显著社区影响力和采纳潜力的有前景项目。
在迪拜的文化背景下,参与者还有机会探索当地环境。Hackathon 参会者获得非可转让的 Cosmoverse 会议入场券,这是一个围绕 Cosmos 生态系统发展的论坛。活动促进了协作和竞争,旨在推动区块链项目开发的增长和探索。
Hackathon 获奖者
Interchain 奖获奖者
- Wasm ICQ Datahub:在 Neutron 区块链上使用智能合约,促进跨链数据交换,无需进行架构更改,特别适用于金融协议和分析。
- ZkResolution:通过零知识证明提高 DNS 隐私,提供安全查询并确保 EVM 和 Cosmos 生态系统之间的互操作性。
- FractionXChange:实现 NFT 的分割和租赁,允许可分割代币用于共享资产访问,同时保持资产排他性。
- Cosmic Quest:通过角色扮演任务游戏化区块链教育,结合实际互动和链上凭证。
- SupportMEow:通过区块链促进猫舍捐赠,使用 AI 和 IBC 进行图像验证和区块链铭文。
- NAMI <> Mars Protocol Integration:将 NAMI 和 Mars Protocol 集成,用于跨链储蓄,提供可持续收益和稳定币管理。
- InMail Treasury:提供基于 AI 的金库管理和电子邮件接口,利用 CosmWasm 和 Osmosis 智能账户进行安全的加密管理。
- BreezeNode:通过区块链驱动的智能能源管理系统,促进节能行为,针对减少使用提供基于代币的奖励。
- FreshCatch:通过直接交易连接渔民和市场,简化海鲜供应链,提升可持续性和效率。
- LogoSpark - RECs Blockchain:通过 PoS 区块链进行 REC 交易,确保可再生能源市场的透明度和可持续性。
Cosmos Hub 奖获奖者
- MEME HERO:在 Cosmos 上为 meme 代币提供启动平台,使用 IBC 提供流动性,并在游戏化平台中实现可定制的代币经济学。
- Symbiosis
- Proof of Profit:模拟交易环境以展示可验证的盈利能力,安全地在链上吸引投资。
- Swift Notify: Cosmos Hub Newsletters
- Wasm ICQ Datahub
Babylon 奖获奖者
- HWStaking:通过 Babylon 集成 Ledger 钱包进行比特币质押,提高质押者的安全性和可访问性。
Warden 奖获奖者
- SupportMEow
- InMail Treasury
- FedLearn:通过去中心化的联邦学习和 Warden Protocol 集成实现私有机器学习。
Osmosis 奖获奖者
- InMail Treasury
- Symbiosis
- Osmosis smart contract EOL:通过非活动监控和用户无法操作时的委托执行,提供安全的加密基金回收。
Neutron 奖获奖者
- Wasm ICQ Datahub
- Proof of Profit
- Neutron Drop protocol UI in TMA:Telegram 应用接口与 Neutron Drop Protocol 集成,实现跨网络无缝智能合约操作。
Mantra 奖获奖者
- TOKIFY Protocol:在 MANTRA 链上管理现实世界资产代币化,允许在合规、DAO 治理的框架下实现部分所有权。
- FractionXChange
- mantrapy: 通过功能强大的 Python 库增强与 Mantra 链的交互,实现去中心化应用的可扩展性。
Agoric Bounty 奖获奖者
- Zero mile:开发一个流动性层,用于在区块链之间实现无传统消息传递的无缝 DeFi 操作,提高互操作性。
- SupportMEow
- Agoric: Event Registration:扩展活动注册平台,通过 Agoric 集成支持多区块链交易。
Dora Factory Bounty 奖获奖者
- ZKBugs:专注于 Circom 电路中的错误检测,确保密码学应用的最佳性能。
- HACKMOS BOUNTY MINOR:检查消息链验证漏洞,以提高去中心化系统的安全性。
查看所有获奖项目和详细信息,请访问 Hackmos 2024 Projects。
关于组织者
Cosmoverse
Cosmoverse & Hackmos Dubai 2024 是技术和区块链领域的知名社区,致力于推动Cosmos区块链的创新和合作,以组织吸引人的会议和 Hackathon 而闻名,将行业专家、开发人员和爱好者聚集在一起,探索新兴趋势和解决方案。该组织的举措旨在推进区块链技术的知识和实践应用。目前,其重点是加强技术参与,促进对话以推动行业向前发展。
-
@ fbf0e434:e1be6a39
2025-01-16 09:53:37Hackathon 总结
Funding the Commons & Earth Commons Hackathon 从10月7日到11月7日举行,吸引了356名开发者注册116个项目。活动专注于为公共物品融资创造解决方案,重点是再生金融、去中心化治理和气候创新。主要在线上进行的Hackathon在11月6日和7日于曼谷举行了一次可选的线下会议,以促进全球协作。
参与者最初在一个包括每周挑战的创意阶段进行,然后发展到原型开发。Hackathon提供了指导和研讨会访问,评审标准集中在创新性、影响力和可行性。虽然未详细介绍具体项目,但大量的参与显示了对目标领域的浓厚兴趣。
该Hackathon由Funding the Commons与Earth Commons共同组织,前者倡导基于区块链的公共物品基础设施,后者强调自然资源治理。通过吸引多元化的全球社区,该活动旨在推动公共物品管理和管理方面的系统性变革。
Hackathon 获奖者
Stellar奖项的金融普惠
- Freelii 使用Stellar的区块链来促进安全且具成本效益的汇款,并通过Telegram增加全球南方地区的可访问性。
- Ask Billy 利用AI、调查和区块链促进人道主义援助,改善影响评估和安全转账。
- Stellar Mobile Money Bridge 将移动支付与Stellar集成,简化跨境交易并解决金融碎片化问题。
NEAR奖项的去中心化AI
- VielNetFL 是一个使用NEAR智能合约和IPFS的安全联邦学习平台,通过先进的加密技术确保数据隐私。
- FederNear 提供基于NEAR区块链的隐私保护联邦学习,采用Pedersen承诺进行加密模型训练。
- Delta 是一个利用去中心化AI和区块链预测灾害并透明管理资金的灾难救援平台。
Filecoin奖项的去中心化存储
- ZkResolution 作为一个使用零知识证明的DNS隐私协议运行,实现EVM和Cosmos生态系统之间的跨链能力。
- SovereignSearch 是一个去中心化搜索引擎,专注于隐私的数据检索,使用Storcha和Filecoin Lassie进行安全存储。
KlimaDAO奖项的环境影响
- Proof of Change 基于验证结果为气候项目提供资金,使用以太坊进行状态变更验证和IPFS进行文档记录。
- PGAtlas 是一个互动平台,连接用户与全球公共物品项目,通过地理定位和Celo网络进行捐赠。
- 0xFarms 通过AI驱动的农场和区块链众筹提高粮食安全,支持农村和城市农业倡议。
- GreenLink 是一个利用区块链进行安全数据处理和激励回收的废物管理平台。
公共物品融资基础设施奖项
- Doogly 通过Allo协议简化加密捐赠,支持多链和多代币交易,以NFT证书确认捐赠。
- Dead Project Snipper 评估区块链项目活动以识别不活跃项目,并通过机器学习优化资助分配。
- IES(Impact Evaluation Service) 激励基于区块链的影响评估,促进项目资助的链上评估。
- Counterfactually 使用合成控制方法分析web3干预措施的影响,以便为决策提供信息。
- Ecosystem Vision 提供一个集中式仪表盘,用于评估加密资助的影响,整合来自不同资助计划的数据。
- GrantScan: Indexing all Grant Applications Ever in Web3 是一个索引Web3资助申请的搜索引擎,可增强数据访问和验证。
Holonym奖项的身份和隐私
- Refugee Identity Issuer 利用区块链、零知识证明和生物识别数据为难民提供去中心化身份验证。
- Trufy 通过基于凭证的影响增强DAO投票,提供多样化模式以改善决策质量。
Layer奖项的全栈去中心化
- Builder's Dollar 是一种用于资助Optimism Foundation项目的收益稳定币,集成AAVE以获得收益。
Numbers Protocol奖项的信任和真实性
- Jurdil - Community-Based Election Recap Utilizing Blockchain Technology with Captures 通过区块链和媒体验证增强印度尼西亚的选举透明度。
- Infinity Book: Pet Heroes 是一个使用区块链内容验证和AI增强的故事创作的数字书籍平台。
如需更多详细信息及探索所有项目,请访问此处。
关于组织者
Funding the Commons
Funding the Commons 致力于加速区块链基础设施在公共物品融资中的发展。通过培育一个涉及Web2、Web3、学术界、公共部门、慈善业和行业的多元化生态系统,该组织旨在推动公共物品管理中的系统性变革。其重要举措包括举办国际会议、建设者驻场项目和Hackathon,同时通过实验性资金轮次为开源项目提供资本。其使命集中于增强人类协调,以优先保护公共物品,并以影响评估系统和可持续资本流动为支持。
-
@ c1adca38:5c6dd4f8
2025-01-16 09:51:58Book Rajkot to Morbi cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ fbf0e434:e1be6a39
2025-01-16 09:40:32Hackathon 总结
v4 Hookathon: PancakeSwap x Brevis Hackathon 吸引了116名开发者和26个项目。作为50万美元开发者计划的一部分,本次Hackathon旨在促进PancakeSwap v4生态系统的创新,重点开发使用Brevis ZK-Coprocessor的Hooks。提供了40,000美元的奖金池,以激励解决流动性管理和智能合约功能中的挑战。
Hackathon 侧重于开发健全、用户友好且无需信任的Hooks。参与者探索了动态费用结构、主动流动性管理和独享访问池等应用。开放式赛道鼓励了多样化和创新的解决方案。关键创新领域包括流动性激励机制、做市机器人和身份验证池。
总体而言,Hackathon提升了PancakeSwap v4平台上的参与度和开发,获奖者于2023年10月24日公布。通过工作坊和资源促进了社区学习,推进了开发者之间的技术讨论和协作。
Hackathon 获奖者
1. Smart Liquidity Hook (Stable) - 该项目优化了稳定币对的流动性提供者奖励,使其能够同时从流动性提供和借贷中获利。
奖金: $12,000
2. OG Boost - 通过根据其他AMM的交换费按比例分配奖励来支持激励提供者,并在增加流动性时存储LP头寸。
奖金: $10,000
3. Superfluid Swapper - 利用零知识证明技术和市场分析形成自适应流动性池系统。
奖金: $8,000
4. VWAP Dynamic Fee Hook - 根据其对成交量加权平均价格(VWAP)的影响调整交换费,创造了对流动性提供者、交换者和PancakeSwap生态系统有益的反馈回路。
奖金: $6,000
5. PADO Hook - 使用链上和链下数据预言机验证用户交易证明,增强了精准度和隐私性以实现有效的用户目标定位。
奖金: $4,000
欲获取更多信息,请访问DoraHacks查看所有项目。
关于组织者:
PancakeSwap
PancakeSwap是一个领先的多链去中心化交易所(DEX),支持包括以太坊、BNB Chain和Polygon zkEVM等区块链的无缝交易。自2020年推出以来,PancakeSwap 已实现8000亿美元的总交易量,并拥有20亿美元的锁定流动性。拥有超过200万活跃用户,其低费用和用户友好的界面得到了广泛认可。该平台的重点是提供一个灵活的加密生态系统交易体验,同时培育一个强大而充满活力的社区。
-
@ ed84ce10:cccf4c2a
2025-01-16 09:21:55Hackathon Summary
The v4 Hookathon: PancakeSwap x Brevis Hackathon featured 116 developers and 26 projects. As part of the $500K Developer Program, the hackathon aimed to foster innovation within the PancakeSwap v4 ecosystem, emphasizing the development of Hooks using the Brevis ZK-Coprocessor. A $40,000 prize pool was offered to incentivize solutions targeting challenges in liquidity management and smart contract functionalities.
The hackathon focused on developing robust, user-friendly, and trustless Hooks. Participants explored applications such as dynamic fee structures, active liquidity management, and exclusive-access pools. The open track format encouraged diverse and creative solutions. Key innovation areas included mechanisms for liquidity incentivization, market-making bots, and identity-verified pools.
Overall, the hackathon increased engagement and development on the PancakeSwap v4 platform, with winners announced on October 24, 2023. It facilitated community learning through workshops and resources, advancing technical discussions and collaboration among developers.
Hackathon Winners
1. Smart Liquidity Hook (Stable) - This project optimizes rewards for Liquidity Providers in stablecoin pairs, enabling concurrent profit from both liquidity provision and lending.
Prize: $12,000
2. OG Boost - It supports Incentive Providers by allocating rewards proportionally based on swap fees from other AMMs, storing LP positions as liquidity is added.
Prize: $10,000
3. Superfluid Swapper - Utilizes zero-knowledge proof technology and market analysis to form an adaptive liquidity pool system.
Prize: $8,000
4. VWAP Dynamic Fee Hook - Adjusts swap fees according to their influence on the Volume Weighted Average Price (VWAP), creating a beneficial feedback loop for Liquidity Providers, Swappers, and the PancakeSwap ecosystem.
Prize: $6,000
5. PADO Hook - Employs on-chain and off-chain data oracles to validate user transaction proofs, enhancing accuracy and privacy for effective user targeting.
Prize: $4,000
For further information, view all projects at DoraHacks.
About the Organizer
PancakeSwap
PancakeSwap is a leading multichain decentralized exchange (DEX), facilitating seamless transactions across blockchains, including Ethereum, BNB Chain, and Polygon zkEVM. Since its launch in 2020, PancakeSwap has achieved $800 billion in total trading volume and maintains $2 billion in locked liquidity. It serves over 2 million active users, recognized for its low fees and user-friendly interface. The platform's primary focus is on providing a versatile trading experience within the crypto ecosystem while fostering a robust and vibrant community.
-
@ cf7ed325:050194cf
2025-01-16 08:39:25Embark on an unforgettable journey with Alexandria shore excursions, where history, culture, and adventure await. These carefully curated tours ensure a memorable experience for travelers arriving at Alexandria Port.
Begin your adventure with the Explore Pyramids Tours included Lunch Cruise From Alexandria Port, offering a blend of ancient wonders and a relaxing Nile cruise. Dive deeper into Egypt's history with the Discover Amazing trip to the pyramids and Saqqara from Alexandria Port, where the iconic pyramids meet the fascinating Step Pyramid of Saqqara. Alexandria shore Excusions: Experience Alexandria day tours
For those seeking a cultural immersion, the Day Tour to Islamic and Coptic Cairo from Alexandria Excursions provides a glimpse into Egypt's rich religious heritage, including historic mosques and churches. Alternatively, enjoy the Full Day Trip in Cairo From Alexandria Excursions returning to Port Said, a comprehensive exploration of Cairo's highlights before heading back to your port.
If you’re interested in wartime history, don’t miss the chance to Book your trip to Alamein From Alexandria Shore Excursions. Visit the World War II cemeteries and museum, a moving tribute to the soldiers who fought in the desert. For thrill-seekers, From Alexandria Port Experience Desert Safari Trip in Giza Pyramids combines the grandeur of the pyramids with an exhilarating desert adventure.
Extend your journey with 2 Day Tours in Cairo from Alexandria Shore Excursions, where you can fully immerse yourself in the wonders of the Egyptian capital. Don’t forget to explore the Highlights of Cairo Day Tours From Alexandria Shore Excursions, featuring top landmarks like the Egyptian Museum and Khan El Khalili Bazaar.
No matter which tour you choose, Alexandria shore excursions promise an enriching experience that blends history, culture, and adventure. Book now for a journey you’ll never forget!
🌐 Visit us at www.etbtoursegypt.com 📲 Contact us now! +20 10 21100873 📧 Email: info@etbtours.com 🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ da0b9bc3:4e30a4a9
2025-01-16 07:30:46Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/852155
-
@ e3ba5e1a:5e433365
2025-01-16 07:23:56Humans want the resources of other humans. I want the food that the supermarket owns so that I can eat it. Before buying it, I wanted the house that I now own. And before that, someone wanted to build a house on that plot of land, which was owned by someone else first. Most of the activities we engage in during our lifetime revolve around extracting something from someone else.
There are two basic modalities to getting the resources of someone else. The first, the simplest, and the one that has dominated the majority of human history, is force. Conquer people, kill them, beat them up and take their stuff, force them into slavery and make them do your work. It’s a somewhat effective strategy. This can also be more subtle, by using coercive and fraudulent methods to trick people into giving you their resources. Let’s call this modality the looter approach.
The second is trade. In the world of trade, I can only extract resources from someone else when they willingly give them to me in exchange for something else of value. This can be barter of value for value, payment in money, built-up goodwill, favors, charity (exchanging resources for the benefit you receive for helping someone else), and more. In order to participate in this modality, you need to create your own valuable resources that other people want to trade for. Let’s call this the producer approach.
The producer approach is better for society in every conceivable way. The looter approach causes unnecessary destruction, pushes production into ventures that don’t directly help anyone (like making more weapons), and rewards people for their ability to inflict harm. By contrast, the producer approach rewards the ability to meet the needs of others and causes resources to end up in the hands of those who value them the most.
Looter philosophy is rooted in the concept of the zero sum game, the mistaken belief that I can only have more if someone else has less. By contrast, the producer philosophy correctly identifies the fact that we can all end up better by producing more goods in more efficient ways. We live in our modern world of relatively widespread luxury because producers have made technological leaps—for their own self-serving motives—that have improved everyone’s ability to produce more goods going forward. Think of the steam engine, electricity, computing power, and more.
A producer-only world
It would be wonderful to live in a world in which there are no looters. We all produce, we all trade, everyone receives more value than they give, and there is no wasted energy or destruction from the use of force.
Think about how wonderful it could be! We wouldn’t need militaries, allowing a massive amount of productive capacity to be channeled into things that make everyone’s lives better. We wouldn’t need police. Not only would that free up more resources, but would remove the threat of improper use of force by the state against citizens. The list goes on and on.
I believe many economists—especially Austrian economists—are cheering for that world. I agree with them on the cheering. It’s why things like Donald Trump’s plans for tariffs are so horrific in their eyes. Tariffs introduce an artificial barrier between nations, impeding trade, preventing the peaceful transfer of resources, and leading to a greater likelihood of armed conflict.
There’s only one problem with this vision, and it’s also based in economics: game theory.
Game theory and looters
Imagine I’m a farmer. I’m a great farmer, I have a large plot of land, I run my operations efficiently, and I produce huge amounts of food. I sell that food into the marketplace, and with that money I’m able to afford great resources from other people, who willingly trade them to me because they value the money more than their own resources. For example, how many T-shirts does the clothing manufacturer need? Instead of his 1,000th T-shirt, he’d rather sell it for $5 and buy some food.
While I’m really great as a farmer, I’m not very good as a fighter. I have no weapons training, I keep no weapons on my property, and I dislike violence.
And finally, there’s a strong, skilled, unethical person down the street. He could get a job with me on the farm. For back-breaking work 8 hours a day, I’ll pay him 5% of my harvest. Or, by contrast, he could act like the mafia, demand a “protection fee” of 20%, and either beat me up, beat up my family, or cause harm to my property, if I don’t pay it.
In other words, he could be a producer and get 5% in exchange for hard work, or be a looter and get 20% in exchange for easy (and, likely for him, fun) work. As described, the game theoretic choice is clear.
So how do we stop a producer world from devolving back into a looter world?
Deterrence
There’s only one mechanism I’m aware of for this, and it’s deterrence. As the farmer, I made a mistake. I should get weapons training. I should keep weapons on my farm. I should be ready to defend myself and my property. Because if I don’t, game theory ultimately predicts that all trade will collapse, and society as we know it will crumble.
I don’t necessarily have to have the power of deterrence myself. I could hire a private security company, once again allowing the producer world to work out well. I trade something of lesser value (some money) for something I value more (the protection afforded by private security). If I’m lucky, that security company will never need to do anything, because the mere threat of their presence is sufficient.
And in modern society, we generally hope to rely on the government police force to provide this protection.
There are easy ways to defeat the ability of deterrence to protect our way of life. The simplest is to defang it. Decriminalize violent and destructive acts, for example. Remove the consequences for bad, looter behavior, and you will incentivize looting. This is far from a theoretical discussion. We’ve seen the clear outcome in California, which has decriminalized theft under $950, resulting—in a completely predictable way—in more theft, stores closing, and an overall erosion of producer philosophy.
And in California, this is even worse. Those who try to be their own deterrence, by arming themselves and protecting their rights, are often the targets of government force instead of the looters.
I’m guessing this phrasing has now split my reading audience into three groups. Group A agrees wholly with what I’m saying. Group B believes what I’ve just written is pure evil and garbage. Group C initially disagreed with my statements, but has an open mind and is willing to consider a different paradigm. The next section is targeted at groups A and C. Group B: good luck with the broken world you’re advocating.
Global scale
This concept of deterrence applies at a global scale too. I would love to live in a world where all nations exchange value for value and never use force against others. In fact, I believe the ultimate vision for this kind of a world ends with anarcho-capitalism (though I don’t know enough about the topic to be certain). There ends up being no need for any force against anyone else. It’s a beautiful vision for a unified world, where there are no borders, there is no destruction, there is only unity through trade. I love it.
But game theory destroys this too. If the entire world disarmed, it would take just one person who thinks he can do better through looter tactics to destroy the system. The only way to defeat that is to have a realistic threat of force to disincentivize someone from acting like a looter.
And this is the paradox. In order to live in our wonderful world of production, prosperity, health, and happiness, we always need to have our finger near enough to the trigger to respond to looters with force. I know of no other approach that allows production to happen. (And I am very interested in other theoretical solutions to this problem, if anyone wants to share reading material.)
Peace through strength
This line of thinking leads to the concept of peace through strength. When those tempted to use violence see the overwhelming strength of their potential victims, they will be disincentivized to engage in violent behavior. It’s the story of the guy who wants to rob my farm. Or the roaming army in the ancient world that bypassed the well fortified walled city and attacked its unprotected neighbor.
There are critics of this philosophy. As put by Andrew Bacevich, "'Peace through strength' easily enough becomes 'peace through war.'" I don’t disagree at all with that analysis, and it’s something we must remain vigilant against. But disarming is not the answer, as it will, of course, necessarily lead to the victory of those willing to use violence on others.
In other words, my thesis here is that the threat of violence must be present to keep society civilized. But the cost of using that violence must be high enough that neither side is incentivized to initiate it.
Israel
I’d been thinking of writing a blog post on this topic for a few months now, but finally decided to today. Israel just agreed to a hostage deal with Hamas. In exchange for the release of 33 hostages taken in the October 7 massacre, Israel will hand over 1,000 terrorists in Israeli prisons.
I have all the sympathy in the world for the hostages and their families. I also have great sympathy for the Palestinian civilians who have been harmed, killed, displaced, and worse by this war. And I have empathy (as one of the victims) for all of the Israeli citizens who have lived under threat of rocket attacks, had our lives disrupted, and for those who have been killed by this war. War is hell, full stop.
My message here is to those who have been pushing the lie of “peace through negotiations.” Or peace through capitulation. Or anything else. These tactics are the reason the war has continued. As long as the incentive structure makes initiating a war a positive, wars will continue to be initiated. Hamas has made its stance on the matter clear: it has sworn for the eradication of all Jews within the region, and considers civilian casualties on the Palestinian side not only acceptable, but advantageous.
I know that many people who criticize Israel and put pressure on us to stop the war in Gaza believe they are doing so for noble reasons. (For the record, I also believe many people have less altruistic reasons for their stance.) I know people like to point to the list of atrocities they believe Israel has committed. And, by contrast, the pro-Israel side is happy to respond with corresponding atrocities from the other side.
I honestly believe this is all far beyond irrelevant. The only question people should be asking is: how do we disincentivize the continuation of hostilities? And hostage deals that result in the release of terrorists, allow “aid” to come in (which, if history is any indication, will be used to further the construction of tunnels and other sources for attack on Israel), and give Hamas an opportunity to rearm, only incentivize the continuation of the war.
In other words, if you care about the innocent people on either side, you should be opposed to this kind of capitulation. Whatever you think about the morality of each side, more people will suffer with this approach.
Skin in the game
It’s easy to say things like that when your life isn’t on the line. I also don’t think that matters much. Either the philosophical, political, and economic analysis is correct, or it isn’t. Nonetheless, I do have skin in the game here. I still live in a warzone. I am less than 15 kilometers from the Lebanese border. We’ve had Hezbollah tunnels reaching into our surrounding cities. My family had to lock ourselves inside when Hezbollah paratroopers had attempted to land in our city.
My wife (Miriam) and I have discussed this situation at length, many times, over the course of this war. If I’m ever taken hostage, I hope the Israeli government bombs the hell out of wherever I am being held. I say this not only because I believe it is the right, just, moral, ethical, and strategically correct thing to do. I say this because I am selfish:
- I would rather die than be tortured by our enemies.
- I would rather die than be leveraged to make my family and country less safe.
- I would rather die than live the rest of my life a shell of my former self, haunted not only by the likely torture inflicted on me, but by the guilt of the harm to others resulting from my spared life.
I don’t know why this hostage deal went through now. I don’t know what pressures have been brought to bear on the leaders in Israel. I don’t know if they are good people trying to protect their citizens, nefarious power hungry cretins looking to abuse both the Israeli and Palestinian populace to stay in control, weak-willed toadies who do what they’re told by others, or simply stupid. But my own stance is clear.
But what about the Palestinians?
I said it above, and I’ll say it again: I truly do feel horrible for the trauma that the Palestinian people are going through. Not for the active terrorists mind you, I feel no qualms about those raising arms against us being destroyed. But everyone else, even those who wish me and my fellow Israelis harm. (And, if polling is to be believed, that’s the majority of Palestinians.) I would much rather that they not be suffering now, and that eventually through earned trust on both sides, everyone’s lots are improved.
But the framework being imposed by those who “love” peace isn’t allowing that to happen. Trust cannot be built when there’s a greater incentive to return to the use of force. I was strongly opposed to the 2005 disengagement from Gaza. But once it happened, it could have been one of those trust-building starting points. Instead, I saw many people justify further violence by Hamas—such as non-stop rocket attacks on the south of Israel—because Israel hadn’t done enough yet.
Notice how fundamentally flawed this mentality is, just from an incentives standpoint! Israel gives up control of land, something against its own overall interests and something desired by Palestinians, and is punished for it with increased violence against citizens. Hamas engaged in a brutal destruction of all of its opponents within the Palestinian population, launched attacks on Israel, and when Israel did respond with force, Israel was blamed for having not done enough to appease Hamas.
I know people will want to complicate this story by bringing up the laundry list of past atrocities, of assigning negative motivations to Israel and its leaders, and a million other evasions that are used to avoid actually solving this conflict. Instead, I beg everyone to just use basic logic.
The violence will continue as long as the violence gets results.
-
@ 7f2d6fd6:64710921
2025-01-16 07:23:42The Warrior King strode through the gnarled trees, his armored frame cutting an imposing silhouette against the spectral gloom of the ancient forest. His brow was furrowed with grim determination, for he had come to this accursed place on a quest of the utmost importance - to uncover the truth behind the disappearance of his most trusted knight, a man who had ventured into these woods and never returned.
As he delved deeper into the shadowed depths, the Warrior King could not shake the unearthly chill that crept up his spine, a sensation of being watched by unseen eyes. The very air seemed to thicken with a malevolent presence, as if the forest itself was alive and aware of his intrusion.
Yet the Warrior King was no coward. He had faced countless foes in his lifetime, from raging beasts to the armies of rival kingdoms. Surely, he thought, whatever horrors this cursed woodland held, he would be more than a match for them.
But as he pressed onward, the Warrior King soon discovered that the true dangers of this place lay not in physical threats, but in the insidious corruption of the mind. Strange whispers echoed through the trees, voices that promised power, wealth, and the very secrets of the universe itself. And try as he might to resist their siren call, the Warrior King found his resolve slowly eroding, his thoughts becoming clouded with visions of grandeur and ambition.
It was then that he stumbled upon the crumbling ruins of an ancient structure, its once-imposing walls now overgrown with twisted vines and moss. And there, amidst the fallen stones, he found the remains of his lost knight - a grisly sight that filled the Warrior King with a mixture of grief and dread.
But as he reached out to retrieve the fallen warrior's sword, a sudden chill gripped him, and he turned to behold a sight that would haunt his dreams for the rest of his days. There, before him, stood the Shrouded Watcher, its faceless cowl exuding an aura of pure, unadulterated terror.
The Warrior King tried to flee, to escape the Watcher's malevolent gaze, but his limbs were frozen, his mind gripped by a paralyzing fear. And as the Watcher's spectral form drew nearer, the Warrior King's sanity began to unravel, his thoughts consumed by visions of a dark and terrible power that lay at the heart of the forest.
In the end, the Warrior King's crusade ended not in triumph, but in utter madness. For as he gazed into the Watcher's soulless cowl, his mind was shattered, his very essence consumed by the weight of the forest's ancient secrets. And there, amidst the crumbling ruins, his broken body would remain, a grim reminder of the folly of those who dared to uncover the mysteries of this accursed place.
-
@ 16d11430:61640947
2025-01-16 07:02:25Kalaripayattu, one of the oldest martial arts in the world, is a system of combat that emphasizes precision, agility, and functional strength. At the heart of this ancient art lies Kaalukal, a series of leg movements that build strength, flexibility, and balance. These movements are not just combat techniques—they are a masterclass in biomechanical efficiency and functional conditioning. With modern sports science backing up the principles of Kaalukal, it’s clear why this training remains relevant for fighters, athletes, and anyone focused on longevity.
Breaking Down Kaalukal: The Anatomy of Movement
Kaalukal incorporates a range of movements designed to engage multiple muscle groups, build joint stability, and improve neuromuscular coordination. Below are key movements and their biomechanical implications:
- High Leaps (Mei Adavu)
Movement Description: Practitioners perform explosive vertical or diagonal leaps, often combined with twisting or spinning.
Muscles Engaged: Glutes, quadriceps, hamstrings, calves, and core.
Biomechanical Benefits:
Enhances power output through the stretch-shortening cycle, the mechanism behind plyometric efficiency.
Develops fast-twitch muscle fibers, crucial for explosive strikes and evasive maneuvers.
Improves landing mechanics, reducing the risk of ACL injuries—a common problem in high-impact sports.
- Wide Stances (Chuvadu)
Movement Description: Low, wide stances like the horse stance (Ashwa Vadivu) or elephant stance (Gaja Vadivu) are held for extended periods during practice.
Muscles Engaged: Quadriceps, adductors, glutes, hip stabilizers, and spinal erectors.
Biomechanical Benefits:
Strengthens the lower body while increasing isometric endurance.
Improves joint mobility in the hips and knees, essential for maintaining stability in dynamic movements.
Enhances proprioception, the body’s ability to sense its position in space, critical for balance in combat scenarios.
- Rotational Leg Swings (Kalari Pirichal)
Movement Description: Controlled leg swings performed in circular or linear trajectories, often with an emphasis on hip rotation.
Muscles Engaged: Hip flexors, extensors, abductors, adductors, and obliques.
Biomechanical Benefits:
Increases dynamic flexibility in the hips, allowing for high kicks and evasive maneuvers.
Strengthens the oblique sling system, a network of muscles that enhances rotational power—a key element in strikes and takedowns.
Promotes joint stability and reduces the risk of hip and groin injuries.
- Dynamic Lunges (Nadakkal)
Movement Description: Deep lunges performed with forward, backward, or lateral motion, often transitioning fluidly between stances.
Muscles Engaged: Quadriceps, glutes, hamstrings, calves, and core.
Biomechanical Benefits:
Develops unilateral strength, addressing imbalances between legs.
Enhances deceleration control, critical for rapid changes in direction during combat.
Strengthens the posterior chain, improving overall athletic performance and injury resilience.
- Heel-Lift Movements (Kannadi Nirutham)
Movement Description: Movements performed on the balls of the feet, emphasizing balance and agility.
Muscles Engaged: Calves, intrinsic foot muscles, and stabilizers in the lower leg.
Biomechanical Benefits:
Strengthens the ankle complex, reducing the risk of sprains and other common injuries.
Improves quick directional changes, a skill critical for both striking and grappling.
Enhances proprioceptive feedback for better reaction times.
Kaalukal and Modern Sports Science
The principles of Kaalukal align with contemporary understanding of sports science. Research shows that dynamic, multi-plane movements like those in Kaalukal enhance:
-
Muscle Activation Patterns: Movements like wide stances and lunges activate stabilizing muscles that are often neglected in linear exercises like squats or deadlifts. This creates a more balanced and injury-resistant athlete.
-
Elastic Energy Storage and Release: Explosive leaps leverage the stretch-shortening cycle, where muscles store elastic energy during loading (eccentric phase) and release it during unloading (concentric phase). This mechanism is the foundation of plyometric training, making movements more efficient and powerful.
-
Joint Health and Mobility: The low stances and rotational movements in Kaalukal improve joint range of motion and synovial fluid circulation, reducing the risk of arthritis and other degenerative conditions.
-
Neuromuscular Coordination: The fluid transitions between stances challenge the central nervous system, enhancing coordination and reaction time—key components for combat athletes.
Kaalukal and Longevity
Recent studies on muscle mass and longevity reveal a strong correlation between lower body strength and overall health. A 2019 study published in the Journal of Cachexia, Sarcopenia, and Muscle found that individuals with greater thigh muscle mass had a lower risk of mortality, even when controlling for other factors like cardiovascular health.
Kaalukal, with its emphasis on dynamic leg strength and balance, is an ancient blueprint for maintaining health into old age. Its combination of strength, flexibility, and functional movement creates a resilient body capable of withstanding the rigors of both combat and aging.
Application for Modern Fighters and Athletes
Modern athletes can incorporate Kaalukal-inspired training into their routines to reap its benefits:
-
Warm-Up Routine: Use rotational leg swings and dynamic lunges to prepare the body for high-intensity activity.
-
Balance Training: Incorporate wide stances and heel-lift movements to build stability and proprioception.
-
Plyometric Drills: Adapt high leaps into structured plyometric training for explosive power.
-
Barefoot Sessions: Train barefoot periodically to strengthen the feet and improve balance.
Conclusion: Kaalukal as the Foundation of Combat and Health
Kaalukal is not just a relic of ancient martial arts—it’s a scientifically validated system of training that builds strength, balance, and resilience. Its principles are as relevant for modern fighters as they were for warriors on ancient battlefields. By incorporating Kaalukal-inspired movements, athletes can optimize their performance, reduce injury risk, and build a body that will stand the test of time.
Combat, longevity, and health all start from the ground up. The legs are the foundation—train them with purpose, train them with precision, and the results will speak for themselves.
-
@ f8f6b6f7:94a101e0
2025-01-16 06:35:41With her white raven hair and dark attire, She walks with grace and Gothic fire. Her pale complexion, a porcelain dream, Her beauty, like nothing you’ve ever seen.
She dances in the moonlit night, Her gothic elegance, a mesmerizing sight. A queen of darkness, a mistress of the night, She enchants all with her otherworldly might.
With a heart full of passion and soul full of art, She wears her Gothic style like a work of art. She is unapologetic-ally herself, a true original, A Gothic gal, with a personality quite formidable.
Originally posted here
-
@ a012dc82:6458a70d
2025-01-16 06:13:16Table Of Content
-
A Mysterious 911 Call
-
The Investigation Begins
-
Zhong's Lavish Lifestyle
-
The Silk Road Connection
-
The Confrontation
-
The Shocking Revelation
-
The Verdict
-
Conclusion
-
FAQ
The world of cryptocurrency is filled with tales of overnight millionaires, innovative technology, and unfortunately, crime. One such tale that intertwines all these elements is that of Jimmy Zhong. From being a developer in the early days of Bitcoin to becoming one of its biggest thieves, Zhong's story is a roller-coaster ride that sheds light on the darker corners of the crypto universe. Here's a deeper dive into his intriguing journey.
A Mysterious 911 Call
In the college town of Athens, Georgia, the police department is accustomed to handling typical college town crimes. However, on the night of March 13, 2019, they received a call that was anything but ordinary. Jimmy Zhong, a 28-year-old known for his partying habits, was on the line, but not for reasons one might expect. Distressed and panicked, he reported a significant theft of cryptocurrency from his residence. This call, seemingly just another crime report, would soon unravel a web of deceit and expose a decade-long mystery surrounding one of the most significant crypto crimes ever committed.
The Investigation Begins
With the local police initially stumped by the intricacies of the crypto world, Zhong sought external help. Enter Robin Martinelli, a private investigator with a reputation for tenacity. As she delved into the case, surveillance footage from Zhong's home revealed a potential suspect who seemed to have intimate knowledge of the premises. This discovery led Martinelli down a path that suggested the thief might be from Zhong's own circle of acquaintances or friends. The very idea was something Zhong found hard to digest, as it hinted at a betrayal from someone he trusted.
Zhong's Lavish Lifestyle
Behind the façade of a modest bungalow in Athens, Zhong led a life of luxury that raised many eyebrows. His spending habits painted the picture of a man with deep pockets. From stays at the Ritz Carlton to shopping sprees at Louis Vuitton, from driving a Tesla to owning a lake house filled with extravagant amenities, Zhong's lifestyle was nothing short of opulent. Yet, the source of his wealth remained shrouded in mystery. He often alluded to his early involvement in Bitcoin mining, suggesting he had been part of the crypto revolution since its inception in 2009.
The Silk Road Connection
Parallel to Zhong's life of luxury, IRS agents were deep into an investigation of a massive 2012 hack. This hack had seen 50,000 bitcoins stolen from Silk Road, a notorious dark web marketplace. As the years passed, the value of these stolen bitcoins skyrocketed to a staggering $3 billion. The breakthrough in the case came unexpectedly when the hacker, in a momentary lapse, transferred some of the stolen funds to a crypto exchange. The account on this exchange was registered under none other than Jimmy Zhong's name, drawing him into the crosshairs of the investigation.
The Confrontation
With growing suspicions, IRS agents, in collaboration with the local police, decided to confront Zhong. They approached him under the pretense of assisting with his reported theft, but their ulterior motive was to probe deeper into Zhong's potential involvement in the Silk Road heist. Their visit to his residence was revealing. Not only did they discover a significant amount of bitcoin on Zhong's laptop, but the manner in which Zhong operated his systems also hinted at a deep familiarity with the crypto world.
The Shocking Revelation
The deeper the authorities delved into Zhong's background, the more astonishing the revelations became. It turned out that Zhong wasn't just a casual participant in the Bitcoin community; he was an integral part of its early days. Known as an "original gangster" or OG, Zhong had contributed to Bitcoin's development in its nascent stages. This revelation was both ironic and startling. A person who had been instrumental in shaping Bitcoin had also, allegedly, become one of its most significant adversaries.
The Verdict
The culmination of the investigations saw Zhong facing charges of wire fraud. After a guilty plea, he was handed a sentence of a year and a day in federal prison. While the U.S. government managed to seize the stolen bitcoins, the original theft that led Zhong to make that fateful 911 call remains an unsolved mystery to this day.
Conclusion
The tale of Jimmy Zhong serves as a stark reminder of the complexities and ambiguities of the cryptocurrency world. It's a realm where the lines between right and wrong can often blur, and where fortunes can be made or lost in mere moments. Zhong's journey from a Bitcoin developer to a billionaire thief is a testament to the unpredictable and often tumultuous world of digital currencies.
FAQs
Who is Jimmy Zhong? Jimmy Zhong is a former Bitcoin developer who later became known for his involvement in one of the biggest crypto thefts.
What was the nature of the crime? Zhong was implicated in a 2012 hack where 50,000 bitcoins were stolen from the Silk Road, a dark web marketplace.
How was he caught? A small transactional mistake led investigators to a crypto exchange account registered under Zhong's name, linking him to the stolen bitcoins.
What was his sentence? After pleading guilty to wire fraud, Zhong was sentenced to a year and a day in federal prison.
Is the original theft from Zhong's home solved? No, the theft that led Zhong to make a 911 call in 2019 remains unsolved.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
X: @croxroadnews
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 13e63e99:25525c6a
2025-01-16 04:19:03U.S. Labor Markets
The U.S. economy demonstrated resilience in December, adding 256,000 jobs, far exceeding expectations of 155,000. The unemployment rate remained steady at 4.1%, reflecting a strong labor market even as wage growth moderated to 3.9% year-over-year. This performance capped a robust year for U.S. employment, despite headwinds from tightening monetary policy and geopolitical uncertainties.
The jobs report reinforced expectations that the Federal Reserve may slow the pace of rate cuts in 2025. The Fed’s December meeting minutes indicated officials remain cautious about inflation risks, with Federal Reserve Governor Michelle Bowman stating that inflation remains “uncomfortably above” the 2% target. This hawkish stance, combined with resilient economic data, suggests interest rates could stay elevated longer than previously anticipated.
Investors reacted sharply to the report, sending equities lower on Friday as the implications for tighter financial conditions weighed on sentiment.
Equity Markets Under Pressure Amid Inflation and Policy Concerns
U.S. equities posted losses as inflation fears and political uncertainty dominated market sentiment. Began positively, with optimism around potential softening of trade policies under President-elect Donald Trump. However, this faded after Trump dismissed reports of a more lenient tariff stance.
Economic data further dampened optimism. The Institute for Supply Management’s (ISM) Services PMI for December came in at 54.1, signaling continued expansion in the services sector. However, the index’s prices-paid component jumped by 6.2 percentage points to 64.4, raising concerns about persistent inflationary pressures.
Treasury Yields Surged on Strong Jobs Data
U.S. Treasury yields climbed throughout the week and spiked on Friday following the strong labor market report. The benchmark 10-year Treasury yield reached its highest intraday level since November 2023. This movement reflects market expectations that the Fed will maintain higher interest rates for an extended period to combat inflation.
In the corporate bond market, investment-grade issuances were heavily oversubscribed, though spreads widened due to elevated supply. High-yield bonds mirrored equity market performance, trading in a mixed and cautious environment. Utilities gained attention amid California wildfires, adding to regional economic uncertainties.
Reference: T.RowePrice
The debut of US spot Bitcoin exchange-traded funds (ETFs) in 2024 marked a turning point for the bitcoin market and traditional finance, achieving unparalleled success in its first year. Approved by the US Securities and Exchange Commission (SEC) on January 10, 2024, these ETFs launched the following day, swiftly capturing the attention of institutional and retail investors alike.
Explosive Growth Surpassing Projections
BlackRock’s Bitcoin ETF reached $61 billion in assets under management (AUM) within a year—a feat that took its gold ETF two decades to achieve. This rapid growth reflects the pent-up demand for institutional-grade Bitcoin exposure. Investors were drawn to ETFs’ simplicity and familiarity, eliminating the challenges of self-custody while ensuring regulatory compliance.
Drivers of Success
Institutional Demand and Market Readiness
For over a decade, the bitcoin community anticipated a US spot Bitcoin ETF. Its launch fulfilled a significant market gap, providing institutions and sophisticated investors with a way to access Bitcoin without the risks and complexities of direct ownership.
Favorable Economic and Policy Environment
The 2024 macroeconomic backdrop amplified demand. Federal Reserve interest rate cuts eased financial conditions, while Bitcoin-friendly policies under President-elect Donald Trump added regulatory clarity. Analysts also pointed to the asset’s price recovery and upcoming events, such as the Bitcoin halving in April 2024, which historically drive price appreciation.
Global Trust in US Financial Markets
As the birthplace of ETFs and the largest capital market globally, the US offers unmatched liquidity and investor confidence. With ETFs managing over $10.5 trillion in AUM domestically—out of $15 trillion globally—the US is a natural leader in this space.
What Lies Ahead for Bitcoin ETFs?
Continued Growth in 2025
Market experts anticipate that 2025 will outperform 2024 as more professional investors gain access to Bitcoin ETFs. Bitwise CIO Matt Hougan noted that ETF adoption is often a multi-year process, with second-year inflows typically exceeding first-year figures. This pattern suggests significant upside potential for the market.
Expansion of Offerings
The competitive landscape is set to diversify, with multiple providers refining their offerings to cater to a broader audience. Features like staking-enabled ETFs and innovative custody solutions could become differentiators, attracting even more inflows.
The first year of US spot Bitcoin ETFs has redefined market standards, creating a benchmark for other jurisdictions. As these products evolve, they will likely remain at the forefront of the crypto and traditional financial worlds, offering a bridge between digital assets and institutional adoption.
Reference: Bitbo, Cointelegraph, Coinglass
1.Meta Shareholder Proposal Advocated Bitcoin Allocation to Hedge Against Inflation
A Meta shareholder proposal, submitted by Ethan Peck, calls for the company to allocate a portion of its $72 billion in cash and short-term cash equivalents to Bitcoin (BTC) as a hedge against currency debasement. The proposal highlights inflation’s erosive impact on Meta's cash holdings, claiming a 28% loss of value over time due to inflation. Peck underscored Bitcoin’s potential, noting its outperformance of bonds by 1,262% over the past five years.
In the proposal, Peck stated: “Mark Zuckerberg named his goats 'Bitcoin' and 'Max.' Meta director Marc Andreessen has praised Bitcoin and is also a director at Coinbase. Do Meta shareholders not deserve the same kind of responsible asset allocation for the Company that Meta directors and executives likely implement for themselves?”
Peck, an employee of the National Center for Public Policy Research — a Washington, D.C.-based think tank advocating free-market policies — has been involved in submitting similar Bitcoin treasury proposals to companies such as Microsoft and Amazon in 2024. However, the Meta proposal was submitted independently, representing shares owned by Peck’s family.
This proposal aligns with the growing trend of corporate Bitcoin adoption as a hedge against inflation, though it remains to be seen whether Meta’s board will entertain the idea.
Reference: Cointelegraph, The Coin Rise
2. DOJ Cleared to Sell Seized Bitcoin After Court Ruling
The U.S. Department of Justice (DOJ) has been authorized to sell tens of thousands of Bitcoins seized in the government’s largest-ever crypto asset confiscation.
On Dec. 30, a federal judge in the Northern District of California rejected a motion by Nevada-based venture capital firm Battle Born Investments to block the sale of Bitcoin valued at $6.5 billion. Battle Born had claimed rights to the assets, but the court ruled against the firm, effectively ending a years-long legal battle.
Seized Bitcoin Linked to Silk Road\ The 69,370 Bitcoins were confiscated in 2020 from an unidentified hacker, referred to in court as "Individual X." Federal agents traced the funds to the Silk Road, a notorious darknet marketplace dismantled in 2013. While the hacker's identity remains unknown, the government secured control of the funds.
Potential Government Auction\ Though the ruling does not mandate an immediate sale, the U.S. Marshals Service typically auctions off seized cryptocurrency, just as it does other confiscated assets like cars or real estate. A sale of this magnitude would be among the largest ever, potentially unsettling crypto markets. To mitigate market impact, the government has historically staggered auctions.
Last month, blockchain analytics firm Arkham Intelligence reported that U.S. government wallets moved $1.9 billion in Silk Road Bitcoin to Coinbase. While some investors feared an imminent sale, the move may be part of the government’s contract with Coinbase to manage digital assets.
Strategic Bitcoin Reserve Discussions\ The timing coincides with renewed political interest in Bitcoin under President-elect Donald Trump, a vocal crypto supporter. Trump has advocated for a national Bitcoin reserve as a hedge against inflation and encouraged investors to “never sell your Bitcoin.” Wyoming Senator Cynthia Lummis has also introduced legislation proposing the government purchase one million Bitcoin over five years. If the DOJ proceeds with the sale, it will add a significant chapter to the evolving intersection of cryptocurrency and government policy.
Reference: Yahoo Finance, The Crypto Times
Federal Reserve’s Michael Barr to Resign Amid Crypto Industry Scrutiny
Michael Barr, Vice Chair for Supervision at the US Federal Reserve, announced his resignation effective February 28 or earlier if a successor is appointed. His departure marks another high-profile exit tied to “Operation Chokepoint 2.0,” a controversial alleged effort to limit banking access for crypto firms.
Barr will remain a Federal Reserve Board Governor. In his resignation letter to President Joe Biden, dated January 6, Barr reflected on his tenure, during which he gained a reputation within the crypto industry for his critical stance on banks engaging with crypto assets. In a March 2023 speech, Barr stated: “We would likely view it as unsafe and unsound for banks to directly own crypto-assets on their balance sheets.”
Crypto Industry Reactions\ Barr’s resignation has elicited strong reactions from the crypto community. Senator Cynthia Lummis criticized his leadership, accusing him of facilitating Operation Chokepoint 2.0 and undermining Wyoming’s digital asset industry. Caitlin Long, CEO of Custodia Bank, labeled Barr the “Fed’s debanker-in-chief,” suggesting he was instrumental in the alleged campaign against crypto companies.
Nic Carter of Castle Island Ventures noted that many key figures linked to anti-crypto policies, including FDIC Chair Martin Gruenberg and SEC Chair Gary Gensler, have recently left their roles or faced defeat. Carter’s so-called "anti-crypto" list now includes a shrinking roster of figures such as Senator Elizabeth Warren and Federal Reserve Board member Michael Gibson.
Ongoing Investigations into Operation Chokepoint 2.0\ While US officials have denied orchestrating a campaign to debank the crypto industry, recent court orders granted Coinbase access to unredacted FDIC documents to investigate the agency’s role in the alleged initiative. Paul Grewal, Coinbase’s Chief Legal Officer, claimed the filings reveal a coordinated effort to suppress crypto activities ranging from Bitcoin transactions to more complex services. Former prosecutor and crypto advocate John Deaton has offered to lead an investigation into these actions under the incoming Trump administration, warning: “If unchallenged, such actions set a dangerous precedent, allowing regulatory bodies to quietly stifle innovation and economic opportunity.”
Reference: Cointelegraph
Launching the Chinese Version of "My First Bitcoin"
Over the past year, we've worked closely with the MiPremierBitcoin team to produce the Chinese version of Bitcoin Diploma My First Bitcoin . As the HCM team is based in Asia, we're passionate about connecting more people to Bitcoin and fostering its global adoption. We're thrilled to announce that the book will be launching soon! Stay tuned for more updates and join us on this incredible journey.
Unchained led the sponsorship for Max and Stacy Invitational
Unchained sponsored the Max & Stacy Invitational, a landmark event set to take place in El Salvador, the heart of the global Bitcoin movement. This gathering celebrates innovation, community, and the transformative potential of Bitcoin, embodying the vision championed by Max Keiser and Stacy Herbert. With the support of the community, we strive together to inspire continued progress toward the bitcoin future.
Reference: X.com
-
@ 16d11430:61640947
2025-01-16 03:16:12Will It Scale? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 1: The Basics)
When it comes to scaling, Web2 architectures rely on traditional centralized solutions: adding more servers, deploying load balancers, and utilizing CDNs. But scaling is costly and often inefficient.
Ethereum, the pioneer of DeFi, struggles with scalability due to its Proof-of-Stake (PoS) architecture and high fees, especially during peak times. Meanwhile, Solana boasts high throughput with low fees but has faced criticism for periodic downtime under heavy load. Lightning Network, built on Bitcoin, tackles scalability through off-chain transactions, enabling instant and cheap payments. Aeternity excels with state channels, allowing off-chain interactions while maintaining security and scalability.
When the question is "Will it scale?" Web2 stumbles, Ethereum gets expensive, Solana pushes hard but risks downtime, Lightning remains fast for payments, and Aeternity blends scalability with flexibility for smart contracts and oracles.
Will It Overload? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 2: Peak Demand)
Handling peak demand is a nightmare for Web2 systems. Auto-scaling might keep servers running, but the costs skyrocket, and outages can occur during sudden traffic spikes.
Ethereum's block capacity leads to congestion and sky-high gas fees during NFT drops or DeFi booms. Solana offers high throughput, but its monolithic design makes it vulnerable to overload and downtime. Lightning Network shines here, as its off-chain channels ensure seamless microtransactions even during high demand. Aeternity outpaces the rest with its state channel architecture, reducing on-chain congestion and enabling real-time interactions.
Under peak demand, Web2 buckles, Ethereum gets expensive, Solana may stall, Lightning remains reliable for payments, and Aeternity distributes load effortlessly for a seamless experience.
Will It Fail? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 3: Single Points of Failure)
Centralized Web2 systems depend on servers and databases, leaving them vulnerable to single points of failure (SPoFs). If a critical server goes down, the entire application can be paralyzed.
In blockchain ecosystems, decentralization minimizes SPoFs. Ethereum boasts strong decentralization but struggles with speed and scalability. Solana, while fast, compromises decentralization by relying on fewer nodes, raising concerns about centralization. Lightning Network is highly resilient for payments, but its reliance on node connectivity means it isn't entirely immune to outages. Aeternity's decentralized nodes and oracles ensure fault tolerance without compromising speed.
When failure isn’t an option, Ethereum resists well but gets slow, Solana risks centralization, Lightning thrives in payments, and Aeternity blends reliability with decentralization.
Will It Secure? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 4: Data Integrity)
Web2 security relies on firewalls and centralized databases, making breaches a constant concern. From data leaks to ransomware attacks, Web2 remains highly vulnerable.
Ethereum ensures security through cryptographic validation but suffers from phishing and smart contract exploits. Solana provides low-cost transactions but faces criticism for its centralization risks, which could undermine long-term security. Lightning Network prioritizes secure, private transactions for payments, but its reliance on custodial wallets introduces risks. Aeternity leverages cryptographic security and immutable records for unparalleled data integrity, while its state channels mitigate risks from on-chain congestion.
In the battle for data integrity, Web2 collapses, Ethereum secures with high costs, Solana trades decentralization for speed, Lightning secures payments, and Aeternity balances security with innovation.
Will It Innovate? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 5: Futureproofing)
Web2 systems evolve incrementally, hampered by legacy architecture. Meanwhile, blockchain ecosystems are leading the charge in innovation:
Ethereum introduced smart contracts and continues to innovate through layer-2 solutions like Optimism and zkSync.
Solana focuses on speed, catering to high-frequency traders and Web3 games. However, concerns over reliability and centralization linger.
Lightning Network revolutionizes Bitcoin by enabling microtransactions and instant payments, making it a frontrunner for financial applications.
Aeternity takes innovation further with oracles and state channels, enabling seamless real-world data integration and cost-effective, scalable smart contracts.
Web2 struggles to keep up, Ethereum pushes boundaries with layers, Solana races for speed, Lightning dominates payments, and Aeternity innovates across applications.
Conclusion: Web2 Cracks, Ethereum, Solana, Lightning, and Aeternity Compete
Each system has its strengths and weaknesses:
Web2 struggles with cost and centralization.
Ethereum leads in decentralization but suffers from congestion and high fees.
Solana offers speed but compromises decentralization.
Lightning Network excels in payments but isn’t built for generalized smart contracts.
Aeternity combines scalability, security, and real-world integration.
So, will it blend? In the end, the future belongs to solutions that balance scalability, security, and decentralization, and Aeternity is positioned to be a key contender in this space.
-
@ 16d11430:61640947
2025-01-16 02:22:51There was a catch—there was always a catch. The fiat businesses had built empires on sand, parading as indestructible titans while their foundations crumbled beneath them. They were too big to fail, they said, as if saying it loud enough could stop the tide. But the tide didn’t care, and the tide had a name: Bitcoin.
Bitcoin wasn’t the currency of criminals anymore, as the talking heads on television liked to parrot. No, it was the currency of mathematicians, engineers, and anyone else who figured out that trusting a bank to keep your money safe was like trusting a fox to guard your chickens. And while the fiat war machine churned along, chewing up lives with merciless efficiency, its disembodied body was writhing and bleeding out like a wounded ouroboros—an ancient snake devouring its own tail, too consumed by its gluttony to notice its inevitable demise.
The ouroboros wasn’t just dying. It was rotting.
The "Warscape of Disruption" was not kind.
The Ouroboros of Fiat
The fiat war machine, that hungry mouth, had always feasted on the lifeblood of ordinary people—wages diluted by inflation, savings eroded by fees, debts stretched out for eternity. The machine’s appetite was insatiable, gnashing and grinding through entire generations. Yet, the tail it chewed wasn’t just a metaphor; it was its own lifeline. Each bite it took to sustain itself weakened the system further, draining liquidity, trust, and time.
The result? A writhing, bleeding beast—a grotesque spectacle of a financial system that couldn’t stop destroying itself even as its days were clearly numbered. Bitcoin, like a sword forged from cryptographic steel, struck at the head of the ouroboros, severing the illusion that the system was sustainable.
The Fall of Fiat Empires
Imagine a city under siege. The walls are high, the defenses robust—or so they seem. Inside, the merchants continue their trade as if the invaders outside will simply get bored and leave. But Bitcoin does not leave. Bitcoin is a battering ram, each transaction a blow to the gates. It doesn’t stop, doesn’t sleep, doesn’t even care if it’s raining. The merchants inside—your Fortune 500s, your too-big-to-fails—sit around arguing over their spreadsheets, wondering why their liquidity is drying up.
And liquidity does dry up when your currency is no longer trusted. Why would anyone hold onto a rapidly devaluing asset when Bitcoin offers a deflationary alternative? Why leave wealth in the hands of a financial system designed to siphon it away? Fiat businesses scramble for answers, only to find themselves priced out of relevance.
DeFi: The Siege Engines
If Bitcoin is the battering ram, DeFi is the trebuchet, hurling innovations like smart contracts and yield farming over the walls of traditional finance. What once required entire armies of lawyers and brokers can now be executed in seconds on a blockchain. Borrowing, lending, insuring—these were the sacred pillars of fiat finance, and DeFi is smashing them to pieces with algorithms.
But the beauty—or terror, depending on which side you’re on—is that DeFi doesn’t even need to storm the gates. It builds new cities outside the walls, cities without kings or tax collectors, where every transaction is voluntary and transparent. These new cities—protocols like Aave, Uniswap, and MakerDAO—are thriving. Meanwhile, the old cities burn.
Critical Analysis: The End of Complacency
The fall of fiat businesses is not just a matter of technological disruption; it is a reckoning. They thrived for decades on inefficiency and opacity, extracting rents from consumers who had no other choice. But now there is a choice, and it is brutally efficient.
Yet, the decimation of fiat businesses raises questions:
-
Regulatory Resistance: Governments will not surrender their economic dominance without a fight. Will they embrace Bitcoin and DeFi, or attempt to stifle it through draconian regulation?
-
Inclusion or Exclusion: While Bitcoin and DeFi promise financial inclusion, their adoption requires technical literacy and access to the internet. Will the transition leave the less fortunate behind?
-
Moral Hazard: As DeFi dismantles gatekeepers, it also removes the safety nets. If everyone becomes their own bank, who will rescue those who make poor financial decisions?
The Fiat Future: A Ghost Town
The ouroboros is dying. Its mouth still chews, trying to wring out a few last drops of life from a system that no longer works. Its tail, now bitten to the bone, hangs limp. Fiat businesses are already on life support, relying on bailouts, artificial liquidity injections, and consumer apathy. But this system, like all empires, will fall.
Bitcoin does not care about your quarterly earnings. DeFi does not care about your brand equity. The warscape of the technology landscape will be leveled, and those who fail to adapt will be left behind as relics of a bygone era.
To paraphrase an old soldier, “If we don’t end fiat, fiat will end us.” But maybe that’s not such a bad thing. After all, the only businesses that will truly disappear are the ones that deserve to.
So, as the siege continues, the merchants of fiat have a choice: reinvent or die. But as anyone in DeFi will tell you, the smart money is already on the other side of the wall.
-
-
@ 000002de:c05780a7
2025-01-16 00:15:54I have had the same network setup for a long time now. Unifi stuff just works most of the time. I didn't really pick it. Its not open source and now that I have fiber and have been having some issues with some of the Unifi hardware its time to make the call.
Do I just upgrade with Unifi or start migrating to something more in line with what I value.
So I've been chatting with my very helpful colleges at Red Hat and after mentioning PfSense to them I was told to check out Opnsense instead.
- I want to slowly move to 10g network gear
- I need PoE switches that are 10g
- I want a robust firewall / router
- I don't really wanna build my router due to time
Currently looking at Protectli Buyer’s Guide who sell hardware that is pre-installed with many options. I haven't decided which one to get yet. I wanna buy with the future in mind though so 10g connections are a must and support for two WAN connection is as well. I'm glad I ran CAT6 in my house years ago instead of cheaping out.
After I replace my router / firewall I will want to replace my Unifi switches. I'm considering buying used Cisco switches from eBay.
Anyone have any advice on this plan or advice?
originally posted at https://stacker.news/items/851922
-
@ 16d11430:61640947
2025-01-15 22:03:41By a Humble Admirer of Reason and Revelation
In an age where the digital and metaphysical intertwine, Bitcoin emerges as more than a mere technological marvel; it beckons us to contemplate the profound relationship between faith and truth. This inquiry, inspired by the works of great philosophers such as Immanuel Kant and Thomas Aquinas, seeks to explore the interplay between Bitcoin, faith, and the divine truth.
Faith and Rational Certainty
Faith, in its essence, is often misunderstood. It is not mere blind belief but a rational assent to truths that transcend empirical verification. Immanuel Kant argued that reason sets the boundaries of what we can know, yet it also reveals the necessity of postulating certain truths—God, freedom, and immortality—for the coherence of our moral universe. In Bitcoin, we find a parallel. The network operates on cryptographic principles, open source code, and decentralized consensus mechanisms. Its participants, however, exhibit a form of faith—not in a centralized authority, but in the immutability of its mathematical foundation.
This faith is not irrational but deeply rooted in trust. The nodes and miners who uphold Bitcoin's ledger act in fidelity to its rules, a collective acknowledgment of truth beyond subjective influence. Bitcoin, therefore, embodies a kind of secular faith, where trust in a system replaces reliance on human arbiters.
The Immutable Ledger and the Divine Truth
Thomas Aquinas viewed God as the ultimate source of truth, whose divine law orders the cosmos. In Bitcoin, one might see a reflection of this divine order—a man-made system aspiring to transcend corruption, deceit, and centralization. The blockchain is immutable, a ledger where each transaction is sealed in time, immune to revision or manipulation. This echoes the divine truth: unchanging, eternal, and knowable through reason.
Yet Bitcoin also confronts us with a humbling realization. It is not divine; it is a human construct. Its immutability is contingent, not absolute. But in its operation, Bitcoin mirrors humanity's yearning for divine justice—a world where truth cannot be falsified, where accountability is woven into the fabric of existence.
The Role of Freedom
Freedom is a cornerstone of both faith and Bitcoin. Kant posited that moral law requires the freedom to act according to reason. Bitcoin, too, is a system predicated on individual freedom: freedom to transact without intermediaries, to store wealth beyond the reach of coercion, and to participate in a global economy unshackled by geographic or political constraints.
This freedom, however, is not anarchic. It is bounded by Bitcoin's rules, much like moral freedom is bound by divine law. The protocol demands adherence to its principles; deviation leads to exclusion. Here, Bitcoin becomes a microcosm of the moral universe, where freedom and law coexist in a delicate balance.
Bitcoin as a Test of Faith
Bitcoin also demands faith in the unseen. Its cryptographic foundations are abstract and inaccessible to most. To trust Bitcoin, one must trust the mathematics and the consensus that govern it—a faith akin to the theologian's trust in the coherence of divine revelation. This faith is tested by volatility, uncertainty, and the constant threat of human error or malice. Yet, like the pilgrim who endures trials to affirm their belief, Bitcoin participants persevere, drawn by a vision of a more just and truthful economic order.
The Eschatological Impulse
Finally, Bitcoin invites us to consider the eschatological—the end of things and the ultimate fulfillment of truth. In Christian theology, history moves toward a final reconciliation of all things in God. Bitcoin, while temporal, shares an eschatological impulse: it envisions a world where financial systems are no longer instruments of oppression but tools of liberation.
This vision is imperfect, as all human endeavors are. But it gestures toward the divine truth that undergirds all creation: that justice, transparency, and freedom are not merely human aspirations but reflections of a higher order.
Conclusion: Faith in the Age of Bitcoin
Bitcoin is not divine, yet it draws us toward the divine truth. It is a testament to human ingenuity and our unrelenting quest for systems that reflect the eternal values of justice and truth. To place faith in Bitcoin is not to worship it but to acknowledge its potential as a tool—a reminder of what humanity can achieve when it aligns its efforts with principles of truth and freedom.
In the end, faith and Bitcoin converge in their reliance on truth. One points us to the heavens, the other to the blockchain, yet both call us to live in fidelity to what is unchanging, just, and true. Thus, Bitcoin becomes not merely a technology but a philosophical and spiritual phenomenon, challenging us to reflect on the relationship between faith, reason, and the divine.
-
@ bf47c19e:c3d2573b
2025-01-15 21:44:0325.08.2020 / Autor: Marko Matanović
Istorija rudarenja bitkoina počinje ne toliko davne 2009. godine nastankom Bitkoin-a, odnosno od nastanka blokčejna kao tehnologije. U Satošijevom whitepaper-u spominje se pojam Proof-of-Work (PoW). U ovom sada već istorijskom dokumentu koji objašnjava funkcionisanje Bitkoin-a navodi se da će se Proof-of-Work sistem koristiti za validaciju blokova u Bitkoin blokčejnu (procesuiranje transakcija), a da bi blok bio “potvrđen” potrebno je da se izdvoji određena procesorska snaga. U suštini Proof-of-Work obezbeđuje sigurnost blokčejna tako što zahteva od korisnika da uloži odredjenu količinu rada kako bi bio nagradjen i omogućava dodavanje novih validnih transakcija u blok.
Da bismo poslali transakciju na Bitkoin mreži potrebno je da platimo određeni transaction fee, tj. naknadu za obradu i potvrđivanje same transakcije. Upravo ovaj transaction fee se distribuira rudarima kao podsticaj da rade svoj posao u najboljem interesu i po utvrđenim pravilima sistema, odnosno da koriste svoj hardver radi potvrđivanja (naših) transakcija na mreži. Transakcije sa većim izdvojenim transaction fee-jem će biti brže potvrđene na mreži jer će baš ta transakcija rudarima biti isplativija za potvrđivanje. Osim ove vrste transakcija rudari dobijaju i određenu nagradu za svaki potvrđeni blok.
Trenutni block reward je 6.25 BTC-a po potvrđenom bloku. Ovaj iznos se deli među svim rudarima na mreži proporcionalno njihovom učinku, što znači da što je više rudara na mreži to je njihova pojedinačna nagrada manja jer je veća konkurencija. Sem toga što se nagrada smanjuje sa većom konkurencijom povećava se i težina rudarenja. Nagrada za Bitkoin se smanjuje na određenom broju izrudarenih blokova i svaki put je nova nagrada dva puta manja od prethodne. Ovo je u kripto zajednici poznatije kao “Bitcoin halving” koji se odigrava otprilike na svake četiri godine, sa ciljem da svaki put upola umanji inflaciju samog bitkoina kako bi održao/povećao svoju vrednost.
Cene Bitkoina i nagrade po bloku
Istorija rudarenja bitkoina se može podeliti u nekoliko era koje prate razvoj kripto industrije kao celine. Ove ere se razlikuju po hardveru koji se koristio za rudarenja. Ukoliko se pitate zašto je uopšte bilo potrebno menjati, odnosno pojačavati hardver koji se koristi – razlog je povećanje težine kopanja usled popularizacije kriptovaluta i rudarenja kriptovaluta tokom vremena. Svake godine bio je potreban sve jači i bolji hardver kako bi se rudarenje isplatilo, prvenstveno jer je konkurencija (bila) sve veća, i samim tim više učesnika deli nagradu koja je posledično manja. To uglavnom znači da nam treba jači hardver kako bismo, kao rudari, uradili što veći deo posla na validaciji svakog bloka i maksimalno povećali nagradu koja sledi.
Istorija rudarenja bitkoina uopšteno se može podeliti na nekoliko celina: – Era procesora (2009 – 2010) – Era grafičkih kartica (2010 – 2011) – Era FPGA kartica (2011 – 2013) – Era ASIC uređaja (2013 – 2020)
Era procesora (2009 – 2010)
Ovo je početna era rudarenja koju karateriše korišćenje procesora koji se mogu naći u bilo kom laptopu ili desktop računaru. Prvobitna Satošijeva ideja je bila da svako na mreži koristi svoj procesor za rudarenje. Na početku ove ere rudarenje je pre svega bio veoma neobičan hobi. Satoši je želeo na taj način da bolje osigura stabilnost i sigurnost mreže. Prvi bitkoini koji su bili iskopani, bili su iskopani upravo pomoću procesora. Korišćen je sličan program kao program za mrežno otključavanje Nokia telefona zbog sličnog principa korišćenja SHA-256 funkcije za enkripciju. Svako ko je želeo je mogao da rudari bitkoin uz pomoć svog laptopa ili desktop računara.
Kako se sve više rudara priključivalo na mrežu i kako je postalo moguće zameniti prve bitkoine za fiat novac, javio se interesantan problem – procesori koji su u to vreme imali bolje performanse su mogli da izrudare više bitkoina, što ujedno znači da su bili profitabilniji. Sve više rudara je koristilo procesore jačih performansi što je rezultovalo povećanjem težine kopanja. Povećanje težine kopanja je značilo da su procesori slabijih performansi postali još manje isplativi, odnosno da će dobiti proporcionalno manje bitkoina. Ljudi koji su u ovo vreme rudarili na Bitkoin mreži su mogli na mesečnom nivou da zarade i više hiljada bitkoina u zavisnosti od tipa i broja procesora koji su koristili.
Naravno, tada je cena bitkoina bila višestruko manja nego što je sada. Bez obzira na malu cenu, određeni ljudi su uvideli potencijal u rudarenju i krenuli su sa nabavkom sve boljih i boljih procesora. Cilj je bio što isplativije rudarenje bitkoina sa što manjim ulaganjima. Na ovaj način smo dobili prve rudare i potpuno funkcionalnu Bitkoin mrežu.
AMD Phenom II procesor iz 2008. godine
Era grafičkih kartica (2010 – 2011)
Kako je potražnja za bitkoinom porasla, a on dostigao cenu od 10 centi u oktobru 2010. godine, pojavili su se prvi rudari koji su koristili grafičke kartice (GPU) za rudarenje umesto procesora. Pojedinci su otkrili da je ovaj način rudarenja mnogo efikasniji od rudarenja procesorom, a vest se brzo raširila. Za relativno kratko vreme težina kopanja je toliko porasla da se uopšte nije isplatilo kopati procesorom. Računari sa dobrom diskretnom grafičkom karticom koja se može koristiti za igranje video igara su ubrzo postale mašine za zaradu nove vrste digitalnog novca.
Tada je u svetu računarstva bila popularna opcija korišćenja dve grafičke kartice za bolje performanse u video igrama i programima koji su bili veoma zahtevni (npr. video produkcija ili 3D modelovanje), tako da je već postojala potrebna infrastruktura za rudarenje sa više grafičkih kartica. Što više grafičkih kartica u računaru to je zarada bila bolja. Ubrzo su se pojavili miningrig-ovi (računari specijalizovani za rudarenje) koji su imali od 4 do 8 grafičkih kartica. U početku ovo su bile po izgledu jako amaterski sklopljene mašine, ali su kasnije poprimile poseban i donekle standardizovan oblik.
Primer izgleda prvih mining rig-ova
Era FPGA kartica (2011 – 2013)
FPGA je skraćeno od field-programmable gate array. Konkretan hardver je dizajniran tako da korisnik može naknadno da ga prilagodi za određeni zadatak. Karakteristika ovih uređaja je brzo izvršavanje konkretne vrste zadataka koje može biti i do dva puta efikasnije od izvršavanja istog zadatka pomoću grafičke kartice. Ovaj potencijal zaintrigirao je rudare tog doba i sredinom 2011. godine otpočelo je korišćenje ovog hardvera za potrebe rudarenja. Obzirom na to da FPGA uređaji nisu toliko jednostavni za korišćenje za razliku od grafičkih kartica i procesora, u početku nije bilo puno ljudi koji su rudarili pomoću ovih uređaja. Kako je softver za rudarenje uz pomoć FPGA uređaja postajao sve dostupniji, rastao je i broj ljudi koji su na ovaj način zarađivali svoje bitkoine.
Naravno, velika efikasnost ovih uređaja i činjenica da daju dva puta bolje rezultate od grafičkih kartica samo je dodatno doprinela povećanju težine kopanja bitkoina, ali nisu FPGA uređaji doveli do toga da GPU rudarenje postane istorija rudarenja bitkoina. Do toga su doveli ASIC uređaji koji su stupili na scenu 2013. godine.
FPGA uređaj
Era ASIC uređaja (2013 – 2020)
ASIC uređaji su se prvi put pojavili 2013. godine i potpuno su preuzeli scenu rudarenja. Naime, ASIC je skraćeno od application-specific integrated circuit što znači da su ASIC uređaji posebno pravljeni za rešavanje jedne vrste zadatka. Mana ovog pristupa je to što se ASIC uređaji ne mogu koristiti ni za šta drugo osim za rudarenje uz pomoć određenog algoritma. Prednosti ovih uređaja su višestruko bolje performanse i veoma laka instalacija. Nije bilo potrebno razumeti se u hardver za korišćenje ASIC uređaja. Rudari bi samo naručili ove mašine i uključili ih. Odjednom svako je mogao da rudari na Bitkoin mreži uz minimalan trud. To je rezultiralo povećanjem težine kopanja do te mere da su svi prethodno navedeni načini rudarenja postali (skoro) potpuno neisplativi za kopanje bitkoina.
Istorija rudarenja bitkoina pamti nekoliko firmi koje su se bavile prozvodnjom ASIC uređaja među kojima je i današnji gigant Bitmain. Trka za najboljim ASIC uređajem je dovela do gašenja velikog broja firmi jer su samo firme sa kompetentim proizvodom mogle da opstanu na tržištu. Što je veći broj određenog modela bio proizveden, to su troškovi njegove proizvodnje bili manji, tako da manje firme nisu imale puno šanse da opstanu kao ozbiljni konkurenti u ponudi uređaja rudarima.
Prvi ASIC-i su bili u obliku USB uređaja. Bili su bez ventilatora, bez buke i uz minimalnu potrošnju struje. Rudari su ubrzo krenuli da prave prve farme za rudarenje uz pomoć ovih malih uređaja – nekoliko desetina njih povezanih na isti računar uz pomoć USB hub-ova davali su maksimalne performanse. Sa porastom težine kopanja, sve bolji i bolji ASIC-i su zauzimali svoja mesta u garažama i skladištima rudara dok su stari bili prodavani po znatno manjim cenama.
Prve ASIC farme
ASIC uređaji su se razvijali kako je potreba za sve jačim mašinama rasla. Ova era i dalje traje, a ASIC uređaji danas pružaju nekoliko hiljada puta bolje performanse od prvih procesora koji su bili korišćeni 2009. godine. Nove generacije ASIC-a su uvek veoma isplative, ali treba uzeti u obzir i veoma veliku cenu novih ASIC uređaja kao i činjenicu da novi modeli izlaze na svakih nekoliko meseci što smanjuje profitabilnost starih modela.
Izgled današnjeg ASIC uređaja
Ovi uređaji će ostati dominantni na sceni Bitkoin rudarenja i nema naznaka da će se to promeniti u skorije vreme. U sledećem blogu o rudarenju bitkoina i kriptovaluta uopšte ćemo proći kroz način(e) za postavljanje rig-a za rudarenje i trenutno dostupne opcije na domaćem tržištu. Takođe ćemo pokriti određene modele i procene profitabilnosti rudarenja bitkoina u 2020-oj godini.
-
@ 7f2d6fd6:64710921
2025-01-15 21:17:01Tendrils of mist clung to the gnarled trees, casting an otherworldly pall over the ancient forest. In the heart of this spectral woodland, a being of unspeakable horror lurked, its very existence a blight upon the natural order.
They called it the Shrouded Watcher - a faceless spectre draped in tattered robes of ebony, its empty cowl concealing an abyss of dark power. For those rare few who had glimpsed its dread form, the memory was seared into their minds, a vision of pure, unadulterated terror.
The Shrouded Watcher's origins were shrouded in mystery, lost to the mists of a bygone age. Some whispered that it had once been a mortal man, corrupted by forbidden knowledge and a thirst for unholy power. Others claimed it was a manifestation of the forest's own malevolent spirit, a physical embodiment of the darkness that permeated this cursed place.
Whatever its true nature, the Watcher guarded jealously the arcane secrets of the woods, unleashing its wrath upon any who dared to trespass. Mortal flesh could not withstand the touch of its spectral form, for its very presence was a blight upon the living. Those who gazed into its soulless cowl were driven mad, their sanity shattered by the sheer weight of its malevolent power.
In the deepest, most remote reaches of the forest, where the trees grew twisted and gnarled, the Watcher kept its eternal vigil. Its presence was heralded by a bone-chilling chill that crept through the air, a sensation of being watched by unseen eyes. And woe betide the unfortunate soul who heard the distant, unearthly wail that echoed between the ancient trunks - for it signaled the Watcher's approach, and the imminent arrival of a fate worse than death.
None dared to challenge the Shrouded Watcher, for it was a creature born of the darkest corners of the human psyche, a manifestation of our deepest, most primal fears. To confront it was to stare into the abyss, to risk being consumed by the very essence of terror itself.
And so the Watcher remained, a sentinel of the forest's arcane secrets, its true nature forever hidden beneath the folds of its ebony shroud. Those who ventured too deeply into the woods would never return, their broken forms left to rot as a grim warning to all who would dare to uncover the mysteries of this accursed place.
-
@ 7f2d6fd6:64710921
2025-01-15 21:16:48Deep within the ancient, foreboding forest, where the canopy of twisted oaks blotted out the sun's light, a being of immense power and arcane knowledge dwelled in solitude. Geldar the Wizard, a diminutive yet formidable figure, had made this dark woodland his domain, guarding its myriad secrets from the prying eyes of mortal men.
For centuries, Geldar had studied the occult lore of the elder races, delving into the forbidden knowledge of realms beyond the ken of common folk. His small but agile form belied the potent sorcery that coursed through his veins, a legacy of his elven heritage intertwined with darker, more primal energies.
Now, as he moved silently through the shadowed trees, Geldar could sense a disturbance in the delicate balance of his woodland sanctuary. Some trespasser had breached the arcane wards that cloaked his hidden abode, drawn perhaps by rumors of the ancient power that slumbered within.
With a subtle gesture of his gnarled, spidery hands, Geldar conjured a shimmering orb of eldritch light, its eerie radiance illuminating the gnarled trees that crowded around him. His sharp, elfin features were set in a stern expression as he scanned the gloom, searching for any sign of the intruder.
Suddenly, a movement in the periphery of his vision - a fleeting shadow darting between the twisted trunks. Geldar's eyes narrowed, and with a muttered incantation, he unleashed a burst of arcane energy that lanced through the forest. The spell struck true, and a strangled cry echoed through the trees as the hapless trespasser was ensnared in a web of sorcerous energy.
Gliding forward on silent feet, Geldar approached the struggling form, his expression inscrutable. "So, another foolhardy mortal has dared to trespass in my domain," he murmured, his voice a soft, rasping whisper. "You have stirred the wrath of the ancients, human. Now you shall face the consequences of your folly."
With a dismissive gesture, Geldar wove a new spell, his fingers tracing intricate patterns in the air. The captive's cries grew more frantic as dark tendrils of power began to envelop him, slowly draining the life from his body.
As the last vestiges of the man's life force ebbed away, Geldar allowed himself a thin, humorless smile. "The forest keeps its secrets well," he murmured, his gaze sweeping the surrounding gloom. "And I shall ensure that no others dare to uncover them."
Turning, the diminutive wizard melted back into the shadows, his arcane power once more cloaking the ancient woodland in its impenetrable veil of mystery and dread.
-
@ 7f2d6fd6:64710921
2025-01-15 21:16:25The ancient forest whispered with the echoes of a dark and terrible power - a presence that had endured for untold centuries, its malevolent influence seeping into the very fabric of the woodland. And at the heart of this spectral domain, enthroned amidst the gnarled roots and twisted trees, sat the Lich Queen.
Her name had been lost to the ravages of time, but the aura of dread and reverence that surrounded her was undeniable. Clad in robes of ebony and bone, her skeletal visage adorned with a crown of spiked obsidian, she radiated an aura of primal, unnatural might. Around her neck hung an amulet of immense power, its gemstone glowing with an eldritch light that cast her pale features in an unearthly glow.
The Lich Queen's origins were shrouded in mystery, whispers of a dark pact made long ago with forces beyond mortal understanding. It was said that she had once been a mortal sorceress, driven by ambition and a thirst for knowledge to delve into the most forbidden realms of magic. But in her quest for power, she had crossed a line, bartering her very soul to attain the gift of immortality.
Now, as the centuries passed, she sat enthroned in her domain, her skeletal minions and nightmarish abominations ever at her command. Her icy gaze swept the forest with a detached, predatory hunger, as if searching for the next unfortunate soul to fall victim to her machinations.
For those who dared to trespass in her domain, the Lich Queen's wrath was a fate worse than death. With a casual gesture, she could summon legions of undead horrors to tear the intruder apart, their agonized screams echoing through the shadowed trees. And for those who managed to flee her presence, the torment was far from over - for the Lich Queen's curse would haunt their every step, slowly draining the life from their bodies until they succumbed to the eternal embrace of the grave.
None dared to challenge the Lich Queen's dominion over the forest, for her power was absolute and her hunger for arcane knowledge insatiable. Even the Shrouded Watcher, that dread specter of the woods, was said to cower in her presence, for the Lich Queen commanded forces beyond the understanding of mortal men.
And so the ancient forest remained a realm of shadow and terror, its secrets guarded by the Lich Queen and her unholy retinue. Those who ventured too deep into the woods, drawn by tales of forgotten treasures or ancient lore, would never return - their fates sealed by the unyielding grip of the Lich Queen's power.
-
@ 7f2d6fd6:64710921
2025-01-15 21:16:06Deep within the ancient forest, a dark and unearthly power held sway - a triumvirate of malevolent entities that commanded the respect and fear of all who dared to trespass in their domain.
At the center of this unholy alliance was the Lich Queen, her skeletal visage adorned with a crown of obsidian and the amulet of power that was the source of her immortal, arcane might. Enthroned amidst the gnarled roots and twisted trees, she reigned over the forest's denizens with an iron fist, her icy gaze sweeping the shadows for any sign of intrusion or defiance.
Arrayed at her sides were two other figures of pure terror - the Shrouded Watcher, a faceless spectre draped in tattered robes of ebony, and the elven wizard who had made a pact with the very essence of the forest itself. Together, this unholy triumvirate maintained an uneasy balance of power, each entity commanding its own dominion within the woodland.
The Shrouded Watcher, its empty cowl concealing untold horrors, was the guardian of the forest's most ancient and treacherous secrets. Its mere presence was enough to drive mortals to the brink of madness, and its spectral touch could shatter the sanity of even the bravest of souls. None dared to trespass in the deepest, most remote reaches of the woods, for that was the Watcher's domain.
And yet, even the Watcher's dread power paled in comparison to the Lich Queen's command of necromantic sorcery. With a mere gesture, she could summon legions of undead horrors to tear apart any who dared to challenge her rule. Her curse could slowly drain the life from the most stalwart of warriors, leaving them to rot as grim warnings to all who would seek to uncover the forest's darkest mysteries.
But the elven wizard, with his intimate connection to the very spirit of the woodland, was no less a force to be reckoned with. His arcane knowledge granted him the ability to manipulate the natural world, summoning vines and roots to ensnare and entrap any who would dare to trespass. And his mastery of illusion and deception made him a cunning and elusive adversary, able to lure the unwary deeper into the forest's shadowed embrace.
Together, this unholy triumvirate maintained a fragile balance of power, each entity jealously guarding its own domain and secrets. Should one of them fall, the others would surely seek to claim the vacant throne, unleashing a cataclysmic struggle for supremacy that would plunge the forest into an era of unimaginable darkness and terror.
None dared to challenge this unholy alliance, for to do so would be to invite the wrath of forces beyond mortal comprehension. The forest remained a realm of shadow and dread, its secrets guarded by the Lich Queen, the Shrouded Watcher, and the elven wizard - a triumvirate of pure, unadulterated evil that would brook no intrusion or defiance.
-
@ 3ad01248:962d8a07
2025-01-15 19:03:50I know with the hype around Trump's election victory and the pro-Bitcoin people that he has surrounded himself with as of late, the idea of a Bitcoin Strategy Reserve or BSR is an intoxicating idea among many Bitcoiners.
I don't blame Bitcoiners from being happy about it, how can you not be? After enduring the last 4 years of vicious crackdown, arbitrary rules from the SEC and outright hostility to the Bitcoin community in general it is nice to have an administration that is simply nice to us and wants to leave the community alone to do it own thing.
While I am excited to see what a new Trump administration looks like for Bitcoin over the next four years, I am not onboard with a BSR. I think that the BSR is bad policy and supports the system that we are trying escape from in the first place.
In my opinion I believe a BSR signals to the world that the government doesn't believe in its own currency or its ability to reign their spending problem. Even the mere signaling that America is going to create a BSR has sent other countries scrambling to create one of their own. This is incredibly bad news for the US bond market.
Who are the buyers of US bonds right now? A huge component of the market is foreign governments. Even though they have been less willing to buy US bonds over the last couple of decades most governments are still in the market buying up US debt.
Now imagine of these foreign buyers start buying Bitcoin in small amounts at first and slowly scale into Bitcoin in a big way once they see the insane price action. They will FINALLY get it and once that happens its over the dollar. This is a gradually then suddenly like moment that no one is ready for at the moment.
So if you take way the foreign buyer of US bonds, who are you left with? The Federal Reserve. Having the Federal Reserve directly buying up government debt is huge sign of monetization of the debt to the world and doesn't bode well for the future of America or the world.
As you can see setting up a BSR would be highly destabilizing in the short term and could create a whole slew of knock on effects that no one is prepared or equipped to deal with.
In addition to destabilizing an already fragile economic environment, why do we want this big ass government to have Bitcoin in the first place? So they can keep on oppressing the working man/woman, crushing innovation and generally being a tick on the back of the private sector? How about we not empower them to keep spying on us and the world.
I want to live in a world where war impose heavy costs on leaders and governments and peace is the default setting of the world. Governments using Bitcoin to prop up their tyrannical ways is not why Bitcoin was created. You know that. I know that. The rest of the world should know that.
Bitcoin was created as an electronic p2p system that allows anyone to transact regardless of artificial borders or political differences. Bitcoin allows anyone to transact globally without the grubby hands of the government trying to take a cut. We need less government, not more.
I'm personally not a fan of governments or big money institutions getting into Bitcoin as I feel its like letting the fox into the hen house but that ship has sailed. The best we can hope for now is to create enough individual adoption that it makes it hard for governments to get a large amount of Bitcoin so they can act as a check on the accumulation of Bitcoin.
HODL culture is needed now more than ever. Don't hand over your Bitcoin to tyrants. Stack sats. HODL. Create the change you want to see in the world.
-
@ c21b1a6c:0cd4d170
2025-01-15 18:04:31Hello everyone, as part of the nostr:npub10pensatlcfwktnvjjw2dtem38n6rvw8g6fv73h84cuacxn4c28eqyfn34f grant I have to write a progress report for Formstr, I thought I'll use this opportunity to do a nostr blog! , Something I've been meaning to do for sometime, hopefully I don't bore you.
Introduction
There was a lot of work ahead of us even before we got the grant, and we tried to tackle it heads on. We completely changed the underlying mechanism of storing and fetching forms. Whereas previously a form was a kind 0 event, same as a profile event. The form is now created and responded to in the mechanism as outlined in the Forms NIP. This had to be done while making sure that none of the older forms broke during the process. The new specification helps streamline the forms usecase to expand to access control, private forms, upgrade to nip44 encryption. Some of these features existed as Proofs of Concepts prior to this quarters work, the major tasks were to streamline and production-ize them, to be able to release it to the public. We were also joined by nostr:npub1vf6wyw9j38sm96vwfekwvqxucr9jutqrmwdc2qnql79a66al9fzsuvt9ys who along with nostr:npub15gkmu50rcuv6mzevmslyllppwmeqxulnqfak0gwud3hfwmau6mvqqnpfvg helped move the project along.
How did we spend our time.
Released a major Formstr Update (16/12/204): - Release PR: This Release Contained The Following Changelog: - Move Form Creation and Rendering to New Event - Upgrade Response Encryption to NIP-44. - Add Ability to create private forms. - Add ability to send private form access as Gift Wraps. - Create a new dashboard UI to incorporate new form types. - Add ability to login to formstr - Use naddr to encode form Urls instead of pubkey(centralized).
Work done to production-ize these features can be found in the following PRs: 1. Save forms to local device automatically 2. Ability to remove participants in Access Control UI 3. Revamp Responses Page according to NIP-101 4. Add a "My Forms" Section on the dashboard 5. Add UI for Inserting Images 6. Using Naddr Instead of pubkey as formId
In addition to these there were multiple bugfixes and patches that I've excluded for brevity.
Major Challenges
We were in "beta hell" for a long time, even though I had finished rudimentary versions of each of the features in advance (some to test the viability of the forms NIP). Incorporating them into the running version proved to be a challenge. We realized that some of the features required major UI changes, and a lot of new features broke previously working desirable features such as NIP-04 Notifications. A lot of work like this had to be done to ensure formstr brought in new features while continuing to work exactly as old users liked it.
What's left and what's coming?
From the wish-list items I had committed during the application a few major ones remain: - Edit Past Forms. - Paid Surveys. - Support for NIP-42 Private Relays. - Conditional Rendering of form fields - Sections
Of these I'm happy to report that we've already begun work on conditional rendering of fields (https://github.com/abhay-raizada/nostr-forms/pull/199)
What is de-prioritized?
Going with experiences from quarter 1, we are de-prioritizing Formstr Integrations with 3rd party services like Ollama (Self Sovereign AI) and business tools like Slack, Notion etc. We'll try to get to it, but it's less of a priority compared to other features!
How the funds were used.
- Paying Individual Contributors for PRs submitted.
- Living Expenses
-
@ 8b9eb61d:09434328
2025-01-15 17:42:17As men age, maintaining optimal vitality becomes essential for a fulfilling life. At TESTO - Herbal Vitality, we offer a range of natural solutions designed to help men maintain energy, confidence, and balance. From vitamins that support testosterone to libido supplements in NZ and horny goat weed for men, our products offer natural ways to support male health. In this article, we’ll explore how these supplements can help enhance your well-being.
How Can Vitamins That Support Testosterone Improve Men’s Health?
Testosterone is a key hormone that influences many aspects of men’s health, including muscle mass, energy levels, and sexual wellness. As men age, their testosterone levels naturally decrease, which can lead to reduced vitality and performance. To combat this, it’s important to include vitamins that help maintain testosterone levels.
Vitamins such as Vitamin D, Zinc, and Magnesium are crucial for supporting testosterone production. Vitamin D, for example, has been linked to better testosterone levels, while Zinc and Magnesium play important roles in hormone regulation. Our herbal formulations combine these essential nutrients to help men naturally maintain their testosterone levels, supporting long-term vitality and a better quality of life.
Incorporating vitamins that support testosterone into your daily routine can help you feel more energised, maintain physical strength, and improve overall wellness.
What Are Libido Supplements in NZ and How Can They Benefit You?
Libido plays a crucial role in maintaining healthy relationships and personal well-being. As men age, their libido can decline due to hormonal changes or stress. This is where libido supplements in NZ come into play. At TESTO, our libido supplements are crafted to naturally support sexual health, enhance performance, and boost energy levels.
Our supplements are made from powerful herbs traditionally used to support male sexual health. These ingredients help improve blood circulation, support hormone balance, and provide a natural energy boost. By choosing libido supplements in NZ, you can promote better sexual health and confidence. In addition, our libido supplements are safe, effective, and made with high-quality, natural ingredients. They offer an ideal solution for those looking to support their overall well-being and improve performance naturally.
Why Is Horny Goat Weed for Men So Effective?
Known for its long history in traditional medicine, horny goat weed is a powerful herb used to enhance stamina, support sexual health, and boost energy levels. It contains icariin, a compound believed to improve blood flow and enhance endurance.
Horny goat weed has been widely used for centuries in Chinese medicine to promote vitality. This herb works by supporting circulation, which helps men feel more energised, both physically and mentally. Whether you're looking to increase stamina during workouts or improve performance in the bedroom, horny goat weed for men offers a natural solution to support your health.
Why Choose Natural Supplements for Your Health?
At TESTO - Herbal Vitality, we believe in the power of natural ingredients to support men’s wellness. Our products, including vitamins that support testosterone, libido supplements in NZ, and horny goat weed for men, are designed to provide safe, effective solutions for boosting vitality, energy, and sexual health.
By integrating these supplements into your routine, you’re taking steps toward improved wellness and a healthier lifestyle. We use high-quality, natural ingredients to ensure you receive the best possible results without harmful side effects.
Start your journey toward revitalisation with TESTO and enjoy the benefits of natural, holistic wellness. Whether you're aiming to boost your testosterone levels, support your libido, or enhance your overall vitality, we have the right solutions for you.
-
@ e968e50b:db2a803a
2025-01-15 16:59:56I feel like I'm just full of newbie questions for stacker news this week. Sorry.
I recently took the killer pleb devs courses and now confidently feel like I have some programming skills kinda-sorta (the classes are great, but I was starting from 0) under my belt. My end goal was to stick it to the man and be a part of the bitcoin revolution. That said, I've made a couple of projects that I really want to share with more folks, but would like to actually make them into cooler sites.
For my actual long-term business, I've been renting a domain name for decades and never thought too much about it since it was a business expense and I really didn't care what happened to it after I was gone. However, for these fun coding projects, I wanted to get a domain so that everything doesn't end in .onrender or .vercel.app and I assumed that since I was using a more silly name, it'd be cheap to just by something forever. But that doesn't seem to be the case. In fact...as most of you know...but which is news to me, you can't actually buy domains forever at all. Am I correct about this? If so, doesn't that mean the whole decentralized nature of the internet is a sham? I'm feeling very confused and not finding much helpful info.
My goal is to buy a landing page for a bunch of bitcoin-themed games I've built (something like bitcoingames.stupid) and my nostrminusnostr client, something like nostrminusnostr.nostr. Anyway, I found some stuff in the range I'd be willing to spend on Vercel, but am just a little confused how domain hosting actually works.
originally posted at https://stacker.news/items/851425
-
@ f9c0ea75:44e849f4
2025-01-15 16:42:53Em 2007, o Brasil comemorava o fim da CPMF (Contribuição Provisória sobre Movimentação Financeira), um imposto que, embora "temporário", durou 10 anos e arrecadou centenas de bilhões de reais. Na época, o governo afirmava que a contribuição era necessária para financiar a saúde pública, mas, na prática, foi mais um peso sobre o cidadão e as empresas.
Agora, quase duas décadas depois, o cenário está mudando novamente. O monitoramento financeiro da Receita Federal sobre transações acima de R$ 5 mil e a implementação do DREX, a moeda digital programável do Banco Central, sugerem que o controle sobre o dinheiro nunca foi tão grande.
A pergunta que fica é: será que estamos caminhando para uma nova CPMF, só que digital e automatizada?
O Passado: CPMF e o Controle Estatal sobre o Dinheiro
\ A CPMF nasceu sob o pretexto de ser um imposto temporário, com uma alíquota pequena (inicialmente 0,20%, depois 0,38%) que incidiria sobre qualquer movimentação bancária. Seu objetivo oficial era financiar a saúde, mas a verdade é que o governo encontrou nela uma mina de ouro de arrecadação, garantindo bilhões de reais anualmente.
Os problemas começaram a aparecer rapidamente:
- O custo era repassado aos preços dos produtos e serviços, afetando toda a economia.
- Empresas e cidadãos pagavam sobre transações repetidas, tornando a carga tributária ainda maior.
- O dinheiro não foi totalmente para a saúde, sendo usado para tapar buracos no orçamento.
- A promessa de temporariedade caiu por terra, e a CPMF durou uma década.
- O governo insistia que não existia outro jeito de arrecadar sem essa cobrança, mas, quando foi extinta, nada desmoronou. Só ficou mais difícil tributar o cidadão sem que ele percebesse.
Agora, vemos novos mecanismos de controle financeiro surgindo. O argumento é o mesmo: transparência, combate à sonegação e otimização da arrecadação. Mas será que é só isso?
O Presente: Receita Federal Fecha o Cerco sobre Suas Transações
\ A partir de 2025, qualquer movimentação acima de R$ 5 mil para pessoas físicas e R$ 15 mil para empresas será automaticamente informada à Receita Federal. Isso significa que se você fizer uma transferência maior que esse valor, o governo já saberá sem precisar pedir dados ao banco.
Oficialmente, essa medida não implica na criação de um novo imposto. Mas, se a história nos ensina algo, é que governos não implementam esse nível de monitoramento à toa. Algumas questões que surgem:
- Se não é para tributar, por que monitorar tão de perto?
- Se a CPMF foi extinta, por que voltamos a um sistema de rastreamento financeiro tão intrusivo?
- Esse é só um primeiro passo para um imposto automático sobre movimentações digitais?
O Futuro: DREX e a Automação da Tributação
\ O DREX, a versão digital do real, será um grande passo para o controle financeiro estatal. Diferente do Pix, que apenas facilita transferências, o DREX permite que o Banco Central programe e rastreie cada centavo movimentado.
E o que isso significa para o cidadão comum?
- Pagamentos e tributações automáticas: um sistema de split payment poderia fazer com que impostos fossem cobrados diretamente na fonte, sem a necessidade de declarações ou boletos.
- Controle total sobre transações: diferente do dinheiro físico, que circula sem monitoramento, o DREX permitirá ao governo rastrear qualquer pagamento, em tempo real.
- Possibilidade de limitação de uso: com uma moeda programável, poderia haver restrições sobre onde, quando e como você pode gastar seu dinheiro.
O Banco Central e a Receita Federal garantem que não há planos de usar o DREX para tributação compulsória, mas a CPMF também começou assim: como algo temporário, necessário e inofensivo.
Estamos Caminhando para uma Nova CPMF Digital?
\ Se analisarmos a trajetória do governo na questão tributária, fica claro que:
- Primeiro, nega-se qualquer imposto novo.
- Depois, implementa-se um sistema de monitoramento, supostamente para "combater fraudes".
- Por fim, a tributação é introduzida sob a justificativa de que "não há outra saída". A CPMF só funcionou porque o dinheiro passava pelo sistema bancário e era fácil de rastrear. Agora, com o DREX e o monitoramento da Receita, o governo não precisaria nem de um imposto explícito para tributar transações—ele poderia simplesmente automatizar a cobrança diretamente na moeda digital.
O que antes dependia de aprovação no Congresso e resistência da população, pode agora ser feito com um simples ajuste de software no Banco Central.
O governo diz que isso não está nos planos. Mas se olharmos para trás, essa é exatamente a mesma narrativa que ouvimos antes da CPMF entrar em vigor.
Seu Dinheiro, Seu Controle?
\ O Brasil está entrando em uma nova era financeira. O monitoramento de grandes transações e a implementação do DREX podem representar um avanço na transparência e na eficiência econômica, mas também criam um risco real de perda de liberdade financeira e tributação automatizada.
O que aconteceu com a CPMF deve servir de lição: o que começa como uma simples ferramenta de arrecadação pode se transformar em um peso permanente sobre o cidadão.
Se o governo tiver a tecnologia e a infraestrutura para tributar automaticamente, quanto tempo levará até que eles resolvam usá-la?
-
@ 8d34bd24:414be32b
2025-01-15 16:29:24Many times people wonder “Why do we have to obey God?” or “Why should we submit to Jesus’s lordship?” or “Why is Jesus the only way to Heaven?” Although there are many reasons, they can all be summarized in Him being our creator.
Today, I was listening to “The End Times” podcast with Mark Hitchcock and he was discussing Revelation chapter 4. Among other things, he read this passage:
And the four living creatures, each one of them having six wings, are full of eyes around and within; and day and night they do not cease to say,
“Holy, holy, holy is the Lord God, the Almighty, who was and who is and who is to come.”
And when the living creatures give glory and honor and thanks to Him who sits on the throne, to Him who lives forever and ever, the twenty-four elders will fall down before Him who sits on the throne, and will worship Him who lives forever and ever, and will cast their crowns before the throne, saying,
“Worthy are You, our Lord and our God, to receive glory and honor and power; for You created all things, and because of Your will they existed, and were created.” (Revelation 4:8-11) {emphasis mine}
God deserves our worship and our obedience because He is our creator. As creator, He has the right to command us to obey. Also as creator, He knows what is best for us because He created us and everything around us. He created us with a purpose and we will never know complete joy and peace until we obey Him and work according to the purpose He created us to fulfill.
If God was just a superhero type God, who was stronger and smarter than us, then He wouldn’t have a right to authority over us. Because He created us, He does. People questioning God’s authority to define right and wrong has existed throughout history. Isaiah addressed this complaint in the Old Testament:
“Woe to the one who quarrels with his Maker—\ An earthenware vessel among the vessels of earth!\ Will the clay say to the potter, ‘What are you doing?’\ Or the thing you are making say, ‘He has no hands’? (Isaiah 45:9)
In the New Testament, Paul goes into even more details on God’s right and authority:
On the contrary, who are you, O man, who answers back to God? The thing molded will not say to the molder, “Why did you make me like this,” will it? Or does not the potter have a right over the clay, to make from the same lump one vessel for honorable use and another for common use? What if God, although willing to demonstrate His wrath and to make His power known, endured with much patience vessels of wrath prepared for destruction? And He did so to make known the riches of His glory upon vessels of mercy, which He prepared beforehand for glory, even us, whom He also called, not from among Jews only, but also from among Gentiles. (Romans 9:20-24)
The one who creates something has the right to do what he wants with his creation, whether using it for honor, for dishonor, or for destruction. The creator has the right to say how his creation will be used and for what purpose it will be used. No one, especially the created creature, has a right to question that authority. We question God’s authority and His truth because we do not have nearly a high enough view of God.
You turn things around!\ Shall the potter be considered as equal with the clay,\ That what is made would say to its maker, “He did not make me”;\ Or what is formed say to him who formed it, “He has no understanding”? (Isaiah 29:16) {emphasis mine}
Read this verse again. Anyone who is formed, who says to the one who formed it, “He has not understanding,” has completely turned their thinking upside down. This is foolish thinking.
God deserves our thanks, our worship, and our obedience because He created us. Without Him we would never have existed. God is good! All of the time!
“Worthy are You, our Lord and our God, to receive glory and honor and power; for You created all things, and because of Your will they existed, and were created.” (Revelation 4:11) {emphasis mine}
Because I see so many people treat God in such a low manner, I tend to accentuate His holiness and His authority. That doesn’t mean that the God of the Bible is a distant taskmaster far away sitting waiting to punish anyone who strays from the exact path He has called them to walk. He is loving, kind, and merciful, too.
God is referred to as Father for a reason. A father of a youngster is feared by the child, but that child also leans on his father for protection, love, and direction. Although the father has the authority and the power to punish or make demands, a loving father does what is best for the child. The best may be a punishment for doing wrong or just allowing the child to fail, but the father’s protecting hand is always there preventing any major harm. The discomfort that is allowed is for the good of the child. It guides the child in the path that will most benefit the child in the long run even if the child is very unhappy with the father’s actions at the moment. Most of the time, when the child grows up, they come to understand and appreciate their parents’ actions. The God of the Bible is the heavenly Father of each and every believer and so much more loving, more wise, and more powerful than any earthly father.
Trust Jesus.\ \ your sister in Christ,
Christy
FYI, Right after writing this post, I read this article on a related subject. It is a hard truth, like the one I shared, but worth embracing, if you have time, check it out
The Not So Political Protestant
Could Oppression Be God's Wonderful Plan for Your Life?
a month ago · 3 likes · 3 comments · Lee Lumley
Bible verses are NASB (New American Standard Bible) 1995 edition unless otherwise stated
-
@ 3eacaa76:bac66fe4
2025-01-15 16:25:13Few days back this track get on Top of list on #wavlake. It's nice , but not a point. at all.
The message is clear. like Real Talk should be !
We know, specialy on #nostr, that solutions are available. However, the world is not yet aware of them.
100% of the donations for this remix will be sent to my friend Yusef who is on the ground and has been providing food, water, and shelter for children in Gaza even before or the psyop with October 07 took a place. Israel has enforced a blockade on Gaza for over decade. And Just past year completly destroyed 90% of land. Like to the ground , no schools , no hospitals ... hard to find anything what surrvived those daily airstrikes without 1h of pause since 350 days. WTF
It's heartbreaking to see children dying daily in houreds and the lack of action from the public and authorities of other nations. The statistics are alarming, and it's essential to address this issue and find ways to make progress. it's crucial to raise awareness and take action to prevent further tragedies. Let's remember that every child's life is precious and deserves our attention and support.
In most apocaliptic condition , where is-real controling all money supply (check lastest news about banknotes in there) , the #Bitcoin is one and only solution can help them in daily bases. It was helping them before with great succes. Why you ask ? becuse even if they close all platforms You can still send them some sats.
How fookin cool is that !!
I know it doesn't sound funny.
Those People pushed to the limit , now they have a tool that fulfills exactly what was created for A Peer-to-Peer Electronic Cash System.
No Middle man .
``` On the middle is only a finger whitch WE the PEOPLE can give to those Scumbagz in Goverments and Banks, Full stop.
```
Many people are only recently realizing the truth about Gaza being an open-air prison from like 75 years. Not 3, not 5 or even 20 ..... but seventy five fookin years.
This music mix was created to share the truth and provoke to critical thinking, which has been lacking for the past decade. and even more.
I wonder why we can watch live streams of the ongoing genocide in 4K HD and stil be silent. not all but many.
Why are we surprised that normies don't understand Bitcoin and still use fiat shit currency? Whitch is fudament of All war crimes. We should ask ourselves.
Our own ignorance and the banking system are the cancers of this world.
If we lose Palestine, we will lose much more than we think.
You will be next - One way or another
Thank you for your support, not for me but for those in need who can gain hope from our efforts.
Respect to you all.
LISTEN HERE and suport directly in upper links
FreePalestine
Thanks
be blessed
MadMunky
-
@ 5bdb0e24:0ccbebd7
2025-01-15 15:44:04I am a huge fan of Flatpak applications on Linux. I like how they work. I like how easy they are to install. I like how you can control their permissions with such granularity. Etc.
Well now, I have yet another reason to love Flatpaks: easy installation reproducibility. Let me show you what I mean.
Let's say you have been using Flatpaks for a while, and you have all the apps you could want installed on your system.
Then, for whatever reason, you have to set up an OS on a new machine. For example, it could be that a new version of Ubuntu is about to drop, and you want to install it from scratch on your laptop.
Well, now you can easily install all the Flatpaks that you use and love on that new OS with just a few commands.
First, on your current machine, we want to list out all the installed Flatpaks. But, we don't want to just do it with a
flatpak list
, because that gives us too much information.All we want right now is a list of the Application IDs. We can do that with the following command:
flatpak list --app --columns application
Now, this is great, and we can just manually copy and paste this list into a text file if we want.
Instead, what we are going to do is take that output and redirect it to a file with the output redirection operator. We are going to call that output something like "flatpaks.txt" or something else unimportant, because we need to rename the file in the next step.
flatpak list --app --columns application > flatpaks.txt
Great! Now, we have a text file of every Flatpak we currently have installed on our system. Next, we need to format it, so we can easily input the contents of the text file into the command line for install at a later time.
We can easily format this file appropriately with the next command and output the contents into a new text file. In my experience, if we try to overwrite the contents of the first file, the command won't work. Here's how to do it:
cat flatpaks.txt | tr '\n' ' ' | sed 's/ $/\n/' > flatpakinstalls.txt
Now, this is technically a few commands, and when broken down they simply say "take this file's contents, replace the new lines with spaces, remove the trailing space at the end of the line, and write this new output to a new file." Regular expressions are wild.
The last thing you'll want to do is delete the original file, since now you have two:
rm flatpaks.txt
With that, you have a clean text file containing all the Flatpaks installed on your system that you can reference on any other machine. But, we can actually do this a little better.
With all of that out of the way, we can take that three or four-step process and boil it down to one simple copy pasta command thanks to the and operator,
&&
:flatpak list --app --columns application > flatpaks.txt && cat flatpaks.txt | tr '\n' ' ' | sed 's/ $/\n/' > flatpakinstalls.txt && rm flatpaks.txt
That's it! Easy as pie.
Just keep this file backed up and safe. Then, after you are done installing your new OS, you'll need to make sure Flatpak is set up and ready by following the official Flatpak documentation.
After that, you can move this text file over to that machine, copy the contents, and paste them after the
flatpak install
command to quickly and effortlessly reproduce the Flatpak setup you had on your old installation.Hope you find this as helpful as I do.
-
@ 5bdb0e24:0ccbebd7
2025-01-15 15:29:59In infosec, there is a seemingly never ending list of acronyms any cyber professional must be familiar with in order to work efficiently and effectively. One of those is a common vulnerability known as IDOR.
IDOR stands for Insecure Direct Object Reference, and it's a type of vulnerability that can have serious implications for the security of web applications if not properly addressed. But what is it exactly?
What is IDOR?
IDOR is a security vulnerability that occurs when an application exposes internal implementation objects to users without proper authorization checks. In simpler terms, it means that an attacker can manipulate parameters in the application's URL or form fields to access unauthorized data or functionality.
Ok, that's a mouthful, so let's break it down further.
How Does IDOR Work?
To understand how IDOR works, consider a scenario where a web application reveals information about what you're accessing or viewing via the URL. For example, a user profile page may have a URL like the following:
https://example.com/profile?id=123
.In a secure application, the server would verify that the user has the necessary permissions to access the profile with ID 123. However, in the case of an IDOR vulnerability, an attacker could change the ID parameter in the URL to something like
https://example.com/profile?id=456
to access a different user's profile, potentially exposing sensitive customer information.The consequences of an IDOR vulnerability go beyond unauthorized access to customer information as well. Attackers could gain access to other sensitive data, such as financial records, administrative functions, or other business related data. This can lead to data breaches, privacy violations, and reputational damage to the organization.
Preventing IDOR Attacks
Preventing IDOR attacks requires a proactive approach to security. Here are some basic best practices to mitigate theses attacks:
-
Implement Proper Access Controls: Ensure that all user requests are properly authenticated and authorized before granting access to resources.
-
Use Indirect Object References: Instead of exposing internal object references directly in URLs, use indirect references that are mapped to internal objects on the server side.
-
Validate User Input: Sanitize and validate all user input to prevent malicious manipulation of parameters.
-
Employ Role-Based Access Control: Implement role-based access control to restrict users' access to only the resources they are authorized to view or modify.
-
Regular Security Audits: Conduct regular security audits and penetration testing to identify and remediate potential IDOR vulnerabilities.
IDOR is a critical security issue that requires proactive measures to mitigate. By understanding how IDOR works and implementing various security controls, organizations can safeguard their web applications against potential threats and ensure the confidentiality, integrity, and availability of their data.
-
-
@ 5bdb0e24:0ccbebd7
2025-01-15 15:22:03In cybersecurity, there is a buzzword I've seen some confusion about online recently. It's called zero trust, and though it sounds like vague corporate-ese at first, it actually represents a necessary approach to digital security.
Cyber threats are constantly evolving, and IT professionals need to be prepared for the worst at all times. Zero trust is a valid part of defense in depth and the principle of least privilege within a network or series of networks. But what exactly does that mean?
Well, historically, cyber professionals relied on perimeter defenses like firewalls to determine trust, assuming that everything inside the network was trustworthy. Zero trust challenges this notion by requiring strict identity verification for every user and device trying to access resources, regardless of their location.
You'll often hear the term "never trust, always verify" when talking about zero trust. Practically, this means that every user and device must authenticate their identity before accessing the resources on the network, ensuring that only authorized individuals can access sensitive data.
It also means users are granted the minimum level of access required to perform their tasks (the principle of least privilege I mentioned a second ago). This not only limits the potential damage that can be caused in case of a security breach, but it impedes insider threats from doing even more damage than would be possible otherwise.
Zero trust also makes it harder for attackers to move laterally within a network by implementing network segmentation. This divides larger networks up into smaller pieces, isolating each segment, and protecting them from threats in other segments.
Effectively implementing these steps is not a set it and forget it kind of thing either. Zero trust requires continuous monitoring of user and device behavior to detect anomalies or suspicious activities that may indicate security threats. Proper implementation takes the "never trust" part to the extreme.
In other words, zero trust means that organizations don't blindly trust their employees and internal networks. Threats can come from anywhere, including within, and implementing various controls to mitigate these risks can significantly enhance an organization's security posture and enable them to better protect all constituents involved.
-
@ 5bdb0e24:0ccbebd7
2025-01-15 15:11:28The internet is a dangerous place, full of vulnerabilities attackers leverage to malicious ends. One of the more common vulnerabilities that websites face is cross-site scripting (XSS) attacks. XSS attacks can have serious consequences, ranging from stealing sensitive information to defacing websites. Without wasting any time, let's jump into what XSS is, how it works, and how to mitigate it on your websites.
What is Cross-Site Scripting (XSS)?
XSS is a type of injection security vulnerability typically found in web applications, and it exploits the trust users have in websites. It occurs when an attacker injects malicious scripts into web pages via input fields, URLs, or even cookies.
When a user visits a compromised page, the injected script is executed in the user's browser, allowing the attacker to carry out various malicious activities. This works because the scripts are assumed to have come from a trusted source. When executed, they can steal sensitive information, hijack user sessions, or deface the website.
Types of XSS Attacks
There are three types of XSS:
- Stored XSS: The malicious script is stored on the server and executed whenever a user accesses the compromised page.
- Reflected XSS: The malicious script is reflected off a web server and executed in the user's browser.
- DOM-based XSS: The attack occurs in the Document Object Model (DOM) of the web page, allowing the attacker to manipulate the page's content.
Preventing XSS Attacks
There are several ways to mitigate XSS, some examples include the following:
- Input Validation: Validate and sanitize all user input to prevent the injection of malicious scripts.
- Output Encoding: Encode user input before displaying it on the web page to prevent script execution.
- Content Security Policy (CSP): Implement a CSP to restrict the sources from which scripts can be loaded on your website.
- Use HTTPS: Ensure that your website uses HTTPS to encrypt data transmitted between the server and the user's browser.
Conclusion
Cross-site scripting attacks pose a significant threat to web security. By understanding how XSS works and implementing best practices to prevent such attacks, you can safeguard your website and protect your users' sensitive information. Stay vigilant, stay informed, and stay secure in the ever-evolving landscape of web security.
-
@ 5bdb0e24:0ccbebd7
2025-01-15 14:58:45In the ever-evolving world of cybersecurity, understanding the various vulnerabilities that can be exploited by attackers is crucial for maintaining robust defenses. One such vulnerability that poses a significant risk is Local File Inclusion (LFI). This blog post aims to demystify LFI, explaining what it is, how it can be exploited, and what measures can be taken to prevent it.
What is Local File Inclusion (LFI)?
Local File Inclusion is a type of web application vulnerability that allows an attacker to access files from the server where the application is hosted. This can be achieved by exploiting poorly written code in the web application that processes user input. Essentially, if an application allows users to specify a file to be included, and it doesn't properly sanitize the input, attackers can manipulate this input to include arbitrary files from the server.
LFI vulnerabilities often arise in applications that use scripts like PHP, where the
include
,require
,include_once
, andrequire_once
functions are used to include files dynamically. When these functions are used improperly, they can become a gateway for attackers.How Does LFI Work?
To understand how LFI works, let's consider a simple example. Here we see a PHP script that uses user input to include different page templates:
```php
```
If the application fails to properly validate the
page
parameter from user input, an attacker could manipulate it by inserting paths that lead to unintended files:http://example.com/index.php?page=../../etc/passwd
In this scenario, if not properly secured, the attacker could potentially read sensitive system files like
/etc/passwd
on Unix-based systems.Impacts of LFI Vulnerabilities
LFI vulnerabilities can have severe consequences, including but not limited to the following:
1. Information Disclosure: Attackers can gain access to sensitive files, such as configuration files, passwords, and application source code.\ 2. Remote Code Execution: In some cases, attackers can leverage LFI to execute arbitrary code on the server, especially if they can upload malicious files to the server.\ 3. Access to Internal Systems: Attackers may use LFI to pivot and access other systems within the network, potentially leading to broader compromises.
Preventing LFI Vulnerabilities
Preventing LFI vulnerabilities requires a combination of secure coding practices and proper input validation. Here are some key measures to take:
1. Input Validation: Always validate and sanitize user inputs. Ensure that the input corresponds to the expected format and type, and reject any suspicious or malformed input.\ \ 2. Whitelist Files: Instead of allowing arbitrary file inclusion, use a whitelist of allowable files that can be included. This restricts the files that can be included to a predefined set.\ \ 3. Avoid User-Controlled File Paths: Where possible, avoid using user input directly in file paths. If it is necessary, use predefined directories and filenames.\ \ 4. Use Built-In Functions: Utilize built-in functions and libraries that handle file inclusions more securely. For example, PHP’s
filter_input()
can help sanitize input data.\ \ 5. Principle of Least Privilege: Ensure that the web server and application run with the least privileges necessary, minimizing the impact of a potential compromise.\ \ 6. Security Testing: Regularly conduct security testing, including code reviews and penetration testing, to identify and fix vulnerabilities.Conclusion
Local File Inclusion is a potent vulnerability that can lead to significant security breaches if left unchecked. By understanding how LFI works and implementing robust security measures, developers and administrators can protect their applications from being exploited.
Ensuring that user inputs are properly validated and sanitized, using whitelists, and adhering to the principle of least privilege are fundamental steps in safeguarding against LFI attacks. Regular security assessments and staying informed about the latest security practices will further bolster defenses against this and other vulnerabilities.
-
@ 5af07946:98fca8c4
2025-01-15 14:46:36A river must have two banks. A day has no meaning without a night. Even a narrative manifests amidst the story of a hero and a villain. Science is the study of the dualities - to put them to a greater use. Every time we get a better appreciation of a duality, we expound a new branch of science. For example Chemistry is built on the idea of "charge" duality. Particle physics is an outcome of magnetic duality (also called spin). The digital duality (0 and 1) is the basis for the computer science. Not only proven science, every thought has a dualistic outlook - a yes or a no - to be or not to be!
Our own anatomy is a mirror image as if two halves are sealed together - one on left and another on the right - two hands, two legs, two ears. Even the brains are split into left and right lobes. Leonardo da Vinci was trying to find the code of life in the parity symmetry of the Vitruvian Man. The physical duality of our anatomy led to most discoveries in ancient medicine of Suśruta and Charka - long before Leonardo. It is believed they were looking for a singularity amidst the duality of every other aspect of human body - an island in the river of life. And since they found only one heart in every mammal, they assumed god must live on this island.
In Vedic science , the study of dualities is known as Dwait. On the other hand, Vaidik philosophy believes the observer that sits amidst dualities is same across all of them - a singular observer - Adwait - an island between two banks of a river. The island underscores the nature, shape and the existence of that "perpetual" that dualities bind for conscious[^consciousness] experience? That Avykta (inexpressible knowledge) that dualities bind, is known as Tattva[^Tattva]. It binds itself into the knots (of evolving dualities) to gain answer to just one question - who am I? What is my own true shape (Swa-roopa). If one could know the answer to this question, dualities automatically shatter. They vanish because they are rendered unnecessary!
[^consciousness]: Conscious experience: is summation of Dwait and Adwait. In our geometric perception, it is easier to visualize a duality as a dimension - a one-dimensional line that goes from the object to its mirror image. The images may be merged in each other - as in case of atomic particles; or at perceived distances as in case of our reflection in a mirror. The important thing, however, is the one that sits at the surface of the mirror - in the middle - to see two images - one on the left and another on the right - one up and another down and infinite other angles. Millions of dimensions may intersect at this focal point. More intersections - greater the resolution of perception -> higher degree of conscious experience. A computer is lower in consciousness because it has only one dimension to resolve - from digital zero to a digital one. In Vaidik Science, the fifty significant traits (Vritties) are considered the prime dimensions of human experience measured through five senses. If digital duality enabled experiences such as internet, it is not hard to imagine how evolved conscious experience could be based on five senses playing with fifty traits. Yes, it can render the experience of our physical world, the seasons, the green expanses, rivers, buildings, gadgets - but that is only a fraction of what we are capable of. There are infinitely many more experiences that lie hidden in the realm of emotions. Yet senses only observe the chiral imagery. They find it hard to navigate the emotions, besides being grossly unaware of the observer that sits amidst this chaos. What is it that creates this beautiful tapestry? - sometimes layered over each other's like an onion; and other times existing on the same plane of conscious experience, and who is the observer? What is that "one" that sits within inseparable dipoles of a magnet? What exactly is that "unseen" that runs between an anode and a cathode ? Spirituality (Nyaan), is the careful study of that "one" staying put amidst the dualities always shuttling like a ping pong ball. Can it ever get to the rest? Or the idea of conscious life is to merely lock this incessant rhythm ? If so, to what avail?
[^Tattva]: Tattva: This "one", as per practitioners of spirituality, is the only real "element" - Tattva - the most elementary particle. Rest everything is just an expression of Tattva on account of complex wrinkles of dualities folded unto themselves. Tattva is neither unconscious or conscious. Consciousness is improvement in our sensory apparatus to approach this "one". The very reason of manifestation is to know, to understand what is there? Since it is the study of the "one", there are obviously no branches of "Spirituality". It is simply knowing "who am I?". The difference if at all, exists in the path to ascertain this truth. There are many possible paths. Some harder, some smarter - but the end goal is same - who am I? Tattva exists before the physical perception is born; and even after the cession the physical experience. For example, the written and the spoken are two reflections of the same word - they both carry the same meaning. Though a "word" has no physical existence unless it is spoken or written down, yet we know what a "word" means even before we say it or write it. In fact, we can't give a word a physical expression unless we already know the meaning. In essence, we understand the "knowledge" that a word captures irrespective of its physical manifestation. Thus, "knowledge" is the closest to describe that unseen in this physical world. Likewise, all dualities are reflections of a "single truth" hidden from sensory observations. It exists unattached, and yet it remains inseparable from the multitude of dualities it reflects ! For lack of a better word, Vedic Science uses the term Atma for it - it literally means "me". In mathematics, the word for this one is numeral "One" - yes, we call it "unity"! Unity is part of every number, every measurement, yet no one knows the shape of a unit - when measuring distance, this one is a meter, when measuring weight it becomes a kilo - it stays put in every measure, yet it stays indeterminate. You can say one cow, or one bird, and you know what they mean but no one knows what "one" stands for on its own! It is embedded in every number, every artifact and every observation. Many people try to explain Atma as "Energy" or "Electricity". Since it is hard to explain Atma with physical metaphors, I tend to use the word "knowledge". Partly because Energy is tied to physical matter and Electricity is limited to the motion of electrons. More importantly they have strict scientific definitions somewhat hindering the introduction of alternative approaches. That said, the choices are endless, and they are all valid based on the context. Similarly, the dualities are described differently based on the contexts. One may see the knots of dualities as the motherly cradle of manifestation - others may see them as a root cause of pain and confusion. But none may doubt their multidimensional omnipresence. In particle physics, duality is called "Parity Symmetry", In Vedic science, the faction that upholds "duality" as the only truth is known as Dwait - dualism. Dwait believes the "manifested" is nothing but the complex knots of many dualities in many dimensions. The "creation" is infinite manifestations of these knots (Karma Bandhana). It, thus, says that the liberation is all about gradual untying of these knots. The process of untying the knots of duality is called Karm-kshya - sacrificing the Karmas (that led to these knots in the first place) i.e. renunciation - weeding out dualities! It does agree that in this physical world, it is not possible to untie all the knots for human body too is a complex assimilation of uncountable knots, yet it asserts that as soon as our net "knot formation" gets negative - means we break more bonds than we create - the journey becomes a "hope of freedom". After initial jitters, the path becomes pleasurable though it appears insanely difficult (as well as counterintuitive) to the external world. For example, a person on the path of "minimalism" is naturally happy because she has found the taste of freedom - at the same time her network appreciates her for her sacrifices; often times wondering how she lives on so less ! As per Dvaita, the final freedom with exit from the physical world is thus the only objective goal - It is called Nirvana. Thus, there is no God, no observer. But it fails to answer what is it that we are trying to free up? What is the state of being in Nirvana? If Nirvana is all about giving up this beautiful experience, then Nirvana must be a very boring place! Adwait thus is the unyielding faith in singular underlying field, and a conscious ignorance of dualities as mere emergent sensory distractions. The singular truth is the thing that manifests amidst innumerable knotted dualities. Unlike the ideas of Quantum Mechanics, the "manifest" is neither a "given" nor an accident - it takes repetitive actions (Karma) to unveil one observable "truth". An "island" is thus the truth of a river's labour as much as a narrative is a writer's vociferous flow over dualities of the plot. This process of manifestation and its continuous evolution, as per Adwait, is Yazna - the modus operandi of Vishnu. And the consciousness that evolves (to seek the answer to the profound question) is Vishnu itself. The Sanskrit word Vishnu has two syllables - Vish comes from Vishisht, which means special and Anu means the smallest indestructible particle - special because it sits amidst all dualities and strives for continuous evolution of conscious experience to resolve the dualities. To an untrained eye - Dwait and Adwait may appear as the sides of the same coin, but there is vast difference in constructs that follow. Dwait seeks renunciation whereas Adwait celebrates the life, and it's growth. Vaidik approach thus is NOT to run away; it is to continuously struggle and fight to seek the ultimate object.
-
@ 21c71bfa:e28fa0f6
2025-01-15 11:43:52Book Tirupati to Tiruvannamalai cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ 21c71bfa:e28fa0f6
2025-01-15 11:42:14Book Mumbai to Nagpur cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
@ 21c71bfa:e28fa0f6
2025-01-15 11:41:58Book Kaithal to Delhi cab online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.