-
@ a95c6243:d345522c
2025-01-24 20:59:01Menschen tun alles, egal wie absurd, \ um ihrer eigenen Seele nicht zu begegnen. \ Carl Gustav Jung
«Extremer Reichtum ist eine Gefahr für die Demokratie», sagen über die Hälfte der knapp 3000 befragten Millionäre aus G20-Staaten laut einer Umfrage der «Patriotic Millionaires». Ferner stellte dieser Zusammenschluss wohlhabender US-Amerikaner fest, dass 63 Prozent jener Millionäre den Einfluss von Superreichen auf US-Präsident Trump als Bedrohung für die globale Stabilität ansehen.
Diese Besorgnis haben 370 Millionäre und Milliardäre am Dienstag auch den in Davos beim WEF konzentrierten Privilegierten aus aller Welt übermittelt. In einem offenen Brief forderten sie die «gewählten Führer» auf, die Superreichen – also sie selbst – zu besteuern, um «die zersetzenden Auswirkungen des extremen Reichtums auf unsere Demokratien und die Gesellschaft zu bekämpfen». Zum Beispiel kontrolliere eine handvoll extrem reicher Menschen die Medien, beeinflusse die Rechtssysteme in unzulässiger Weise und verwandele Recht in Unrecht.
Schon 2019 beanstandete der bekannte Historiker und Schriftsteller Ruthger Bregman an einer WEF-Podiumsdiskussion die Steuervermeidung der Superreichen. Die elitäre Veranstaltung bezeichnete er als «Feuerwehr-Konferenz, bei der man nicht über Löschwasser sprechen darf.» Daraufhin erhielt Bregman keine Einladungen nach Davos mehr. Auf seine Aussagen machte der Schweizer Aktivist Alec Gagneux aufmerksam, der sich seit Jahrzehnten kritisch mit dem WEF befasst. Ihm wurde kürzlich der Zutritt zu einem dreiteiligen Kurs über das WEF an der Volkshochschule Region Brugg verwehrt.
Nun ist die Erkenntnis, dass mit Geld politischer Einfluss einhergeht, alles andere als neu. Und extremer Reichtum macht die Sache nicht wirklich besser. Trotzdem hat man über Initiativen wie Patriotic Millionaires oder Taxmenow bisher eher selten etwas gehört, obwohl es sie schon lange gibt. Auch scheint es kein Problem, wenn ein Herr Gates fast im Alleingang versucht, globale Gesundheits-, Klima-, Ernährungs- oder Bevölkerungspolitik zu betreiben – im Gegenteil. Im Jahr, als der Milliardär Donald Trump zum zweiten Mal ins Weiße Haus einzieht, ist das Echo in den Gesinnungsmedien dagegen enorm – und uniform, wer hätte das gedacht.
Der neue US-Präsident hat jedoch «Davos geerdet», wie Achgut es nannte. In seiner kurzen Rede beim Weltwirtschaftsforum verteidigte er seine Politik und stellte klar, er habe schlicht eine «Revolution des gesunden Menschenverstands» begonnen. Mit deutlichen Worten sprach er unter anderem von ersten Maßnahmen gegen den «Green New Scam», und von einem «Erlass, der jegliche staatliche Zensur beendet»:
«Unsere Regierung wird die Äußerungen unserer eigenen Bürger nicht mehr als Fehlinformation oder Desinformation bezeichnen, was die Lieblingswörter von Zensoren und derer sind, die den freien Austausch von Ideen und, offen gesagt, den Fortschritt verhindern wollen.»
Wie der «Trumpismus» letztlich einzuordnen ist, muss jeder für sich selbst entscheiden. Skepsis ist definitiv angebracht, denn «einer von uns» sind weder der Präsident noch seine auserwählten Teammitglieder. Ob sie irgendeinen Sumpf trockenlegen oder Staatsverbrechen aufdecken werden oder was aus WHO- und Klimaverträgen wird, bleibt abzuwarten.
Das WHO-Dekret fordert jedenfalls die Übertragung der Gelder auf «glaubwürdige Partner», die die Aktivitäten übernehmen könnten. Zufällig scheint mit «Impfguru» Bill Gates ein weiterer Harris-Unterstützer kürzlich das Lager gewechselt zu haben: Nach einem gemeinsamen Abendessen zeigte er sich «beeindruckt» von Trumps Interesse an der globalen Gesundheit.
Mit dem Projekt «Stargate» sind weitere dunkle Wolken am Erwartungshorizont der Fangemeinde aufgezogen. Trump hat dieses Joint Venture zwischen den Konzernen OpenAI, Oracle, und SoftBank als das «größte KI-Infrastrukturprojekt der Geschichte» angekündigt. Der Stein des Anstoßes: Oracle-CEO Larry Ellison, der auch Fan von KI-gestützter Echtzeit-Überwachung ist, sieht einen weiteren potenziellen Einsatz der künstlichen Intelligenz. Sie könne dazu dienen, Krebserkrankungen zu erkennen und individuelle mRNA-«Impfstoffe» zur Behandlung innerhalb von 48 Stunden zu entwickeln.
Warum bitte sollten sich diese superreichen «Eliten» ins eigene Fleisch schneiden und direkt entgegen ihren eigenen Interessen handeln? Weil sie Menschenfreunde, sogenannte Philanthropen sind? Oder vielleicht, weil sie ein schlechtes Gewissen haben und ihre Schuld kompensieren müssen? Deswegen jedenfalls brauchen «Linke» laut Robert Willacker, einem deutschen Politikberater mit brasilianischen Wurzeln, rechte Parteien – ein ebenso überraschender wie humorvoller Erklärungsansatz.
Wenn eine Krähe der anderen kein Auge aushackt, dann tut sie das sich selbst noch weniger an. Dass Millionäre ernsthaft ihre eigene Besteuerung fordern oder Machteliten ihren eigenen Einfluss zugunsten anderer einschränken würden, halte ich für sehr unwahrscheinlich. So etwas glaube ich erst, wenn zum Beispiel die Rüstungsindustrie sich um Friedensverhandlungen bemüht, die Pharmalobby sich gegen institutionalisierte Korruption einsetzt, Zentralbanken ihre CBDC-Pläne für Bitcoin opfern oder der ÖRR die Abschaffung der Rundfunkgebühren fordert.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c631e267:c2b78d3e
2025-01-18 09:34:51Die grauenvollste Aussicht ist die der Technokratie – \ einer kontrollierenden Herrschaft, \ die durch verstümmelte und verstümmelnde Geister ausgeübt wird. \ Ernst Jünger
«Davos ist nicht mehr sexy», das Weltwirtschaftsforum (WEF) mache Davos kaputt, diese Aussagen eines Einheimischen las ich kürzlich in der Handelszeitung. Während sich einige vor Ort enorm an der «teuersten Gewerbeausstellung der Welt» bereicherten, würden die negativen Begleiterscheinungen wie Wohnungsnot und Niedergang der lokalen Wirtschaft immer deutlicher.
Nächsten Montag beginnt in dem Schweizer Bergdorf erneut ein Jahrestreffen dieses elitären Clubs der Konzerne, bei dem man mit hochrangigen Politikern aus aller Welt und ausgewählten Vertretern der Systemmedien zusammenhocken wird. Wie bereits in den vergangenen vier Jahren wird die Präsidentin der EU-Kommission, Ursula von der Leyen, in Begleitung von Klaus Schwab ihre Grundsatzansprache halten.
Der deutsche WEF-Gründer hatte bei dieser Gelegenheit immer höchst lobende Worte für seine Landsmännin: 2021 erklärte er sich «stolz, dass Europa wieder unter Ihrer Führung steht» und 2022 fand er es bemerkenswert, was sie erreicht habe angesichts des «erstaunlichen Wandels», den die Welt in den vorangegangenen zwei Jahren erlebt habe; es gebe nun einen «neuen europäischen Geist».
Von der Leyens Handeln während der sogenannten Corona-«Pandemie» lobte Schwab damals bereits ebenso, wie es diese Woche das Karlspreis-Direktorium tat, als man der Beschuldigten im Fall Pfizergate die diesjährige internationale Auszeichnung «für Verdienste um die europäische Einigung» verlieh. Außerdem habe sie die EU nicht nur gegen den «Aggressor Russland», sondern auch gegen die «innere Bedrohung durch Rassisten und Demagogen» sowie gegen den Klimawandel verteidigt.
Jene Herausforderungen durch «Krisen epochalen Ausmaßes» werden indes aus dem Umfeld des WEF nicht nur herbeigeredet – wie man alljährlich zur Zeit des Davoser Treffens im Global Risks Report nachlesen kann, der zusammen mit dem Versicherungskonzern Zurich erstellt wird. Seit die Globalisten 2020/21 in der Praxis gesehen haben, wie gut eine konzertierte und konsequente Angst-Kampagne funktionieren kann, geht es Schlag auf Schlag. Sie setzen alles daran, Schwabs goldenes Zeitfenster des «Great Reset» zu nutzen.
Ziel dieses «großen Umbruchs» ist die totale Kontrolle der Technokraten über die Menschen unter dem Deckmantel einer globalen Gesundheitsfürsorge. Wie aber könnte man so etwas erreichen? Ein Mittel dazu ist die «kreative Zerstörung». Weitere unabdingbare Werkzeug sind die Einbindung, ja Gleichschaltung der Medien und der Justiz.
Ein «Great Mental Reset» sei die Voraussetzung dafür, dass ein Großteil der Menschen Einschränkungen und Manipulationen wie durch die Corona-Maßnahmen praktisch kritik- und widerstandslos hinnehme, sagt der Mediziner und Molekulargenetiker Michael Nehls. Er meint damit eine regelrechte Umprogrammierung des Gehirns, wodurch nach und nach unsere Individualität und unser soziales Bewusstsein eliminiert und durch unreflektierten Konformismus ersetzt werden.
Der aktuelle Zustand unserer Gesellschaften ist auch für den Schweizer Rechtsanwalt Philipp Kruse alarmierend. Durch den Umgang mit der «Pandemie» sieht er die Grundlagen von Recht und Vernunft erschüttert, die Rechtsstaatlichkeit stehe auf dem Prüfstand. Seiner dringenden Mahnung an alle Bürger, die Prinzipien von Recht und Freiheit zu verteidigen, kann ich mich nur anschließen.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 1cb14ab3:95d52462
2025-01-25 23:13:34Tree branches. 4' x 4 [Castle Pines, USA. 2016]
Introduction
Sanctuary offers a layered view of resilience, juxtaposing the green expanses of the Sanctuary Golf Course with the majesty of Pikes Peak and the scars of past destruction. Framed by the lens, this work explores the tension between human intervention and nature’s cycles of renewal.
Site & Placement
Perched at Daniels Park in Castle Pines, the lens focuses on the rolling terrain of the golf course, leading the eye to the distant peak. The surrounding brush, which once burned in a major fire, adds depth to the narrative of renewal. A bench, positioned for an unobstructed view, invites visitors to sit and reflect on the land’s capacity to heal and endure.
Impermanence & Integration
As an ephemeral installation, Sanctuary embodies nature’s cycles of destruction and rebirth. The materials—branches and rock—will eventually decay and return to the earth, a process that mirrors the recovery of the landscape itself after fire. This impermanence underscores the delicate balance between human influence and natural forces.
Reflection
Sanctuary serves as a reminder of both the fragility and resilience of the world around us. It invites viewers to pause and consider the interplay of destruction and growth, human and natural, as they gaze upon a scene shaped by both time and transformation
Photos
More from the 'Earth Lens' Series:
Earth Lens Series: Artist Statement + List of Works
"Looking Glass" (Earth Lens 001)
COMING SOON: "Platte" (Earth Lens 004)
COMING SOON: "Grandfather" (Earth Lens 005)
COMING SOON: "Chongming" (Earth Lens 006)
More from Hes
All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.
-
@ f4db5270:3c74e0d0
2025-01-23 18:09:14Hi Art lover! 🎨🫂💜 You may not know it yet but all of the following paintings are available in #Bitcoin on my website: https://isolabell.art/#shop
For info and prices write to me in DM and we will find a good deal! 🤝
ON THE ROAD AGAIN 40x50cm, Oil on canvas Completed January 23, 2025
SUN OF JANUARY 40x50cm, Oil on canvas Completed January 14, 2025
THE BLUE HOUR 40x50cm, Oil on canvas Completed December 14, 2024
LIKE A FRAGMENT OF ETERNITY 50x40cm, Oil on canvas Completed December 01, 2024
WHERE WINTER WHISPERS 50x40cm, Oil on canvas Completed November 07, 2024
L'ATTESA DI UN MOMENTO 40x40cm, Oil on canvas Completed October 29, 2024
LE COSE CHE PENSANO 40x50cm, Oil on paper Completed October 05, 2024
TWILIGHT'S RIVER 50x40cm, Oil on canvas Completed September 17, 2024
GOLD ON THE OCEAN 40x50cm, Oil on paper Completed September 08, 2024
SUSSURRI DI CIELO E MARE 50x40cm, Oil on paper Completed September 05, 2024
THE END OF A WONDERFUL WEEKEND 40x30cm, Oil on board Completed August 12, 2024
FIAMME NEL CIELO 60x35cm, Oil on board Completed July 28, 2024
INIZIO D'ESTATE 50x40cm, Oil on cradled wood panel Completed July 13, 2024
OMBRE DELLA SERA 50x40cm, Oil on cradled wood panel Completed June 16, 2024
NEW ZEALAND SUNSET 80x60cm, Oil on canvas board Completed May 28, 2024
VENICE 50x40cm, Oil on board Completed May 4, 2024
CORNWALL 50x40cm, Oil on board Completed April 26, 2024
DOCKS ON SUNSET 40x19,5cm, Oil on board Completed March 14, 2024
SOLITUDE 30x30cm, Oil on cradled wood panel Completed March 2, 2024
LULLING WAVES 40x30cm, Oil on cradled wood panel Completed January 14, 2024
MULATTIERA IN AUTUNNO 30x30cm, Oil on cradled wood panel
TRAMONTO A KOS 40x40cm, oil on board canvas
HIDDEN SMILE 40x40cm, oil on board
INIZIO D'AUTUNNO 40x40cm, oil on canvas
BOE NEL LAGO 30x30cm, oil on canvas board
BARCHE A RIPOSO 40x40cm, oil on canvas board
IL RISVEGLIO 30x40cm, oil on canvas board
LA QUIETE PRIMA DELLA TEMPESTA 30x40cm, oil on canvas board
LAMPIONE SUL LAGO 30x30cm, oil on canvas board
DUE NELLA NEVE 60x25cm, oil on board
UNA CAREZZA 30x30cm, oil on canvas board
REBEL WAVES 44x32cm, oil on canvas board
THE SCREAMING WAVE 40x30cm, oil on canvas board
"LA DONZELLETTA VIEN DALLA CAMPAGNA..." 30x40cm, oil on canvas board
LIGHTHOUSE ON WHITE CLIFF 30x40cm, oil on canvas board
-
@ a95c6243:d345522c
2025-01-13 10:09:57Ich begann, Social Media aufzubauen, \ um den Menschen eine Stimme zu geben. \ Mark Zuckerberg
Sind euch auch die Tränen gekommen, als ihr Mark Zuckerbergs Wendehals-Deklaration bezüglich der Meinungsfreiheit auf seinen Portalen gehört habt? Rührend, oder? Während er früher die offensichtliche Zensur leugnete und später die Regierung Biden dafür verantwortlich machte, will er nun angeblich «die Zensur auf unseren Plattformen drastisch reduzieren».
«Purer Opportunismus» ob des anstehenden Regierungswechsels wäre als Klassifizierung viel zu kurz gegriffen. Der jetzige Schachzug des Meta-Chefs ist genauso Teil einer kühl kalkulierten Business-Strategie, wie es die 180 Grad umgekehrte Praxis vorher war. Social Media sind ein höchst lukratives Geschäft. Hinzu kommt vielleicht noch ein bisschen verkorkstes Ego, weil derartig viel Einfluss und Geld sicher auch auf die Psyche schlagen. Verständlich.
«Es ist an der Zeit, zu unseren Wurzeln der freien Meinungsäußerung auf Facebook und Instagram zurückzukehren. Ich begann, Social Media aufzubauen, um den Menschen eine Stimme zu geben», sagte Zuckerberg.
Welche Wurzeln? Hat der Mann vergessen, dass er von der Überwachung, dem Ausspionieren und dem Ausverkauf sämtlicher Daten und digitaler Spuren sowie der Manipulation seiner «Kunden» lebt? Das ist knallharter Kommerz, nichts anderes. Um freie Meinungsäußerung geht es bei diesem Geschäft ganz sicher nicht, und das war auch noch nie so. Die Wurzeln von Facebook liegen in einem Projekt des US-Militärs mit dem Namen «LifeLog». Dessen Ziel war es, «ein digitales Protokoll vom Leben eines Menschen zu erstellen».
Der Richtungswechsel kommt allerdings nicht überraschend. Schon Anfang Dezember hatte Meta-Präsident Nick Clegg von «zu hoher Fehlerquote bei der Moderation» von Inhalten gesprochen. Bei der Gelegenheit erwähnte er auch, dass Mark sehr daran interessiert sei, eine aktive Rolle in den Debatten über eine amerikanische Führungsrolle im technologischen Bereich zu spielen.
Während Milliardärskollege und Big Tech-Konkurrent Elon Musk bereits seinen Posten in der kommenden Trump-Regierung in Aussicht hat, möchte Zuckerberg also nicht nur seine Haut retten – Trump hatte ihn einmal einen «Feind des Volkes» genannt und ihm lebenslange Haft angedroht –, sondern am liebsten auch mitspielen. KI-Berater ist wohl die gewünschte Funktion, wie man nach einem Treffen Trump-Zuckerberg hörte. An seine Verhaftung dachte vermutlich auch ein weiterer Multimilliardär mit eigener Social Media-Plattform, Pavel Durov, als er Zuckerberg jetzt kritisierte und gleichzeitig warnte.
Politik und Systemmedien drehen jedenfalls durch – was zu viel ist, ist zu viel. Etwas weniger Zensur und mehr Meinungsfreiheit würden die Freiheit der Bürger schwächen und seien potenziell vernichtend für die Menschenrechte. Zuckerberg setze mit dem neuen Kurs die Demokratie aufs Spiel, das sei eine «Einladung zum nächsten Völkermord», ernsthaft. Die Frage sei, ob sich die EU gegen Musk und Zuckerberg behaupten könne, Brüssel müsse jedenfalls hart durchgreifen.
Auch um die Faktenchecker macht man sich Sorgen. Für die deutsche Nachrichtenagentur dpa und die «Experten» von Correctiv, die (noch) Partner für Fact-Checking-Aktivitäten von Facebook sind, sei das ein «lukratives Geschäftsmodell». Aber möglicherweise werden die Inhalte ohne diese vermeintlichen Korrektoren ja sogar besser. Anders als Meta wollen jedoch Scholz, Faeser und die Tagesschau keine Fehler zugeben und zum Beispiel Correctiv-Falschaussagen einräumen.
Bei derlei dramatischen Befürchtungen wundert es nicht, dass der öffentliche Plausch auf X zwischen Elon Musk und AfD-Chefin Alice Weidel von 150 EU-Beamten überwacht wurde, falls es irgendwelche Rechtsverstöße geben sollte, die man ihnen ankreiden könnte. Auch der Deutsche Bundestag war wachsam. Gefunden haben dürften sie nichts. Das Ganze war eher eine Show, viel Wind wurde gemacht, aber letztlich gab es nichts als heiße Luft.
Das Anbiedern bei Donald Trump ist indes gerade in Mode. Die Weltgesundheitsorganisation (WHO) tut das auch, denn sie fürchtet um Spenden von über einer Milliarde Dollar. Eventuell könnte ja Elon Musk auch hier künftig aushelfen und der Organisation sowie deren größtem privaten Förderer, Bill Gates, etwas unter die Arme greifen. Nachdem Musks KI-Projekt xAI kürzlich von BlackRock & Co. sechs Milliarden eingestrichen hat, geht da vielleicht etwas.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2025-01-03 20:26:47Was du bist hängt von drei Faktoren ab: \ Was du geerbt hast, \ was deine Umgebung aus dir machte \ und was du in freier Wahl \ aus deiner Umgebung und deinem Erbe gemacht hast. \ Aldous Huxley
Das brave Mitmachen und Mitlaufen in einem vorgegebenen, recht engen Rahmen ist gewiss nicht neu, hat aber gerade wieder mal Konjunktur. Dies kann man deutlich beobachten, eigentlich egal, in welchem gesellschaftlichen Bereich man sich umschaut. Individualität ist nur soweit angesagt, wie sie in ein bestimmtes Schema von «Diversität» passt, und Freiheit verkommt zur Worthülse – nicht erst durch ein gewisses Buch einer gewissen ehemaligen Regierungschefin.
Erklärungsansätze für solche Entwicklungen sind bekannt, und praktisch alle haben etwas mit Massenpsychologie zu tun. Der Herdentrieb, also der Trieb der Menschen, sich – zum Beispiel aus Unsicherheit oder Bequemlichkeit – lieber der Masse anzuschließen als selbstständig zu denken und zu handeln, ist einer der Erklärungsversuche. Andere drehen sich um Macht, Propaganda, Druck und Angst, also den gezielten Einsatz psychologischer Herrschaftsinstrumente.
Aber wollen die Menschen überhaupt Freiheit? Durch Gespräche im privaten Umfeld bin ich diesbezüglich in der letzten Zeit etwas skeptisch geworden. Um die Jahreswende philosophiert man ja gerne ein wenig über das Erlebte und über die Erwartungen für die Zukunft. Dabei hatte ich hin und wieder den Eindruck, die totalitären Anwandlungen unserer «Repräsentanten» kämen manchen Leuten gerade recht.
«Desinformation» ist so ein brisantes Thema. Davor müsse man die Menschen doch schützen, hörte ich. Jemand müsse doch zum Beispiel diese ganzen merkwürdigen Inhalte in den Social Media filtern – zur Ukraine, zum Klima, zu Gesundheitsthemen oder zur Migration. Viele wüssten ja gar nicht einzuschätzen, was richtig und was falsch ist, sie bräuchten eine Führung.
Freiheit bedingt Eigenverantwortung, ohne Zweifel. Eventuell ist es einigen tatsächlich zu anspruchsvoll, die Verantwortung für das eigene Tun und Lassen zu übernehmen. Oder die persönliche Freiheit wird nicht als ausreichend wertvolles Gut angesehen, um sich dafür anzustrengen. In dem Fall wäre die mangelnde Selbstbestimmung wohl das kleinere Übel. Allerdings fehlt dann gemäß Aldous Huxley ein Teil der Persönlichkeit. Letztlich ist natürlich alles eine Frage der Abwägung.
Sind viele Menschen möglicherweise schon so «eingenordet», dass freiheitliche Ambitionen gar nicht für eine ganze Gruppe, ein Kollektiv, verfolgt werden können? Solche Gedanken kamen mir auch, als ich mir kürzlich diverse Talks beim viertägigen Hacker-Kongress des Chaos Computer Clubs (38C3) anschaute. Ich war nicht nur überrascht, sondern reichlich erschreckt angesichts der in weiten Teilen mainstream-geformten Inhalte, mit denen ein dankbares Publikum beglückt wurde. Wo ich allgemein hellere Köpfe erwartet hatte, fand ich Konformismus und enthusiastisch untermauerte Narrative.
Gibt es vielleicht so etwas wie eine Herdenimmunität gegen Indoktrination? Ich denke, ja, zumindest eine gestärkte Widerstandsfähigkeit. Was wir brauchen, sind etwas gesunder Menschenverstand, offene Informationskanäle und der Mut, sich freier auch zwischen den Herden zu bewegen. Sie tun das bereits, aber sagen Sie es auch dieses Jahr ruhig weiter.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2025-01-01 17:39:51Heute möchte ich ein Gedicht mit euch teilen. Es handelt sich um eine Ballade des österreichischen Lyrikers Johann Gabriel Seidl aus dem 19. Jahrhundert. Mir sind diese Worte fest in Erinnerung, da meine Mutter sie perfekt rezitieren konnte, auch als die Kräfte schon langsam schwanden.
Dem originalen Titel «Die Uhr» habe ich für mich immer das Wort «innere» hinzugefügt. Denn der Zeitmesser – hier vermutliche eine Taschenuhr – symbolisiert zwar in dem Kontext das damalige Zeitempfinden und die Umbrüche durch die industrielle Revolution, sozusagen den Zeitgeist und das moderne Leben. Aber der Autor setzt sich philosophisch mit der Zeit auseinander und gibt seinem Werk auch eine klar spirituelle Dimension.
Das Ticken der Uhr und die Momente des Glücks und der Trauer stehen sinnbildlich für das unaufhaltsame Fortschreiten und die Vergänglichkeit des Lebens. Insofern könnte man bei der Uhr auch an eine Sonnenuhr denken. Der Rhythmus der Ereignisse passt uns vielleicht nicht immer in den Kram.
Was den Takt pocht, ist durchaus auch das Herz, unser «inneres Uhrwerk». Wenn dieses Meisterwerk einmal stillsteht, ist es unweigerlich um uns geschehen. Hoffentlich können wir dann dankbar sagen: «Ich habe mein Bestes gegeben.»
Ich trage, wo ich gehe, stets eine Uhr bei mir; \ Wieviel es geschlagen habe, genau seh ich an ihr. \ Es ist ein großer Meister, der künstlich ihr Werk gefügt, \ Wenngleich ihr Gang nicht immer dem törichten Wunsche genügt.
Ich wollte, sie wäre rascher gegangen an manchem Tag; \ Ich wollte, sie hätte manchmal verzögert den raschen Schlag. \ In meinen Leiden und Freuden, in Sturm und in der Ruh, \ Was immer geschah im Leben, sie pochte den Takt dazu.
Sie schlug am Sarge des Vaters, sie schlug an des Freundes Bahr, \ Sie schlug am Morgen der Liebe, sie schlug am Traualtar. \ Sie schlug an der Wiege des Kindes, sie schlägt, will's Gott, noch oft, \ Wenn bessere Tage kommen, wie meine Seele es hofft.
Und ward sie auch einmal träger, und drohte zu stocken ihr Lauf, \ So zog der Meister immer großmütig sie wieder auf. \ Doch stände sie einmal stille, dann wär's um sie geschehn, \ Kein andrer, als der sie fügte, bringt die Zerstörte zum Gehn.
Dann müßt ich zum Meister wandern, der wohnt am Ende wohl weit, \ Wohl draußen, jenseits der Erde, wohl dort in der Ewigkeit! \ Dann gäb ich sie ihm zurücke mit dankbar kindlichem Flehn: \ Sieh, Herr, ich hab nichts verdorben, sie blieb von selber stehn.
Johann Gabriel Seidl (1804-1875)
-
@ 7f29628d:e160cccc
2025-01-07 11:50:30Der gut informierte Bürger denkt bei der Pandemie sofort an Intensivstationen, an die Bilder aus Bergamo und erinnert sich an die Berichterstattung damals – also muss es wohl ein Maximum gewesen sein. Manche Skeptiker behaupten jedoch das Gegenteil. Klarheit sollte ein Blick nach Wiesbaden, zum Statistischen Bundesamt, schaffen. Schließlich sitzen dort gut bezahlte Profis, die seit vielen Jahrzehnten die Sterbestatistik pflegen und veröffentlichen. Jeder Todesfall wird in Deutschland über die Standesämter exakt erfasst.
Doch die Überraschung: Das Statistische Bundesamt liefert uns auf diese einfache Frage zwei extrem unterschiedliche Antworten – ein Minimum und ein Maximum. Das Ergebnis hängt davon ab, wie tief man in die Veröffentlichungen des Bundesamtes eintaucht. Betrachtet man nur die Webseiten und Pressemitteilungen, erhält man den Eindruck eines Maximums. Schaut man jedoch etwas tiefer in die Tabellen und Rohdaten, zeigt sich plötzlich ein Minimum. Aber wie kann das sein? Beides gleichzeitig geht ja wohl kaum. Wer lügt hier – die Tabellen des Amtes oder die Pressemitteilungen? Gehen wir dieser Frage Schritt für Schritt auf den Grund.
2020: Ein historisches Maximum?
Schauen wir uns die vielen Hundert Veröffentlichungen des Statistischen Bundesamtes aus dieser Zeit an. Oder wir kürzen ab und fragen ChatGPT, da die KI auf diesen Daten trainiert wurde und das gesamte Material kennt. Die Frage an ChatGPT lautet also: Wie war das Sterbegeschehen im Jahr 2020 im Vergleich zu den Vorjahren?
ChatGPT antwortet: »Im Jahr 2020 war die Sterblichkeit in Deutschland höher als in den Jahren zuvor. Es gab eine Übersterblichkeit von etwa 982.000 Todesfällen, das sind rund 46.000 mehr als der Durchschnitt der Vorjahre (2016 bis 2019). Dieser Anstieg wurde überwiegend im Zusammenhang mit der COVID-19-Pandemie gesehen. Während die Sterbezahlen in den Vorjahren schwankten, war ein solch signifikanter Anstieg wie 2020 bisher nicht zu beobachten.«
Wir fragen konkreter: Ist es ein Fakt, dass wir eine so ernste Lage im Sterbegeschehen wie im Frühjahr 2020 noch nie erlebt haben?
ChatGPT bestätigt: »Ja, die COVID-19-Pandemie führte im Frühjahr 2020 zu einer außergewöhnlichen Situation im Sterbegeschehen in Deutschland. Die dramatische Übersterblichkeit, die ab der 13. Kalenderwoche auftrat, veranlasste das Statistische Bundesamt, besonders eindringliche Warnungen zu veröffentlichen. Der damalige Vizepräsident des Amtes und andere führende Stimmen wiesen öffentlich darauf hin, dass die Todesfallzahlen stark vom Durchschnitt abwichen. Diese klare Warnung richtete sich an die Öffentlichkeit und die Politik gleichermaßen. Die Medien berichteten intensiv über diese Warnungen, was das Bewusstsein für die Schwere der Pandemie erheblich schärfte. In den vergangenen Jahrzehnten hatte es keine vergleichbare Übersterblichkeit gegeben, die eine solch umfangreiche Kommunikation durch das Statistische Bundesamt erforderlich gemacht hätte.«
Ein gut informierter Zeitungsleser wird sich an dieser Stelle bestätigt fühlen: Ja, so war es damals. Ein Maximum im Sterbegeschehen – wegen der Pandemie. Oder etwa nicht?
2020: Ein historisches Minimum?
Tauchen wir in die Rohdaten des Statistischen Bundesamtes ein. Die Tabellen, die das Amt seit Jahrzehnten verlässlich veröffentlicht, nennen sich Sterbetafeln. Diese werden jährlich bereitgestellt und stehen auf der Website des Bundesamtes zum Download bereit. Ein erster Blick in die Sterbetafeln mag den Laien abschrecken, doch mit einer kurzen Erklärung wird alles verständlich. Wir gehen schrittweise vor.
Nehmen wir die Sterbetafel des Jahres 2017. Sie enthält zwei große Tabellen – eine für Männer und eine für Frauen. Jede Zeile der Tabelle steht für einen Jahrgang, zum Beispiel zeigt die Zeile 79 die Daten der 79-jährigen Männer. Besonders wichtig ist nun die zweite Spalte, in der der Wert 0,05 eingetragen ist. Das bedeutet, dass 5 Prozent der 79-jährigen Männer im Jahr 2017 verstorben sind. Das ist die wichtige Kennzahl. Wenn wir diesen exakten Wert, den man auch als Sterberate bezeichnet, nun in ein Säulendiagramm eintragen, erhalten wir eine leicht verständliche visuelle Darstellung (Grafik 1).
Es ist wichtig zu betonen, dass dieser Wert weder ein Schätzwert noch eine Modellrechnung oder Prognose ist, sondern ein exakter Messwert, basierend auf einer zuverlässigen Zählung. Sterberaten (für die Fachleute auch Sterbewahrscheinlichkeiten qx) sind seit Johann Peter Süßmilch (1707–1767) der Goldstandard der Sterbestatistik. Jeder Aktuar wird das bestätigen. Fügen wir nun die Sterberaten der 79-jährigen Männer aus den Jahren davor und danach hinzu, um das Gesamtbild zu sehen (Grafik 2). Und nun die entscheidende Frage: Zeigt das Jahr 2020 ein Maximum oder ein Minimum?
Ein kritischer Leser könnte vermuten, dass die 79-jährigen Männer eine Ausnahme darstellen und andere Jahrgänge im Jahr 2020 ein Maximum zeigen würden. Doch das trifft nicht zu. Kein einziger Jahrgang verzeichnete im Jahr 2020 ein Maximum. Im Gegenteil: Auch die 1-Jährigen, 2-Jährigen, 3-Jährigen, 9-Jährigen, 10-Jährigen, 15-Jährigen, 18-Jährigen und viele weitere männliche Jahrgänge hatten ihr Minimum im Jahr 2020. Dasselbe gilt bei den Frauen. Insgesamt hatten 31 Jahrgänge ihr Minimum im Jahr 2020. Wenn wir schließlich alle Jahrgänge in einer einzigen Grafik zusammenfassen, ergibt sich ein klares Bild: Das Minimum im Sterbegeschehen lag im Jahr 2020 (Grafik 3).
Ein kritischer Leser könnte nun wiederum vermuten, dass es innerhalb des Jahres 2020 möglicherweise starke Ausschläge nach oben bei einzelnen Jahrgängen gegeben haben könnte, die später durch Ausschläge nach unten ausgeglichen wurden – und dass diese Schwankungen in der jährlichen Übersicht nicht sichtbar sind. Doch auch das trifft nicht zu. Ein Blick auf die wöchentlichen Sterberaten zeigt, dass die ersten acht Monate der Pandemie keine nennenswerten Auffälligkeiten aufweisen. Es bleibt dabei: Die Rohdaten des Statistischen Bundesamtes bestätigen zweifelsfrei, dass die ersten acht Monate der Pandemie das historische Minimum im Sterbegeschehen darstellen. (Für die Fachleute sei angemerkt, dass im gleichen Zeitraum die Lebenserwartung die historischen Höchststände erreicht hatte – Grafik 4.)
So konstruierte das Amt aus einem Minimum ein Maximum:
Zur Erinnerung: Die Rohdaten des Statistischen Bundesamtes, die in den jährlichen Sterbetafeln zweifelsfrei dokumentiert sind, zeigen für das Jahr 2020 eindeutig ein Minimum im Sterbegeschehen. Aus diesen »in Stein gemeißelten« Zahlen ein Maximum zu »konstruieren«, ohne die Rohdaten selbst zu verändern, scheint auf den ersten Blick eine unlösbare Aufgabe. Jeder Student würde an einer solchen Herausforderung scheitern. Doch das Statistische Bundesamt hat einen kreativen Weg gefunden - ein Meisterstück gezielter Manipulation. In fünf Schritten zeigt sich, wie diese Täuschung der Öffentlichkeit umgesetzt wurde:
(1) Ignorieren der Sterberaten: Die präzisen, objektiven und leicht verständlichen Sterberaten aus den eigenen Sterbetafeln wurden konsequent ignoriert und verschwiegen. Diese Daten widersprachen dem gewünschten Narrativ und wurden daher gezielt ausgeklammert.
(2) Fokus auf absolute Todeszahlen: Die Aufmerksamkeit wurde stattdessen auf die absolute Zahl der Todesfälle gelenkt. Diese wirkt allein durch ihre schiere Größe dramatisch und emotionalisiert die Diskussion. Ein entscheidender Faktor wurde dabei ignoriert: Die absolute Zahl der Todesfälle steigt aufgrund der demografischen Entwicklung jedes Jahr an. Viele Menschen verstehen diesen Zusammenhang nicht und verbinden die steigenden Zahlen fälschlicherweise mit der vermeintlichen Pandemie.
(3) Einführung der Übersterblichkeit als neue Kennzahl: Erst ab Beginn der „Pandemie“ wurde die Kennzahl "Übersterblichkeit" eingeführt – und dies mit einer fragwürdigen Methode, die systematisch überhöhte Werte lieferte. Diese Kennzahl wurde regelmäßig, oft monatlich oder sogar wöchentlich, berechnet und diente als ständige Grundlage für alarmierende Schlagzeilen.
(4) Intensive Öffentlichkeitsarbeit: Durch eine breit angelegte Kampagne wurden die manipulativen Kennzahlen gezielt in den Fokus gerückt. Pressemitteilungen, Podcasts und öffentliche Auftritte konzentrierten sich fast ausschließlich auf die absoluten Todeszahlen und die Übersterblichkeit. Ziel war es, den Eindruck einer dramatischen Situation in der Öffentlichkeit zu verstärken.
(5) Bekämpfen kritischer Stimmen: Kritiker, die die Schwächen und manipulativen Aspekte dieser Methoden aufdeckten, wurden systematisch diskreditiert. Ihre Glaubwürdigkeit und Kompetenz wurden öffentlich infrage gestellt, um das sorgsam konstruierte Narrativ zu schützen.
Ohne diesen begleitenden Statistik-Betrug wäre das gesamte Pandemie-Theater meiner Meinung nach nicht möglich gewesen. Wer aus einem faktischen Minimum ein scheinbares Maximum "erschafft", handelt betrügerisch. Die Folgen dieses Betruges sind gravierend. Denken wir an die Angst, die in der Bevölkerung geschürt wurde – die Angst, bald sterben zu müssen. Denken wir an Masken, Abstandsregeln, isolierte ältere Menschen, Kinderimpfungen und all die Maßnahmen, die unter anderem auf diese falsche Statistik zurückgehen.
Wollen wir Bürger uns das gefallen lassen?
Wenn wir als Bürger zulassen, dass ein derart offensichtlicher und nachprüfbarer Täuschungsversuch ohne Konsequenzen bleibt, dann gefährdet das nicht nur die Integrität unserer Institutionen – es untergräbt das Fundament unserer Gesellschaft. In der DDR feierte man öffentlich Planerfüllung und Übererfüllung, während die Regale leer blieben. Damals wusste jeder: Statistik war ein Propagandainstrument. Niemand traute den Zahlen, die das Staatsfernsehen verkündete.
Während der Pandemie war es anders. Die Menschen vertrauten den Mitteilungen des Statistischen Bundesamtes und des RKI – blind. Die Enthüllungen durch den "RKI-Leak" haben gezeigt, dass auch das Robert-Koch-Institut nicht der Wissenschaft, sondern den Weisungen des Gesundheitsministers und militärischen Vorgaben folgte. Warum sollte es beim Statistischen Bundesamt anders gewesen sein? Diese Behörde ist dem Innenministerium unterstellt und somit ebenfalls weisungsgebunden.
Die Beweise für Täuschung liegen offen zutage. Es braucht keinen Whistleblower, keine geheimen Enthüllungen: Die Rohdaten des Statistischen Bundesamtes sprechen für sich. Sie sind öffentlich einsehbar – klar und unmissverständlich. Die Daten, die Tabellen, die Veröffentlichungen des Amtes selbst – sie sind die Anklageschrift. Sie zeigen, was wirklich war. Nicht mehr und nicht weniger.
Und wir? Was tun wir? Schweigen wir? Oder fordern wir endlich ein, was unser Recht ist? Wir Bürger dürfen das nicht hinnehmen. Es ist Zeit, unsere Behörden zur Rechenschaft zu ziehen. Diese Institutionen arbeiten nicht für sich – sie arbeiten für uns. Wir finanzieren sie, und wir haben das Recht, Transparenz und Verantwortung einzufordern. Manipulationen wie diese müssen aufgearbeitet werden und dürfen nie wieder geschehen. Die Strukturen, die solche Fehlentwicklungen in unseren Behörden ermöglicht haben, müssen offengelegt werden. Denn eine Demokratie lebt von Vertrauen – und Vertrauen muss verdient werden. Jeden Tag aufs Neue.
.
.
MARCEL BARZ, Jahrgang 1975, war Offizier der Bundeswehr und studierte Wirtschafts- und Organisationswissenschaften sowie Wirtschaftsinformatik. Er war Gründer und Geschäftsführer einer Softwarefirma, die sich auf Datenanalyse und Softwareentwicklung spezialisiert hatte. Im August 2021 veröffentlichte Barz den Videovortrag »Die Pandemie in den Rohdaten«, der über eine Million Aufrufe erzielte. Seitdem macht er als "Erbsenzähler" auf Widersprüche in amtlichen Statistiken aufmerksam.
-
@ a95c6243:d345522c
2024-12-21 09:54:49Falls du beim Lesen des Titels dieses Newsletters unwillkürlich an positive Neuigkeiten aus dem globalen polit-medialen Irrenhaus oder gar aus dem wirtschaftlichen Umfeld gedacht hast, darf ich dich beglückwünschen. Diese Assoziation ist sehr löblich, denn sie weist dich als unverbesserlichen Optimisten aus. Leider muss ich dich diesbezüglich aber enttäuschen. Es geht hier um ein anderes Thema, allerdings sehr wohl ein positives, wie ich finde.
Heute ist ein ganz besonderer Tag: die Wintersonnenwende. Genau gesagt hat heute morgen um 10:20 Uhr Mitteleuropäischer Zeit (MEZ) auf der Nordhalbkugel unseres Planeten der astronomische Winter begonnen. Was daran so außergewöhnlich ist? Der kürzeste Tag des Jahres war gestern, seit heute werden die Tage bereits wieder länger! Wir werden also jetzt jeden Tag ein wenig mehr Licht haben.
Für mich ist dieses Ereignis immer wieder etwas kurios: Es beginnt der Winter, aber die Tage werden länger. Das erscheint mir zunächst wie ein Widerspruch, denn meine spontanen Assoziationen zum Winter sind doch eher Kälte und Dunkelheit, relativ zumindest. Umso erfreulicher ist der emotionale Effekt, wenn dann langsam die Erkenntnis durchsickert: Ab jetzt wird es schon wieder heller!
Natürlich ist es kalt im Winter, mancherorts mehr als anderswo. Vielleicht jedoch nicht mehr lange, wenn man den Klimahysterikern glauben wollte. Mindestens letztes Jahr hat Väterchen Frost allerdings gleich zu Beginn seiner Saison – und passenderweise während des globalen Überhitzungsgipfels in Dubai – nochmal richtig mit der Faust auf den Tisch gehauen. Schnee- und Eischaos sind ja eigentlich in der Agenda bereits nicht mehr vorgesehen. Deswegen war man in Deutschland vermutlich in vorauseilendem Gehorsam schon nicht mehr darauf vorbereitet und wurde glatt lahmgelegt.
Aber ich schweife ab. Die Aussicht auf nach und nach mehr Licht und damit auch Wärme stimmt mich froh. Den Zusammenhang zwischen beidem merkt man in Andalusien sehr deutlich. Hier, wo die Häuser im Winter arg auskühlen, geht man zum Aufwärmen raus auf die Straße oder auf den Balkon. Die Sonne hat auch im Winter eine erfreuliche Kraft. Und da ist jede Minute Gold wert.
Außerdem ist mir vor Jahren so richtig klar geworden, warum mir das südliche Klima so sehr gefällt. Das liegt nämlich nicht nur an der Sonne als solcher, oder der Wärme – das liegt vor allem am Licht. Ohne Licht keine Farben, das ist der ebenso simple wie gewaltige Unterschied zwischen einem deprimierenden matschgraubraunen Winter und einem fröhlichen bunten. Ein großes Stück Lebensqualität.
Mir gefällt aber auch die Symbolik dieses Tages: Licht aus der Dunkelheit, ein Wendepunkt, ein Neuanfang, neue Möglichkeiten, Übergang zu neuer Aktivität. In der winterlichen Stille keimt bereits neue Lebendigkeit. Und zwar in einem Zyklus, das wird immer wieder so geschehen. Ich nehme das gern als ein Stück Motivation, es macht mir Hoffnung und gibt mir Energie.
Übrigens ist parallel am heutigen Tag auf der südlichen Halbkugel Sommeranfang. Genau im entgegengesetzten Rhythmus, sich ergänzend, wie Yin und Yang. Das alles liegt an der Schrägstellung der Erdachse, die ist nämlich um 23,4º zur Umlaufbahn um die Sonne geneigt. Wir erinnern uns, gell?
Insofern bleibt eindeutig festzuhalten, dass “schräg sein” ein willkommener, wichtiger und positiver Wert ist. Mit anderen Worten: auch ungewöhnlich, eigenartig, untypisch, wunderlich, kauzig, … ja sogar irre, spinnert oder gar “quer” ist in Ordnung. Das schließt das Denken mit ein.
In diesem Sinne wünsche ich euch allen urige Weihnachtstage!
Dieser Beitrag ist letztes Jahr in meiner Denkbar erschienen.
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ a95c6243:d345522c
2024-12-13 19:30:32Das Betriebsklima ist das einzige Klima, \ das du selbst bestimmen kannst. \ Anonym
Eine Strategie zur Anpassung an den Klimawandel hat das deutsche Bundeskabinett diese Woche beschlossen. Da «Wetterextreme wie die immer häufiger auftretenden Hitzewellen und Starkregenereignisse» oft desaströse Auswirkungen auf Mensch und Umwelt hätten, werde eine Anpassung an die Folgen des Klimawandels immer wichtiger. «Klimaanpassungsstrategie» nennt die Regierung das.
Für die «Vorsorge vor Klimafolgen» habe man nun erstmals klare Ziele und messbare Kennzahlen festgelegt. So sei der Erfolg überprüfbar, und das solle zu einer schnelleren Bewältigung der Folgen führen. Dass sich hinter dem Begriff Klimafolgen nicht Folgen des Klimas, sondern wohl «Folgen der globalen Erwärmung» verbergen, erklärt den Interessierten die Wikipedia. Dabei ist das mit der Erwärmung ja bekanntermaßen so eine Sache.
Die Zunahme schwerer Unwetterereignisse habe gezeigt, so das Ministerium, wie wichtig eine frühzeitige und effektive Warnung der Bevölkerung sei. Daher solle es eine deutliche Anhebung der Nutzerzahlen der sogenannten Nina-Warn-App geben.
Die ARD spurt wie gewohnt und setzt die Botschaft zielsicher um. Der Artikel beginnt folgendermaßen:
«Die Flut im Ahrtal war ein Schock für das ganze Land. Um künftig besser gegen Extremwetter gewappnet zu sein, hat die Bundesregierung eine neue Strategie zur Klimaanpassung beschlossen. Die Warn-App Nina spielt eine zentrale Rolle. Der Bund will die Menschen in Deutschland besser vor Extremwetter-Ereignissen warnen und dafür die Reichweite der Warn-App Nina deutlich erhöhen.»
Die Kommunen würden bei ihren «Klimaanpassungsmaßnahmen» vom Zentrum KlimaAnpassung unterstützt, schreibt das Umweltministerium. Mit dessen Aufbau wurden das Deutsche Institut für Urbanistik gGmbH, welches sich stark für Smart City-Projekte engagiert, und die Adelphi Consult GmbH beauftragt.
Adelphi beschreibt sich selbst als «Europas führender Think-and-Do-Tank und eine unabhängige Beratung für Klima, Umwelt und Entwicklung». Sie seien «global vernetzte Strateg*innen und weltverbessernde Berater*innen» und als «Vorreiter der sozial-ökologischen Transformation» sei man mit dem Deutschen Nachhaltigkeitspreis ausgezeichnet worden, welcher sich an den Zielen der Agenda 2030 orientiere.
Über die Warn-App mit dem niedlichen Namen Nina, die möglichst jeder auf seinem Smartphone installieren soll, informiert das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). Gewarnt wird nicht nur vor Extrem-Wetterereignissen, sondern zum Beispiel auch vor Waffengewalt und Angriffen, Strom- und anderen Versorgungsausfällen oder Krankheitserregern. Wenn man die Kategorie Gefahreninformation wählt, erhält man eine Dosis von ungefähr zwei Benachrichtigungen pro Woche.
Beim BBK erfahren wir auch einiges über die empfohlenen Systemeinstellungen für Nina. Der Benutzer möge zum Beispiel den Zugriff auf die Standortdaten «immer zulassen», und zwar mit aktivierter Funktion «genauen Standort verwenden». Die Datennutzung solle unbeschränkt sein, auch im Hintergrund. Außerdem sei die uneingeschränkte Akkunutzung zu aktivieren, der Energiesparmodus auszuschalten und das Stoppen der App-Aktivität bei Nichtnutzung zu unterbinden.
Dass man so dramatische Ereignisse wie damals im Ahrtal auch anders bewerten kann als Regierungen und Systemmedien, hat meine Kollegin Wiltrud Schwetje anhand der Tragödie im spanischen Valencia gezeigt. Das Stichwort «Agenda 2030» taucht dabei in einem Kontext auf, der wenig mit Nachhaltigkeitspreisen zu tun hat.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ a95c6243:d345522c
2024-12-06 18:21:15Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\ dass wir Vorteile aus ihr ziehen;\ in jedem andern hegt man den Wunsch,\ dass der Unschuldige in Schutz genommen werde.\ Jean-Jacques Rousseau
Politiker beteuern jederzeit, nur das Beste für die Bevölkerung zu wollen – nicht von ihr. Auch die zahlreichen unsäglichen «Corona-Maßnahmen» waren angeblich zu unserem Schutz notwendig, vor allem wegen der «besonders vulnerablen Personen». Daher mussten alle möglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener «Schutzmaßnahmen» den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen – wie erwartet – massive Nebenwirkungen, sondern Maskentragen schadet der Psyche und der Entwicklung (nicht nur unserer Kinder) und «Lockdowns und Zensur haben Menschen getötet».
Eine der wichtigsten Waffen unserer «Beschützer» ist die Spaltung der Gesellschaft. Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persönlichen Erfahrungen als Kritikerin der Maßnahmen berichtete kürzlich eine Schweizerin im Interview mit Transition News. Sie sei schwer enttäuscht und verspüre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit «Geimpften».
Menschen, die aufrichtig andere schützen wollten, werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ärzte, darunter Heinrich Habig, Bianca Witzschel und Walter Weber. Über den aktuell laufenden Prozess gegen Dr. Weber hat Transition News mehrfach berichtet (z.B. hier und hier). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-«Impfung» bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie Alexander Bittner erfahren mussten.
Die eigentlich Kriminellen schützen sich derweil erfolgreich selber, nämlich vor der Verantwortung. Die «Impf»-Kampagne war «das größte Verbrechen gegen die Menschheit». Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn Hunter möglicherweise auch Anthony Fauci begnadigen wird – in diesem Fall sogar präventiv. Gibt es überhaupt noch einen Rest Glaubwürdigkeit, den Biden verspielen könnte?
Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dürfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rücken.
Das Buch «The Real Anthony Fauci» des nominierten US-Gesundheitsministers Robert F. Kennedy Jr. erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der öffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb übrigens Călin Georgescu, der Überraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der Panik im Wertewesten.
In Rumänien selber gab es gerade einen Paukenschlag: Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die für Sonntag angesetzte Stichwahl kurzfristig abgesagt – wegen angeblicher «aggressiver russischer Einmischung». Thomas Oysmüller merkt dazu an, damit sei jetzt in der EU das Tabu gebrochen, Wahlen zu verbieten, bevor sie etwas ändern können.
Unsere Empörung angesichts der Historie von Maßnahmen, die die Falschen beschützen und für die meisten von Nachteil sind, müsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem «Schutz vor Desinformation und Hassrede» (sprich: Zensur) wird es unsere wichtigste Aufgabe sein, Gräben zu überwinden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-11-29 19:45:43Konsum ist Therapie.
Wolfgang JoopUmweltbewusstes Verhalten und verantwortungsvoller Konsum zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
Heute ist also wieder mal «Black Friday», falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
Warum fallen wir auf derartige Werbetricks herein und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
Gedankenlosigkeit und Maßlosigkeit können besonders bei der Ernährung zu ernsten Problemen führen. Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
Kritik am schwarzen Freitag und dem unnötigen Konsum kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
Die EU-Kommission lancierte 2015 den Begriff «Green Friday» im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das Pariser Abkommen unterzeichnet werden sollte.
Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt. Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des «Green New Deal» verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um Valencia dazu sagen?
Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020 eine «grüne Erholung von Covid-19, um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie «verantwortungsvolle Risikobereitschaft» unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 16d11430:61640947
2025-01-25 23:05:47The entanglement of fiat currency, racial hierarchies, and colonialism is not merely a historical artifact but a systemic force that continues to shape the modern world. While colonialism has shifted from overt territorial domination to more subtle forms of economic and ideological control, its foundations remain deeply rooted in racialized exploitation and fiat-based financial systems. This article explores how fiat currency has historically been a tool of colonial power, how race has been weaponized to justify and sustain economic hierarchies, and how these forces persist in contemporary global structures.
The Role of Fiat in Colonial Domination
Fiat currency—money without intrinsic value, issued by centralized authorities—played a pivotal role in enabling colonial powers to exert control over colonized territories. By dismantling indigenous systems of trade and imposing fiat-based economies, colonizers centralized power, creating a structural dependence that persists to this day.
-
Monetary Imposition and Disruption: Colonial administrations replaced local barter systems and commodity currencies with fiat systems, compelling indigenous populations to use colonial currencies for taxes, goods, and services. This enforced participation in a colonial economic order undermined self-sufficient local economies. For example, the British introduction of the rupee in India dismantled complex indigenous trade networks, forcing economic realignment under colonial terms.
-
Taxation and Forced Labor: Fiat systems were weaponized to coerce colonized populations into labor. Taxes, often payable only in colonial currency, forced people to work within colonial enterprises to earn the money required. This dependency reinforced economic subjugation.
-
Inflation as Extraction: By manipulating fiat currency supplies, colonial powers extracted wealth from colonies. Printing excess money devalued local economies while enriching colonial elites. This strategy was less visible but equally exploitative compared to direct resource extraction.
Race as an Economic Justification
While fiat systems provided the mechanisms of economic control, racial ideologies provided the moral and political justification for colonial domination. Race became a lens through which economic inequality was normalized, rationalizing the exploitation of non-European populations.
-
Racialized Labor Exploitation: Under colonialism, racial hierarchies determined access to wealth and opportunities. Indigenous and enslaved peoples were systematically underpaid or unpaid, while Europeans occupied privileged economic positions. Racial ideologies framed these disparities as natural or deserved.
-
The Commodification of Racialized Bodies: Fiat systems also underpinned the commodification of human lives during slavery. Loans, bonds, and other financial instruments were issued based on the value of enslaved people, reducing human beings to economic units within racialized systems of extraction.
-
The Devaluation of Indigenous Economies: Indigenous systems of wealth and exchange were not merely disrupted but devalued, portrayed as primitive or inefficient compared to fiat-based systems. This cultural erasure further entrenched economic hierarchies tied to race.
Fiat Colonialism’s Modern Legacy
The relationship between fiat and racialized economic control persists in the global financial architecture:
-
Structural Dependence: Many post-colonial nations remain reliant on currencies introduced during colonial rule or tied to foreign powers. For example, the CFA franc in West Africa still links former French colonies to the French treasury, perpetuating neo-colonial dependency.
-
Global Financial Institutions: Organizations like the IMF and World Bank, operating within fiat systems, impose structural adjustment policies on Global South nations. These policies prioritize debt repayment to wealthy nations, often at the expense of local development. The racialized logic of colonialism reappears in these economic relationships, where predominantly non-European nations bear the brunt of austerity measures.
-
Racialized Access to Capital: In modern fiat economies, access to credit and capital is often disproportionately restricted for marginalized racial groups. This reinforces historical inequities rooted in colonial systems of economic exclusion.
Ideological Colonialism Through Fiat
Fiat currency is not merely a tool of economic exchange but a vehicle for ideological dominance. The imposition of Western fiat systems during colonialism also imposed Western economic values, undermining indigenous worldviews and institutionalizing a global hierarchy that remains intact today.
Monetary Sovereignty: By denying colonized nations the right to issue their own currencies, colonial powers stripped them of economic sovereignty. Today, this legacy continues as many nations remain economically constrained by foreign-controlled fiat systems.
Cultural Hegemony: Fiat systems have been a means of propagating cultural imperialism. Indigenous concepts of value and exchange, which often prioritized communal well-being over profit, were replaced by extractive models tied to fiat economies.
A Decolonial Perspective: Bitcoin and Alternatives
In the face of these enduring systems, decentralized financial systems like Bitcoin present a potential challenge to the colonial logic embedded in fiat systems:
-
Decentralized Sovereignty: Bitcoin operates independently of centralized authorities, offering nations and individuals the opportunity to bypass fiat dependencies. This could empower post-colonial states to reclaim economic autonomy.
-
Neutrality and Accessibility: Unlike fiat systems, which often reflect and reinforce racial and geopolitical hierarchies, Bitcoin is borderless and non-discriminatory, creating opportunities for marginalized groups to access capital and build wealth.
-
Transparency and Accountability: Blockchain technology ensures transparency, reducing the opacity that has historically allowed global financial institutions to exploit vulnerable nations through predatory practices.
Conclusion
The historical entanglement of fiat currency, race, and colonialism reveals how economic systems have been designed to sustain power imbalances. While colonialism has shifted in form—from direct rule to economic and ideological control—the core principles remain intact, with fiat currency serving as a critical mechanism for perpetuating these hierarchies.
Decolonizing the global economy requires dismantling these systems, recognizing their racialized foundations, and exploring alternatives that prioritize equity and autonomy. Bitcoin and decentralized technologies offer a potential pathway, though their success depends on a broader commitment to addressing the structural inequalities that fiat-based colonialism has left in its wake.
This is not just an economic imperative but a moral one: to imagine and build a world no longer bound by the exploitative legacies of fiat and race.
-
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik – mit teils erschreckenden Auswüchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik «vorsätzlich herbeigeführt» worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit Jörg Kukies habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können. Das ging erst kürzlich aus dem diesjährigen «Freiheitsindex» hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
«Die absolute Mehrheit hat absolut die Nase voll», titelte die Bild angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein «Losdemokratie» will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere Bemühungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 1cb14ab3:95d52462
2025-01-25 22:51:08Tree branches, Rock. 4' x 4 [Boulder, USA. 2016]
Introduction
From atop Flagstaff Mountain, Folsom frames Boulder’s iconic Folsom Field, a symbol of youth, learning, and community. This lens offers a moment of reflection on the brevity of the college experience and the transient nature of life, inviting viewers to connect with the campus and its fleeting but impactful moments.
Site & Placement
The lens is strategically placed to frame the stadium, blending the vibrant life of the campus with Boulder’s vast and enduring natural landscape. The bench, situated 6 feet from the lens, offers a space to sit and contemplate the juxtaposition of permanence and change, of structure and wilderness.
Impermanence & Integration
Constructed from branches and rock, Folsom is designed to fade into the mountain landscape after only a short time. Its impermanence echoes the fleeting nature of the college years, reminding viewers that growth and transformation are rooted in moments that pass all too quickly.
Reflection
Through its brief presence, Folsom captures the delicate interplay between human experiences and the enduring landscapes that frame them. It invites viewers to celebrate the vibrant present while acknowledging the inevitability of change.
Photos
More from the 'Earth Lens' Series:
Earth Lens Series: Artist Statement + List of Works
"Looking Glass" (Earth Lens 001)
COMING SOON: "Sanctuary" (Earth Lens 003)
COMING SOON: "Platte" (Earth Lens 004)
COMING SOON: "Grandfather" (Earth Lens 005)
COMING SOON: "Chongming" (Earth Lens 006)
More from Hes
All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzünden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen müssen. Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-«Impfstoffen» von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß, dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz für Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder «Volksverhetzung» werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen Glückwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. Damals notierte ich:
«Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen «inneren Totalschaden» hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ a95c6243:d345522c
2024-10-19 08:58:08Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
Das Gewissen regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-
@ d9cfbbde:e7cfd9fd
2025-01-25 22:47:10Testing if this can be edited after publishing...
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 16d11430:61640947
2025-01-25 22:32:58In the world of fiat, bosses are no longer mere professionals managing resources and people. They are, in essence, Big Brother's appointed handlers, glorified totems of obedience whose primary role is to ensure the herd stays docile, compliant, and tethered to their assigned hamster wheels. They don’t just manage; they surveil. With Orwellian precision, their every motivational email, team-building exercise, and performance review is an insidious mechanism for upholding the grand illusion of "freedom within structure."
These citizen-handlers come cloaked in titles like "team leader" or "manager," but their true mandate is far more sinister. Their KPIs aren’t just productivity or revenue—it’s compliance. It’s ensuring that no one questions why a third of their paycheck evaporates into the shadowy depths of taxes and inflation, why corporate policies look more like legislation, or why time—the only non-renewable resource—is spent propping up systems designed to ensure it is wasted.
Their tools? The carrot and the stick, but reinvented for the modern serfdom. The carrot is a pay raise that barely outpaces inflation, a shiny "employee of the month" badge that says, "You’re a good hamster!" The stick? Passive-aggressive emails, whispered conversations about "alignment with company values," and the ever-present specter of "budget cuts," a euphemism for your expendability in the machinery.
Dark satire requires pointing out the absurdities they enforce with a straight face: They orchestrate pointless Zoom meetings that siphon hours of productivity but demand employees "turn on their cameras" as proof of existence. They impose performance reviews steeped in doublespeak, where "areas of improvement" mean "You’re not docile enough," and "leadership potential" is code for "You’re great at mirroring propaganda."
Their allegiance is not to you, nor even to the company. It’s to the system that birthed them—a system that thrives on mediocrity, rewards complicity, and punishes dissent. The fiat boss isn’t a mentor; they’re a handler armed with spreadsheets, PowerPoints, and policies designed to turn independent thought into a liability. They are the human interface of a system that cannot tolerate deviation, individuality, or questions like, "Why are we doing this in the first place?"
In their world, promotions aren’t about merit but about trust—trust that you will perpetuate the cycle without asking too many questions. "You’re like family here," they say, but families don’t dock your pay for being late. "We value innovation," they claim, while shackling creativity with bureaucratic hurdles. "We care about work-life balance," they insist, while quietly monitoring your Slack activity at 11 PM.
Ultimately, the fiat boss-handler is a tragic figure in this dark satire, a cog who believes they’re the engine, a shepherd who thinks they’re free while they guide the sheep. They are the unwitting enforcers of a dystopia where freedom is rationed, individuality is commodified, and dissent is erased—not by decree, but by performance improvement plans.
-
@ 9e69e420:d12360c2
2025-01-25 22:16:54President Trump plans to withdraw 20,000 U.S. troops from Europe and expects European allies to contribute financially to the remaining military presence. Reported by ANSA, Trump aims to deliver this message to European leaders since taking office. A European diplomat noted, “the costs cannot be borne solely by American taxpayers.”
The Pentagon hasn't commented yet. Trump has previously sought lower troop levels in Europe and had ordered cuts during his first term. The U.S. currently maintains around 65,000 troops in Europe, with total forces reaching 100,000 since the Ukraine invasion. Trump's new approach may shift military focus to the Pacific amid growing concerns about China.
-
@ 1ec45473:d38df139
2025-01-25 20:15:01The probability of AGI ending us is negative.
A common tactic among doomers is to state something along the lines of the following:
"If we create AGI, there is some non-zero chance every year, that the AGI will end humanity. Whatever that chance is compounds every year, and is thus unacceptable."
The question I would ask the doomer is "How do you know that the chance of AGI ending humanity isn't negative?"
What does it mean for AGI to have a negative chance of ending humanity?
Setting aside AGI for a moment, what is the chance every year that humanity ends from other events, such as nuclear war, solar flares, super-volcanoes, asteroid hits, societal collapse, etc?
How do you even answer this question in a reasonable manner? Well lets look at past data.
Of all species that have existed 99% have gone extinct.
Of our closest 7 relatives from the genus Homo, 100% have gone extinct.
On a higher level looking at civilizational collapse. According to Wikipedia, virtually all historical societies have collapsed.
Looking out into the universe, we see no signs of life elsewhere, so if there was life in the past we can assume that they have gone extinct.
It would therefore be reasonable to say that the chance of our extinction is very high even without AGI, well above 90%. Maybe 99%.
You could argue the numbers but at least with these numbers we are using some past data to extrapolate the future, where the doomers are using no data whatsoever to support their numbers.
We can also state, that of all the species and societies that have collapsed in the past, they have done so because they did not yet have the knowledge on how to survive. They didn't know how to create antibiotics, or generate enough energy, or defend themselves from the environment.
What is AGI? AGI is a way to create knowledge. Most all societies in the past have collapsed because they didn't have the knowledge on how to survive, and the doomer argument is that we should slow down our ability to create knowledge, when we know that this has been precisely the problem in the past.
It is a certainty we will all die without more knowledge then we have now. The future death of our sun ensures that.
We have to create the knowledge on how to survive, and that is what AGI does - it creates knowledge.
AGI most certainly has a negative probability of ending humanity.
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ 1ec45473:d38df139
2025-01-25 20:15:01Preston Pysh posted this event this morning:
Behind the scenes, the nostr event looks like this:
Event = { "id":"a6fa7e1a73ce70c6fb01584a0519fd29788e59d9980402584e7a0af92cf0474a", "pubkey":"85080d3bad70ccdcd7f74c29a44f55bb85cbcd3dd0cbb957da1d215bdb931204", "created_at":1724494504, "kind":1, "tags":[ [ "p", "6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb", "", "mention" ], [ "p", "77ec966fcd64f901152cad5dc7731c7c831fe22e02e3ae99ff14637e5a48ef9c", "", "mention" ], [ "p", "c1fc7771f5fa418fd3ac49221a18f19b42ccb7a663da8f04cbbf6c08c80d20b1", "", "mention" ], [ "p", "50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63", "", "mention" ], [ "p", "20d88bae0c38e6407279e6a83350a931e714f0135e013ea4a1b14f936b7fead5", "", "mention" ], [ "p", "273e7880d38d39a7fb238efcf8957a1b5b27e819127a8483e975416a0a90f8d2", "", "mention" ], [ "t", "BH2024" ] ], "content":"Awesome Freedom Panel with...", "sig":"2b64e461cd9f5a7aa8abbcbcfd953536f10a334b631a352cd4124e8e187c71aad08be9aefb6a68e5c060e676d06b61c553e821286ea42489f9e7e7107a1bf79a" }
In nostr, all events have this form, so once you become familiar with the nostr event structure, things become pretty easy.
Look at the "tags" key. There are six "p" tags (pubkey) and one "t" tag (hashtag).
The p tags are public keys of people that are mentioned in the note. The t tags are for hashtags in the note.
It is common when working with NOSTR that you have to extract out certain tags. Here are some examples of how to do that with what are called JavaScript Array Methods:
Find the first "p" tag element:
``` Event.tags.find(item => item[0] === 'p')
[ 'p', '6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb', '', 'mention' ]
```
Same, but just return the pubkey":
``` Event.tags.find(item => item[0] === 'p')[1]
'6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb'
```
Filter the array so I only get "p" tags:
``` Event.tags.filter(item => item[0] === 'p')
[ [ 'p', '6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb', '', 'mention' ], [ 'p', '77ec966fcd64f901152cad5dc7731c7c831fe22e02e3ae99ff14637e5a48ef9c', '', 'mention' ], [ 'p', 'c1fc7771f5fa418fd3ac49221a18f19b42ccb7a663da8f04cbbf6c08c80d20b1', '', 'mention' ], [ 'p', '50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63', '', 'mention' ], [ 'p', '20d88bae0c38e6407279e6a83350a931e714f0135e013ea4a1b14f936b7fead5', '', 'mention' ], [ 'p', '273e7880d38d39a7fb238efcf8957a1b5b27e819127a8483e975416a0a90f8d2', '', 'mention' ] ]
```
Return an array with only the pubkeys in the "p" tags:
``` Event.tags.filter(item => item[0] === 'p').map(item => item[1])
[ '6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb', '77ec966fcd64f901152cad5dc7731c7c831fe22e02e3ae99ff14637e5a48ef9c', 'c1fc7771f5fa418fd3ac49221a18f19b42ccb7a663da8f04cbbf6c08c80d20b1', '50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63', '20d88bae0c38e6407279e6a83350a931e714f0135e013ea4a1b14f936b7fead5', '273e7880d38d39a7fb238efcf8957a1b5b27e819127a8483e975416a0a90f8d2' ]
```
-
@ 1ec45473:d38df139
2025-01-25 20:15:01`` ______________ / /| / / | /____________ / | | ___________ | | || || | || #NOSTR || | || || | ||___________|| | | _______ | / /| (_______) | / ( |_____________|/ \ .=======================. | :::::::::::::::: ::: | | ::::::::::::::[] ::: | | ----------- ::: |
-----------------------'```
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ 0d7bc80d:aaf2218d
2025-01-25 16:55:59\ Volkesbewusstsein, as interpreted from Carl von Savigny’s legal philosophy, and utilized by Carl Schmitt in his own, refers to the common consciousness of the people.
For Savigny, this meant that the laws and boundaries of the state evolve organically out of the collective consciousness of the people in a given historical period. A blooming out of the shared cultural fabric of a society.
Schmitt’s interpretation is slightly more assertive, seen more as an imposition of the collective will in defining the sovereign and the state.
But what makes up the common consciousness of society in our time? How does that influence the formation of our state and its laws? My sense is that the thing most shared or collective about our current consciousness is the schizophrenic quality of it. Our cultural fabric is that of an insane asylum,. We swim deep inside the algorithmic passivity of our historical moment, and this has fragmented our consciousness.
The concept of the public sphere as conceptualized by Jürgen Habermas projects an idealized image of a bygone era of communal communication and a genuine shared experience of reality. The public sphere was an arena for dialogue, disagreement, and maybe even reconciliation. This ideal held that communication occurred outside the bounds of state and market manipulation and held to rational discourse as a means of discovering Volkesbewusstsein.
Habermas was aware and critical of the modern erosion of the public sphere due to mass media and its influences. And here we are now in our cultural moment. It’s become trite to remind ourselves of the algorithmic sway that we encounter on a daily basis through social media news feeds. But this is one of those realities we need to continually encounter to take seriously, because it backgrounds itself so well. We become passive automatons swayed for engagement. AI agents capturing our attention and manipulating the lizard brain.
We are all aware of this.
However, to what extent are we understanding the schizophrenic agency of the algorithmic hyper-agent? There’s undoubtedly intentional manipulation of information for explicit ends, not explicit to us necessarily, but to someone or some bureaucracy.
What happens though when we have a myriad of explicit algorithmic hyper-agents taking over the public sphere? I’m no clinician, but my diagnosis is schizophrenia at the level of our distributed cognition. We’re in a collective asylum and the guards are insane too.
What kind of heroes emerge out of that cultural fabric? Well, insane ones. And they will look perfectly sane in their response to a system of state sovereignty and laws that have emerged out of that asylum. And we’ll cheer it on as it feels like entropy towards collapse is the only thing that might save us. Not that we are always conscious of our entropic aims. But the walls are crumbling down, and everyone has a sledgehammer, so we decide to pick one up as well. We’d prefer to feel that we’re at least exercising SOME sort of agency, after all.
I find myself entirely addicted to my comforting insanity. Precisely because it gives me the illusion of agency, rather than the passivity that Habermas feared would be the destruction of the public sphere. I’m grateful that every now and then, I’m able to stand back and examine the frames I’m applying, or that have been applied for me, and recognize my passivity.
Perennially, it becomes apparent that we need to step outside of the passive sway of our screens and to engage in an algorithmic free salon. The idealized picture of humans in a communal space, with minimally distorted flows of information, in true dialogue. A mutual respect for each other and our different value judgements, with a shared commitment to orienting towards truth.
The most basic way we can do this is to continually step back from the asylum, and find a quiet corner to discuss with other well intentioned patients how we might organically blossom out a new common consciousness. It’s hegemonic character, that which dominates it, need not be the assertion of one difference over the other, but the assertion that differences in value systems share some orientation.
All this must be, for now, done from the place of acceptance of our diagnosis. Our conversations in the public sphere will need to continually encounter and correct for our schizophrenia. But if enough of us pick up a hammer and start smashing it against the wall of the asylum, a new organic shared consciousness has a shot at arising.
-
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ d57360cb:4fe7d935
2025-01-25 15:43:16Martial Arts has a way of imparting deep lessons on you, lessons that you feel deep to the core. Here are a few that have stuck with me. These lessons extend beyond the field of martial arts into every area of life, may you find value in them.
Static Vs Dynamic
The world is a dynamic and fluid domain, yet we think statically. This error makes us incompatible. When we think about the future and the past, they are fixed in our minds. We might have a grand plan for how we will beat our opponent or hold fear of a loss we suffered at the hands of another opponent. Because these are harbored in our minds, we are fixed in place entering a battle which is constantly moving.
To succeed one has to abandon the static and learn to dance. Let me explain this through the problem solving process.
Problem Solving
Imagine there's a giant wall in front of you and this wall is going to fall directly on top of you. Here you're faced with a problem, the wall falling and you also might have guessed the solution which is get out of the way. The usual approach people take in solving problems is they wait til the problem has already taken place and established itself to act.
Knowing fully the wall is falling they will wait til the wall has crushed them, only then they'll enact their plan to get out of the way. Their plan may very well work but not when the wall has already fallen, this renders their plan useless even though it is the correct solution. In their minds they see the problem and the solution only taking place when certain factors are met and conditions are perfect.
They will not act to evade a punch until hit in the face, they won't try to escape a choke until their opponent is squeezing the life out of them. This is the error of unskilled beginners yet it's a necessary path to the dynamic.
The best way to avoid danger is not going there in the first place
At a certain point you will get tired of getting hit in the face, getting choked out, and having the wall get crushed on you. You will see others using the very same solutions you're using and wonder why they succeed and you don't. The cogs in your brain come alive and you begin to think if the solution is to get out the way, I need to do it before or as the wall is falling not when it's already fallen. This takes you from the static to the dynamic, from thinking to feeling.
Instead of thinking and anticipating a punch and then moving, you no longer anticipate you immerse yourself in the chaos and are free to feel. You no longer wait for your opponent to have his hands around your neck to avoid getting choked, you avoid the situation altogether. You see the wall falling and you step out of the way, by nature another wall replaces it, this one is also falling and you maneuver out of its way. This is the great dance, this is the art.
Failure is Information
"The fool that persists in his folly soon becomes wise"
In life as in the arts you will continually face failures or walls. Most people view these as negative. Having a wall crushed on them they take it personally, blame themselves, how terrible they are and how much better their opponent is. These are your trusted guides they show you where you are fixed in place, they show you your inflexibility, your rigidity. They humble you over and over. It may take days, weeks, years or months for you to realize. In this way the end never arrives, the path of practice is the goal.
With diligence and patience the thing you once saw as a failure will become your wisest friend.
No opponent
Each person is going through this struggle internally. They face their own set of problems. In this way your opponents serve you as you serve them. The person that beats you down is not a rival, he's also not 'better' in any way he's exposed you and shown you the areas you have blindspots and weakness in. In the same way you serve that purpose for those just starting on the path. You may beat someone down and think you are 'better' than those you dominate. This is the wrong view you are a guide to those below you and student to those above you.
If you get caught up in your ego and status you will be blinded. One must leave the static world of victory and loss to find the dynamic.
Everything Bleeds
This was a post on material arts, but you could very well replace martial arts with any field and any set of problems. The incompatible mix of the static mind and dynamic world is found in every area of life. The lessons you learn from one area can be translated to another, these lessons are fundamental. In this way lessons bleed and overflow into everything you touch. You are the center of experience the things you devote time to in life are merely tools of expression.
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 378562cd:a6fc6773
2025-01-25 15:19:53Top 20 U.S. Cryptocurrency Headlines:
-
SEC Reverses Crypto Accounting Rule, Easing Bank Participation The U.S. Securities and Exchange Commission (SEC) has overturned guidance that previously treated digital tokens as liabilities on bank balance sheets. This reversal is expected to facilitate banks in offering cryptocurrency custody services without facing significant penalties.
-
President Trump Signs Executive Order to Bolster Crypto Industry. President Donald Trump has issued an executive order titled "Strengthening American Leadership in Digital Financial Technology," aiming to position the U.S. as a global leader in the digital asset market. The order includes the creation of a task force to propose new crypto regulations and explore the establishment of a national digital asset stockpile.
-
Crypto Markets React to New Regulatory Initiatives. Following the administration's recent policy moves, the cryptocurrency market experienced a dip, with Bitcoin stabilizing around $105,000. The creation of a task force to propose new crypto regulations has introduced uncertainty, leading to profit-taking among investors.
-
Industry Celebrates Anticipated Deregulation Amid Caution. The cryptocurrency community is optimistic about the administration's supportive stance, including proposals for a U.S. Bitcoin reserve. However, experts caution that increased government endorsement could expose the financial system to significant risks if the market faces downturns.
-
White House Appoints David Sacks as Crypto and AI Advisor. The administration has appointed tech entrepreneur David Sacks as the White House's cryptocurrency and artificial intelligence advisor. Sacks will lead the newly formed Presidential Task Force on Digital Asset Markets, focusing on developing regulatory frameworks and exploring the creation of a national Bitcoin reserve.
-
Bitcoin Price Surges to All-Time High Amid Policy Shifts. Bitcoin has reached a record high of $109,000, driven by increased interest following endorsements from President Trump and tech entrepreneur Elon Musk. The launch of cryptocurrencies associated with both Trump and former First Lady Melania Trump has further fueled market enthusiasm.
-
Financial Institutions Show Renewed Interest in Crypto Services. Major financial firms, including Charles Schwab, are exploring deeper engagement in the crypto market following recent regulatory changes. Traditional banks are now better positioned to offer cryptocurrency custody services, reflecting a shift towards mainstream adoption.
-
Congressional Leaders Express Concerns Over Rapid Crypto Expansion. Some lawmakers have raised concerns about the swift regulatory changes favoring the cryptocurrency industry. They caution that rapid deregulation could lead to increased market volatility and potential risks to the broader financial system.
-
Crypto-Related Crimes Prompt Calls for Enhanced Security Measures. The recent kidnapping and assault of Ledger co-founder David Balland have highlighted the risks associated with the crypto industry. Security experts advise individuals involved in cryptocurrency to exercise discretion regarding their personal wealth and implement robust security protocols.
-
Stablecoin Development Encouraged Under New Executive Order. The administration's executive order promotes the development of dollar-backed stablecoins for global use, aiming to enhance the U.S. dollar's presence in the digital asset space while prohibiting the establishment of a central bank digital currency (CBDC) in the U.S.
-
Crypto Education Initiatives Launched to Foster Public Understanding. In response to the growing interest in digital assets, educational programs are being developed to inform the public about cryptocurrency investment risks and opportunities, aiming to promote responsible participation in the market.
-
Tech Companies Explore Blockchain Integration Amid Regulatory Clarity. With the recent regulatory developments, technology firms are increasingly considering blockchain integration into their operations, anticipating that clearer guidelines will support innovation in the sector.
-
Crypto Taxation Policies Under Review Following Executive Order. The Treasury Department is reviewing existing cryptocurrency taxation policies to align with the new executive order, potentially leading to revised guidelines that could impact investors and businesses.
-
Investment Funds Increase Crypto Holdings Amid Policy Support. Investment funds are bolstering their cryptocurrency portfolios, encouraged by the administration's supportive policies and the SEC's reversal of restrictive accounting rules.
-
Public-Private Partnerships Form to Advance Blockchain Research. New collaborations between government agencies and private companies are emerging to advance blockchain research and development, aiming to maintain the U.S.'s competitive edge in digital financial technologies.
-
Crypto Mining Operations Expand in the U.S.Cryptocurrency mining firms are expanding their operations domestically, attracted by the favorable regulatory environment and potential incentives outlined in recent policy initiatives.
-
Consumer Protection Agencies Advocate for Crypto Awareness. Consumer protection agencies are launching campaigns to raise awareness about the risks associated with cryptocurrency investments, emphasizing the importance of due diligence.
-
State Governments Explore Local Crypto Regulations. In light of federal initiatives, state governments are examining their regulatory frameworks concerning cryptocurrencies to ensure alignment and address local concerns.
-
Academic Institutions Introduce Cryptocurrency Courses. Universities and colleges are adding cryptocurrency and blockchain courses to their curricula, preparing students for careers in the evolving digital asset landscape.
-
Crypto Exchanges Enhance Compliance Measures. Cryptocurrency exchanges are strengthening their compliance protocols in anticipation of forthcoming regulatory recommendations from the Presidential Task Force on Digital Asset Markets.
Top 5 Worldwide Cryptocurrency Headlines:
-
Global Banks Anticipate U.S. Regulatory Changes. International banks are closely monitoring the U.S. regulatory shifts, assessing the potential global impact on cryptocurrency custody services and market participation.
-
European Union Debates Crypto Regulatory Framework. The European Union is engaging in discussions to establish a comprehensive regulatory framework for cryptocurrencies, aiming to balance innovation with consumer protection.
-
Asian Markets React to U.S. Crypto Policy Developments\ Cryptocurrency markets across Asia, including Japan and South Korea, are seeing increased trading activity following the U.S. administration's supportive stance on digital assets. Investors are optimistic about the ripple effects on the global crypto ecosystem.
-
India Announces Plans for Blockchain-Based Voting System\ The Indian government has unveiled plans to pilot a blockchain-based voting system aimed at enhancing election security and transparency. This initiative is part of India's broader efforts to explore blockchain technology in governance.
-
African Nations Embrace Bitcoin for Cross-Border Payments\ Several African countries are increasingly using Bitcoin to facilitate cross-border payments, citing its efficiency and reduced transaction costs. This trend reflects the growing adoption of cryptocurrencies in regions with limited access to traditional financial services.
-
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 9e69e420:d12360c2
2025-01-25 14:32:21| Parameters | Dry Mead | Medium Mead | Sweet Mead | |------------|-----------|-------------|------------| | Honey | 2 lbs (900 grams) | 3 lbs (1.36 kg) | 4 lbs (1.81 kg) | | Yeast | ~0.07 oz (2 grams) | ~0.08 oz (2.5 grams) | ~0.10 oz (3 grams) | | Fermentation | ~4 weeks | 4 to 6 weeks | 6 to 8 weeks | | Racking | Fortnight or later | 1 month or after | ~2 months and after | | Specific Gravity | <1.010 | ~1.01 to ~1.025 | >1.025 |
-
@ 0b14a03f:3f0257c2
2025-01-25 13:33:47Change doesn’t come from something external. The change comes from within. But people are so disconnected from themselves that they keep trying and trying with tools to connect without realizing that if there is no connection within, there won’t be a healthy and long-term connection outside.
Bitcoin has no name or last name because it’s not important who created it. What’s important is what it was made for. That’s written on its roots, in its essence. And that essence won’t be discovered if we keep trying to set it up in old avatars, systems, protocols, and connections.
Bitcoin is not a tool to get rich and be free. It’s a means to disconnect from a broken environment and find a safe place to pause, to feel, to see what’s really inside of ourselves, and to analyze if the world around us is not a consequence but a reflection of our internal disconnection.
Freedom will be a consequence, not a cause of a better future. We can be the artisans of that future by connecting with ourselves from within, as individuals first, and as a community after.
Community as in Common Identity. We need to find our identity, then share it, nurture it with others, and by doing so, be able to create a better world.
Don’t fall into old traps. After all, this is a journey from the mind to the heart.
Happy arriving!
Hug✨
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ a012dc82:6458a70d
2025-01-25 13:09:46The landscape of cryptocurrency is witnessing a potential paradigm shift with the growing interest of institutional investors in Bitcoin. The excitement surrounding the prospect of a spot Bitcoin Exchange-Traded Fund (ETF) is palpable, yet it brings with it a wave of concern. Arthur Hayes, a renowned figure in the cryptocurrency space and the founder of the Maelstrom Fund, stands as a vocal critic of this development. His insights offer a critical perspective on how institutional involvement could fundamentally alter the essence of Bitcoin, potentially steering it away from its founding principles of decentralization and autonomy. This article delves into Hayes' concerns, unraveling the complexities and potential repercussions of institutional custody on the future of Bitcoin.
Table Of Content
-
The Rising Concern of Institutional Involvement
-
The Scenario of Institutional Custody
-
The Essence of Bitcoin at Stake
-
Influence on Network Consensus
-
Long-Term Implications for Bitcoin
-
Conclusion
-
FAQs
The Rising Concern of Institutional Involvement
Arthur Hayes' apprehensions about institutional involvement in Bitcoin are rooted in a deep understanding of both the cryptocurrency world and traditional financial systems. The entry of large financial institutions like BlackRock into the Bitcoin space could signify a significant shift in the dynamics of cryptocurrency ownership and control. These institutions, often perceived as extensions of state interests, could bring a level of centralization and control antithetical to Bitcoin's decentralized ethos. The historical relationship between large financial entities and state mechanisms, and their potential influence on Bitcoin, raises critical questions about the future of this cryptocurrency. The impact of this shift on the broader crypto ecosystem, investor behavior, and Bitcoin's perception in the global financial landscape is profound and multifaceted.
The Scenario of Institutional Custody
The future that Hayes envisions, where significant portions of Bitcoin are locked away in institutional ETFs, is a stark departure from the current state of the cryptocurrency. This transformation could relegate Bitcoin from a vibrant, actively traded asset to a passive component of investment portfolios. Such a shift would not only alter Bitcoin's market dynamics but also its fundamental utility. The implications of this change are far-reaching, affecting everything from Bitcoin's liquidity to its role as a tool for financial freedom and empowerment. The prospect of Bitcoin becoming a mere line item in institutional balance sheets is a scenario that challenges the very ideals upon which the cryptocurrency was built.
The Essence of Bitcoin at Stake
The core of Hayes' argument lies in the potential loss of Bitcoin's identity. If Bitcoin becomes predominantly held in institutional ETFs, it risks becoming just another asset in the global financial system, losing its unique characteristics as a decentralized and autonomous currency. This transformation would affect the philosophical and practical aspects of Bitcoin, impacting principles of autonomy, privacy, and decentralization. The shift from a user-driven to an institutionally controlled asset could have profound implications for the future of Bitcoin, potentially undermining the trust and support of its community.
Influence on Network Consensus
Hayes raises a significant concern about the potential influence of institutional holders on Bitcoin's consensus mechanism and development path. The risk of having a large portion of Bitcoin controlled by entities with different priorities than the broader Bitcoin community is real and concerning. This influence could lead to a misalignment between Bitcoin's development and the needs of its user base, especially regarding crucial updates related to security and privacy enhancements. The integrity and future evolution of Bitcoin's technology could be at stake, raising questions about the true independence and resilience of this decentralized network.
Long-Term Implications for Bitcoin
While the short-term effects of institutional investment, such as price appreciation, are clear, the long-term consequences are more nuanced and complex. The potential trade-offs between short-term gains and long-term impacts on Bitcoin's utility and independence are a critical aspect of this discussion. The paradox of Bitcoin's growing acceptance by traditional financial institutions and the possible erosion of its foundational principles is a dilemma that the crypto community must navigate carefully. The future of Bitcoin, in this context, is not just about its price or market capitalization, but about its ability to retain its core values and functionality.
Conclusion
Arthur Hayes' insights provide a crucial perspective on the evolving landscape of Bitcoin in the face of institutional interest. As the cryptocurrency world grapples with these developments, understanding the balance between mainstream acceptance and the preservation of Bitcoin's core values is essential. This article reflects on the potential risks and implications of institutional custody of Bitcoin, offering a comprehensive analysis that underscores the importance of maintaining the decentralized ethos that has defined Bitcoin since its inception.
FAQs
What is the main concern raised by Arthur Hayes about institutional involvement in Bitcoin? Arthur Hayes expresses concern that institutional involvement, particularly through Bitcoin ETFs, could lead to centralization and control by large financial entities, undermining Bitcoin's decentralized ethos.
How could institutional custody of Bitcoin alter its market dynamics? Institutional custody could transform Bitcoin from an actively traded asset to a passive component of investment portfolios, affecting its liquidity and role as a tool for financial freedom.
What implications does institutional control have on Bitcoin's network consensus? Institutional control could influence Bitcoin's consensus mechanism and development path, potentially leading to a misalignment with the needs of the broader Bitcoin community, especially regarding updates related to security and privacy.
Are there long-term implications of institutional investment in Bitcoin? Yes, while institutional investment might boost Bitcoin's price in the short term, it raises concerns about the long-term impact on Bitcoin's utility, independence, and adherence to its foundational principles.
What is the essence of Arthur Hayes' argument against institutional custody of Bitcoin? Hayes argues that institutional custody risks turning Bitcoin into just another financial asset, losing its unique characteristics as a decentralized and autonomous currency.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 54286b98:3debc100
2025-01-25 12:15:02The gift and the challenge? More time with my kids than most dads get. Days filled with them. It's a blast.
Diapers, potty training, sticky fingers, the easy stuff. Expected. A privilege, really.
But here's what I'm learning: Undivided attention. Presence. That's the hard part. The part that fades.
We walk. Parks, trails, anywhere but inside. They love it. S'mores, impromptu campsites, boats on the horizon, Florida beaches (no walking next to Florida freshwater for this dad, gators!). We read. We play hard. My oldest is discovering the magic of computers.
Mornings with my daughter. Just us. Quiet. Books. Connection. Then her brother wakes, and the day explodes with breakfast, more books, more play.
Knowledge, manners, a little discipline, and a lot of fun. That's the legacy.
But even with all this time, there's still work. Responsibilities. "Papa needs to work." "Papa, don't you want to play with me?" The hardest lesson: balance. Teaching them independence when all they want is connection.
The reminder: Even when life gets crazy, make the moments count. Be there. Truly be there. And trust that when I can't, they'll know it's not about them. It's about the work.
Love them. Cherish them.
Until the next one.
J
___
Feel free to follow me here on nostr or sign up on my website for my blog posts/newsletters, talking about crafting beauty in life, family, entrepreneurship, culture, woodworking & faith.\ https://www.javierfeliu.com/
-
@ 6b57533f:eaa341f5
2025-01-25 11:45:15Page: cover
background: #000000 template: vertical
Welcome to NoStry
This is the first nostr-story ever posted!
Page: intro
background-image: https://nostr.build/i/nostr.png template: vertical
What is NoStry?
NoStry is a new way to tell stories on nostr, combining the best of social media stories with the decentralized nature of nostr.
Page: end
background: #333333 template: vertical
Join the Revolution
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ da0b9bc3:4e30a4a9
2025-01-25 10:38:21Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/863327
-
@ fbf0e434:e1be6a39
2025-01-25 09:28:25Hackathon 概要
Request Network - Summer Hackathon 在2024年夏季结束,吸引了144名开发者参与,并审核通过了32个项目。该活动由Request Network举办,着重于利用其兼容EVM的基础设施开发Web3金融应用。在Hackathon期间,参与者有机会参加针对初学者和高级用户量身定制的工作坊。这些工作坊旨在提高开发发票、支付、会计和借贷应用的技能。
激励措施包括总奖金池15,000美元,分为发票、支付、会计和借贷应用等奖项类别。此外,Request Network基金会为提交至其资助计划的项目提供额外35,000美元。评审标准强调实用性、易用性、技术复杂性和创新性。
参与者可以访问丰富的资源,如视频教程、GitHub代码库,还可以通过专用的Discord热线获得支持。Hackathon强调了积极参与,促进了旨在提升区块链交易能力的应用程序的创建。2024年7月8日,获奖项目公布,展示了参与者的创造力和技术专长。
Hackathon 获奖者
Invoicing Prize Winners
- ChainPay - 该项目通过与QuickBooks集成,将Request Network的功能扩展至Web3支付组件。它解决了Sepolia Testnet上的智能合约调用问题,目标是提供全面的解决方案。
- PiperPay - 一个支持多种货币和代币的发票和支付管理系统。它通过智能合约代理和代币交换遵循Request Network标准。
- Wavein - 该项目通过Request Network和Superfluid为自由职业者提供实时支付,提供带转换功能的流线型支付流。
Accounting Prize Winner
- request-accounting - 基于区块链的会计应用程序,确保安全交易,同时集成与行业标准一致的高效财务管理。
Lending Prize Winners
- Invoice Lending (Factoring) - 该项目通过将发票铸造成NFT提供流动性,允许在Request Network上进行点对点发票融资。
- Invisy Network - 一个去中心化发票平台,利用NFT提升效率和透明度,提供实时发票流动性的市场。
欲了解完整项目列表,请访问 DoraHacks Request Network Summer Hackathon。
关于主办方
Request Network
Request Network是一个兼容EVM的基础协议,致力于推动包括发票、支付和会计在内的Web3金融应用的发展。通过向区块链交易附加额外数据,网络确保合规、对账和可追溯性。这使用户能够维护其财务数据的所有权,促进灵活的转移和选择性共享。关键举措包括支持未抵押贷款和增强区块链交易流程。Request Network致力于促进一个包容的金融未来,通过优化服务来实现数据所有权和金融操作的自动化。
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ ed84ce10:cccf4c2a
2025-01-25 09:28:20Hackathon Summary
The Request Network - Summer Hackathon concluded with 144 developers participating and 32 project submissions approved. Hosted by Request Network, the event focused on developing Web3 financial applications utilizing its EVM-compatible infrastructure. Throughout the hackathon, participants had the opportunity to attend workshops tailored to both beginner and advanced users. These workshops aimed to enhance skills in developing applications for invoicing, payments, accounting, and lending.
Incentives included a total prize pool of $15,000, divided into categories such as invoicing, payments, accounting, and lending applications. Additionally, the Request Network Foundation provided an extra $35,000 for projects submitted to their grants program. The judging criteria emphasized utility, ease of use, technical sophistication, and innovation.
Participants were given access to extensive resources such as video tutorials, GitHub repositories, and support through a dedicated Discord helpline. The hackathon highlighted active engagement, promoting the creation of applications intended to improve blockchain transaction capabilities. On July 8, 2024, the winning projects were announced, showcasing the creativity and technical expertise of the participants.
Hackathon Winners
Invoicing Prize Winners
- ChainPay - This project expands Request Network's capabilities into Web3 payment components by integrating with QuickBooks. It addresses smart contract call issues on the Sepolia Testnet and aims for comprehensive solutions.
- PiperPay - An invoice and payment management system that supports various currencies and tokens. It follows Request Network standards using smart contract proxies and token swaps.
- Wavein - This project facilitates real-time payments for freelancers through Request Network and Superfluid, offering streamlined payment streams with conversion features.
Accounting Prize Winner
- request-accounting - A blockchain-based accounting application that ensures secure transactions while integrating efficient financial management aligned with industry standards.
Lending Prize Winners
- Invoice Lending (Factoring) - This project provides liquidity by minting invoices as NFTs, enabling peer-to-peer invoice financing on the Request Network.
- Invisy Network - A decentralized invoice platform leveraging NFTs to enhance efficiency and transparency, offering a marketplace for real-time invoice liquidity.
For a complete list of projects, visit DoraHacks Request Network Summer Hackathon.
About the Organizer
Request Network
Request Network is an EVM-compatible infrastructure protocol dedicated to advancing Web3 financial applications, including invoicing, payments, and accounting. By appending extra data to blockchain transactions, the network ensures compliance, reconciliation, and traceability. This empowers users to maintain ownership of their financial data, facilitating flexible transfers and selective sharing. Key initiatives include supporting under-collateralized loans and enhancing blockchain transaction processes. Request Network is committed to fostering an inclusive financial future by streamlining services to enable data ownership and automation in financial operations.
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 16d11430:61640947
2025-01-25 08:12:55In Australia, a country where the Union Jack flies as a silent yet potent reminder of its colonial origins, the lives of non-violent, non-agitating individuals remain deeply entangled in a system built on inequality. Beneath the surface of modern democratic institutions and peaceful imagery lies a historical and ongoing strategy to maintain systemic dominance, often underpinned by the latent threat of violence.
For those who do not agitate, who simply wish to exist in peace, the daily experience can be one of quiet oppression. The colonial legacy ensures that fairness and justice are privileges reserved for a select ingroup—those who align with the dominant cultural narrative. Meanwhile, others find themselves trapped in a system designed to perpetuate inequality, all while cloaked in the language of ethics, science, and progress.
The Mask of Fairness
Australia’s institutions present themselves as bastions of fairness, meritocracy, and equality. Yet, these ideals are often undermined by the foundational violence that protects and privileges the dominant cultural group. This violence need not always be explicit—it exists in the form of legal frameworks, economic systems, and cultural narratives that favor the descendants of the colonial ingroup while marginalizing others.
For Indigenous Australians, immigrants, and those outside the dominant culture, the system does not just fail to deliver fairness—it actively maintains their disadvantage. The history of dispossession, forced assimilation, and cultural erasure is not simply a relic of the past. It continues to inform how resources, opportunities, and power are distributed today.
Privilege and Forgiveness
One of the most insidious aspects of this system is the privilege afforded to the ingroup. Actions that would be condemned or punished when carried out by marginalized groups are often forgiven, excused, or even celebrated when done by those within the dominant cultural framework. This double standard perpetuates a sense of impunity among the ingroup, while reinforcing the notion that fairness is conditional and selectively applied.
For example, protests or acts of civil disobedience by marginalized groups are often met with harsh policing and public condemnation. Meanwhile, similar actions by those in the dominant culture—especially when framed as defending “traditional values” or “national identity”—are met with leniency, if not outright support.
The Union Jack as a Symbol of Violence
The Union Jack, emblazoned on Australia’s flag, serves as a subtle yet powerful symbol of this systemic violence. It is a constant reminder of the country’s colonial roots, a time when land was taken by force, and Indigenous peoples were systematically oppressed. Today, while the overt violence of colonization has shifted into the background, its legacy persists in the structural inequalities that shape everyday life.
For many Australians, the flag represents pride and progress. For others, it is a symbol of dispossession and exclusion. This dual meaning highlights the deep divisions in how fairness and justice are experienced, depending on one’s place within the colonial hierarchy.
The Control of Peaceful Imaginations
Non-violent individuals often turn to ideals of peace, ethics, and community as a way to navigate the unfairness of the system. However, the colonial strategy has long been to co-opt these imaginations, redirecting them to serve the interests of the dominant group.
For example, the rhetoric of multiculturalism and reconciliation is frequently used to promote the idea that Australia has moved beyond its colonial past. Yet, these efforts often fall short of addressing the structural inequalities that continue to disadvantage marginalized groups. Instead, they serve as a way to maintain the status quo, offering symbolic gestures rather than substantive change.
Unfairness as a Daily Reality
For non-violent, non-agitating individuals, the daily reality of unfairness can manifest in countless ways:
Economic Disparity: Wages, employment opportunities, and wealth distribution continue to favor the dominant cultural group.
Cultural Erasure: Indigenous languages, traditions, and histories are often sidelined in favor of a Eurocentric narrative.
Policing and Justice: Marginalized groups are disproportionately targeted by law enforcement and are less likely to receive fair treatment in the justice system.
While these injustices may not always involve direct violence, the threat of coercion and enforcement looms large. The institutions that govern daily life are protected not by a commitment to fairness, but by the implicit and explicit threat of violence to those who challenge the system.
A Call for Change
Addressing this systemic unfairness requires more than symbolic gestures or surface-level reforms. It demands a reckoning with the colonial legacy and a commitment to dismantling the structures that perpetuate inequality. For true fairness to be realized, Australia must confront the uncomfortable truths about its past and present, moving beyond the veneer of peaceful coexistence to create a society built on genuine equity and justice.
Until then, the Union Jack will remain not just a symbol of the past, but a reminder of the ongoing struggles faced by those who dare to imagine a fairer world.
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ ae6ce958:d0f02c7d
2025-01-25 06:54:35In the age of precision technology, photonic measurement systems like LiDAR play a critical role in transformative industries such as autonomous vehicles, medical imaging, and telecommunications. These systems rely on the precise behavior of sensors and software to ensure accuracy and reliability in complex, real-world environments. DamageBDD, with its innovative approach to Behavior-Driven Development (BDD), provides a platform for enabling a large number of people to participate in defining, testing, and refining the behavior of such systems.
By democratizing the process of behavior definition, DamageBDD unlocks new possibilities for collaboration and innovation. This article explores how DamageBDD can be applied to photonic measurement systems, demonstrating its potential to involve diverse stakeholders and enhance the quality of these technologies.
Why Involve Large Numbers of People in Defining Behavior?
- Diverse Perspectives: A wide range of participants, including developers, domain experts, end-users, and testers, brings diverse perspectives to defining system behavior. For example:
A developer might focus on system performance.
A medical professional might prioritize safety in imaging technologies.
An end-user might emphasize usability and intuitive interfaces.
-
Real-World Scenarios: Large-scale participation ensures that real-world scenarios are thoroughly explored and represented. For instance, in autonomous vehicles, scenarios such as heavy rain, fog, or crowded urban streets can be identified and tested by people from various geographies and climates.
-
Collective Intelligence: Crowdsourcing behavior definitions can leverage collective intelligence to anticipate edge cases and improve system robustness.
DamageBDD in Photonic Measurement Systems
DamageBDD’s unique ability to verify behavior at scale makes it an ideal platform for optimizing photonic measurement systems like LiDAR. Here’s how DamageBDD can be applied:
- Defining Behavior Using Real-World Scenarios
DamageBDD allows participants to write clear, human-readable scenarios that define expected behavior for photonic measurement systems. These scenarios are stored immutably on-chain, ensuring traceability and accountability.
Example:
Feature: LiDAR distance measurement Scenario: Accurate measurement in clear weather Given a reflective object is placed 10 meters from the sensor When the LiDAR system emits a pulse Then the system should report the distance as 10 ± 0.1 meters
Scenario: Measurement in foggy conditions Given a reflective object is placed 10 meters from the sensor And fog reduces visibility by 50% When the LiDAR system emits a pulse Then the system should report the distance as 10 ± 0.5 meters
With DamageBDD, such scenarios can be written by both technical and non-technical participants, enabling large-scale participation in defining behavior.
- Automating Behavior Verification
DamageBDD’s platform integrates seamlessly with testing frameworks, enabling automated verification of defined behaviors. This ensures that photonic measurement systems consistently meet the specified criteria across a wide range of scenarios.
Example: A team testing a LiDAR system can run automated tests against a DamageBDD-powered test suite. If a test fails—say, the system misreports distances under foggy conditions—it is flagged on-chain, triggering iterative improvements.
- Leveraging Crowdsourcing for Edge Cases
DamageBDD enables stakeholders to contribute new test cases and scenarios directly to the platform. For photonic measurement systems, this could involve:
Community members submitting scenarios involving unique environmental conditions (e.g., desert sandstorms or arctic snow).
Engineers proposing tests for hardware variations or upgrades.
Example: A developer in a tropical region might contribute the following scenario:
Scenario: Measurement in heavy rain Given a reflective object is placed 5 meters from the sensor And rainfall intensity is 50 mm/hour When the LiDAR system emits a pulse Then the system should report the distance as 5 ± 0.3 meters
By involving a global community, DamageBDD ensures comprehensive testing and improved resilience.
- Creating Incentives for Participation
One of the standout features of DamageBDD is its ability to incentivize participation through tokenized payouts. Contributors who define or verify behavior are rewarded in Damage Tokens, creating a self-sustaining ecosystem that encourages ongoing collaboration.
Example:
A developer contributes a new test case for low-light conditions.
A tester verifies the scenario by running it against a live system.
Both participants receive tokens for their contributions, fostering continued engagement.
- Ensuring Transparency and Accountability
With DamageBDD, all behavior definitions, tests, and results are immutably recorded on-chain. This ensures that:
Every contribution is traceable to its author.
Changes to system behavior are documented over time, creating an auditable history.
Example: When a new feature is added to a LiDAR system (e.g., enhanced fog detection), its behavior is verified through DamageBDD. The on-chain record shows:
Who defined the behavior.
When it was tested.
How it performed against previous versions.
This transparency builds trust among stakeholders and accelerates adoption.
Scaling to Other Photonic Applications
The principles outlined above can be applied to other photonic measurement systems, such as:
Medical Imaging: Ensuring MRI or CT scanners meet safety and accuracy standards across diverse patient demographics.
Telecommunications: Optimizing fiber-optic networks for different bandwidth and latency requirements.
Astronomy: Enhancing telescopes to accurately measure cosmic phenomena under varying atmospheric conditions.
In each case, DamageBDD enables mass participation, rigorous testing, and continuous improvement.
Conclusion
By enabling large numbers of people to define and verify behavior, DamageBDD revolutionizes how we approach photonic measurement systems and other complex technologies. Through its emphasis on collaboration, transparency, and tokenized incentives, DamageBDD not only improves the quality of these systems but also democratizes their development.
As industries continue to adopt precision technologies, DamageBDD provides a scalable framework for ensuring they meet the needs of diverse stakeholders. From LiDAR in autonomous vehicles to medical imaging and beyond, the potential for innovation is limitless when empowered by DamageBDD.
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 89ccea93:df4e00b7
2025-01-25 04:26:01Here's a list of the services I use.
I plan to make a blog post for each on
expatriotic.me
my previously defunct blog that is going live again.Stay tuned.
Networking
Flint Router Mullvad Tor Little Snitch
Buying & Selling Bitcoin
Bisq Robosats Peach Hodl Hodl
Private email
Tuta Addy.io Proton
Wallets
Ashigaru Stack Duo Cake Sparrow Envoy Zeus Coinos
Swapping Bitcoin
Trocador basicswapdex unstoppable-swap
noKYC
```kycnot.me```
Spending Bitcoin
Wise Bitrefill Bitpay PayWithMoon Coinsbee The Bitcoin Company CoinCards.com
Phone
Graphene OS Minimalism Obtainium FOSS apps Signal for DMs Telegram for Groups Silent.Link
Server
DIY with Debian Start9 Dojo Ronin Dojo Monero Nodes
Podcasts
The Ungovernable Misfits News Network The Watchman Privacy
originally posted at https://stacker.news/items/863051
-
@ 16d11430:61640947
2025-01-25 04:19:41In the grand tapestry of global history, few nations have endured and overcome with the resilience and grace of India. The centuries-long oppression wrought by colonialism not only plundered our material wealth but also sought to erode the dignity of our civilization. Today, while the political shackles have been cast off, the shadow of colonial mind games persists, manifesting as ridicule and prejudice toward the Indian diaspora. Yet, as heirs to an ancient and resilient culture, the diaspora must rise above this insidious narrative, reclaiming its agency and asserting its rightful place in the world.
The Colonial Playbook: Divide, Deride, and Demean
The strategy of the colonial enterprise was never limited to economic exploitation; it sought to demean the very essence of the colonized. Our history, culture, and achievements were systematically denigrated while a manufactured narrative of inferiority was imposed. That very playbook, though subtler in its contemporary iteration, remains at work today.
The Indian diaspora, as ambassadors of a thriving civilization, often finds itself targeted by the remnants of colonial prejudice—mocked for its accents, cuisine, and customs, and vilified for its success. Whether it is the ridicule of our English, tainted by colonial imposition, or the disparagement of our efforts to succeed in foreign lands, these tactics are nothing more than the echoes of a bygone era attempting to assert relevance in a world that has moved on.
A Legacy of Survival and Triumph
To endure is deeply etched into the DNA of the Indian psyche. We have weathered invasions, famines, and systematic subjugation with a fortitude that no conqueror could extinguish. The Indian diaspora, spread across continents, is the living embodiment of this indomitable spirit. It has flourished in the face of adversity, not by seeking vengeance, but by cultivating excellence in every field—science, medicine, literature, and technology—while retaining its cultural roots.
Today, Indian-origin CEOs helm some of the world's largest corporations. Indian doctors, engineers, and academics enrich societies across the globe. Yet, the colonial mind games persist, attempting to reduce these achievements to the stereotype of "over-ambition" or "cultural overreach." Such narratives are designed to diminish, to perpetuate the myth of the colonial superior.
Reclaiming the Narrative
The time has come for the Indian diaspora to reclaim the narrative, not with the bitterness of retribution but with the quiet confidence of a civilization that has seen the rise and fall of empires. The response to colonial mind games must be rooted in three key principles:
-
Pride in Heritage: The richness of Indian culture, from its philosophical traditions to its scientific advancements, is unparalleled. The diaspora must take pride in these achievements and articulate them with clarity and confidence.
-
Mastery of Communication: The colonial critique often begins with language. To counter this, the diaspora must wield English—not as a colonial relic, but as a tool reappropriated and mastered, blending it seamlessly with the wisdom of Sanskrit, Tamil, Hindi, and other mother tongues.
-
Unified Solidarity: The diversity of the Indian diaspora—spanning religions, languages, and regions—is its greatest strength. By standing united, the diaspora can amplify its voice and counter attempts to divide and diminish it.
The Enduring Legacy of Dharma
India's approach to the world has never been one of conquest but of engagement. From the dissemination of Buddhism to the world to the shared wisdom of yoga and Ayurveda, India's influence has always been through persuasion, not coercion. The diaspora must embody this dharmic ethos, rising above pettiness and prejudice, offering the world not retaliation, but enlightenment.
Victory Through Resilience
The colonial mind games that seek to ridicule and undermine the Indian diaspora are, in truth, a recognition of its success. They arise from the insecurities of those who once sought to subjugate, now witnessing the rise of a civilization they sought to diminish.
The Indian diaspora must endure not by stooping to the tactics of its detractors but by transcending them. The answer to colonial prejudice lies in excellence, unity, and an unshakable belief in the values that have guided India for millennia.
As we stride confidently into the future, let us remember: the spirit of India is not one of vengeance but of vindication. The triumph of the Indian diaspora will not be in silencing its critics but in rendering them irrelevant through the brilliance of its achievements and the dignity of its conduct. The time for enduring is over; the time for overcoming is now.
-
-
@ 28cac85f:54300cac
2025-01-25 03:47:46Reduction in Crime and Incarceration Rates: The war on drugs has often led to mass incarceration, particularly affecting minority communities. By decriminalizing drugs, the focus shifts from punishment to treatment, reducing the number of people in prison for drug possession. Portugal saw a significant decrease in drug-related incarceration following decriminalization. The proportion of the prison population held for drug offenses has decreased from over 40% in 2001 to around 15.7% by 2019, reducing the burden on the criminal justice system.
Public Health Over Criminal Justice: Treating drug use as a public health issue rather than a criminal one allows for better health outcomes. Portugal's model emphasizes harm reduction strategies like needle exchange programs, which have lowered rates of diseases like HIV and hepatitis C among drug users. There was a significant increase in the number of people entering drug treatment programs, with treatment admissions rising by about 60% from 1998 to 2011. New infections from needle sharing decreased dramatically, with HIV cases among drug users falling from an all-time high in 2000 to much lower rates by 2015.
Focus on Addiction Treatment: Legalization or decriminalization can free up resources (both financial and human) for addiction treatment rather than law enforcement. Portugal invested in treatment facilities and outreach programs, leading to an increase in people seeking help for addiction.
There has been a marked reduction in drug-related mortality. Overdose deaths dropped significantly from around 400 annually before decriminalization to much lower numbers in subsequent years.
Reducing Stigma: By removing criminal penalties, the stigma associated with drug use is diminished, encouraging more users to seek help without fear of legal repercussions. This can lead to earlier interventions in addiction. Drug use is now more widely seen as a health issue rather than a criminal one, which has helped reduce stigmatization and encourage people to seek help.
Economic Benefits: The costs associated with drug enforcement are substantial. Redirecting these funds towards education, prevention, and treatment can be more cost-effective in the long run. Additionally, regulated drug markets could generate tax revenue, although this aspect is more relevant if drugs are fully legalized rather than just decriminalized. The reduction in incarceration for drug offenses has potentially saved costs, allowing reallocation of funds towards health services and treatment.
Impact on Drug Market Violence: Much of the violence associated with drug markets stems from their illegal nature, leading to turf wars among dealers. Legal regulation can potentially reduce this violence by cutting out the black market.
Empirical Evidence: Portugal's experience since decriminalizing personal drug use in 2001 has shown positive trends. Drug-related deaths decreased, and there was no significant increase in drug use among the population, countering fears that decriminalization would lead to rampant drug use.
Human Rights Perspective: The criminalization of drug use has been criticized as a violation of human rights, disproportionately affecting the poor, minorities, and those with mental health issues. A health-centric approach respects human dignity and focuses on recovery.
Let's do this here in the US, why not?
-
@ 16d11430:61640947
2025-01-25 03:04:45In the dystopian wasteland of tech we call the "crypto space," where tokenomics is a euphemism for Ponzi schemes and the word “decentralized” is abused like a buzzword-shaped piñata, software engineers—real ones—struggle to survive. I’m not talking about the low-effort devs churning out Solidity copy-pasta for the next Insert-Adjective-Coin. No, I mean the overexperienced, underpaid, and utterly exhausted professionals who used to build things that mattered—systems that could scale, products that solved problems, applications that didn’t have to slap "on-chain" on their name to justify their existence.
Now? Honest conversations about software design, scalability, or—God forbid—ethics, are impossible. Why? Because the room is full of crypto zealots whose job descriptions boil down to "pump my bags or GTFO."
Enter the Zealots: The New Pyramid Architects
Walk into any crypto meeting, and you’ll find the same characters. The "visionary" founder with a LinkedIn bio that could double as a scammer’s résumé. The "community manager" whose job is to slap rocket emojis on tweets about nothing. And the "blockchain developer" who doesn’t know the difference between O(n) and "Oh, nice, this whitepaper has pretty graphs."
Now, try having an honest discussion with this crowd.
You: "This app doesn’t need a blockchain. A SQL database would handle this faster, cheaper, and more securely." Them: "Actually, by using our Layer 2 token, we're decentralizing freedom, empowering communities, and disrupting the financial matrix." Translation: "Our tokenomics scheme will siphon liquidity from suckers while pretending to solve a non-existent problem."
If you dare to mention Bitcoin—real Bitcoin, not some Frankenstein monstrosity glued to a shitcoin L2—you’ll get branded a heretic. "But Bitcoin can’t do smart contracts!" they cry, as if adding complexity to simplicity is a virtue, not a design flaw.
The Tokenomics Scam: Why Engineers Hate Their Lives
Here's the dirty secret: most crypto projects are not software projects. They’re marketing scams with some code sprinkled on top. The goal isn’t to build something robust or meaningful—it’s to create just enough technical smoke and mirrors to dupe investors into buying the token.
For a software engineer, it’s soul-crushing work. You’ll spend 80% of your time wrestling with poorly documented APIs on some vaporware blockchain, 15% explaining to your PM why "put it on-chain" is a stupid idea, and the remaining 5% wondering why you didn’t just go into carpentry instead.
Bitcoin: The Elephant in the Room
Every real engineer knows that Bitcoin works. It’s simple. It’s secure. It’s elegant. But because it doesn’t have a flashy CEO or a billion-dollar marketing budget, the average crypto enthusiast treats it like a relic. "It’s too slow," they’ll say, without understanding why Proof-of-Work exists. "It’s too basic," they’ll argue, as if simplicity is a flaw and not the reason Bitcoin has remained unbroken for over a decade.
Meanwhile, these same zealots will praise the latest shitcoin L2 that "fixes" Bitcoin by adding layers of complexity that require endless token sales to function. Never mind that these systems are riddled with attack vectors. Never mind that the "innovation" usually amounts to reinventing centralized finance, only worse. It’s not about building better systems; it’s about spinning a better narrative.
The Undervalued CTO: A Study in Pain
And where does that leave the senior engineer, the architect, the CTO who’s been around long enough to smell the bullshit from a mile away? Stuck in endless meetings where you’re forced to explain to the same wide-eyed MBAs why the laws of physics and computer science apply to blockchains, too. Worse, your paycheck is probably being paid in tokens that are only worth something if you can stomach shilling them to the next sucker.
The most depressing part? The zealots don’t even know they’re part of the scam. They’ve convinced themselves that they’re "building the future" when all they’re really building is a pyramid, one token sale at a time.
A Modest Proposal: Burn It All Down
Here’s an idea: let’s strip crypto down to what works. Keep Bitcoin. Scrap everything else. Rebuild the internet of value on solid foundations, not speculative hype. Let engineers, not marketers, lead the way.
Until then, we’ll keep trudging along, writing code for projects we don’t believe in, pretending that decentralizing dog grooming or tokenizing air molecules is the next big thing. Because, let’s face it, in crypto, the only thing that scales reliably is bullshit.
-
@ df476244:6804e458
2025-01-24 23:44:38Markdown: Syntax
Note: This document is itself written using Markdown; you can see the source for it by viewing the raw basic.md file.
Overview
Philosophy
Markdown is intended to be as easy-to-read and easy-to-write as is feasible.
Readability, however, is emphasized above all else. A Markdown-formatted document should be publishable as-is, as plain text, without looking like it's been marked up with tags or formatting instructions. While Markdown's syntax has been influenced by several existing text-to-HTML filters -- including Setext, atx, Textile, reStructuredText, Grutatext, and EtText -- the single biggest source of inspiration for Markdown's syntax is the format of plain text email.
Block Elements
Paragraphs and Line Breaks
A paragraph is simply one or more consecutive lines of text, separated by one or more blank lines. (A blank line is any line that looks like a blank line -- a line containing nothing but spaces or tabs is considered blank.) Normal paragraphs should not be indented with spaces or tabs.
The implication of the "one or more consecutive lines of text" rule is that Markdown supports "hard-wrapped" text paragraphs. This differs significantly from most other text-to-HTML formatters (including Movable Type's "Convert Line Breaks" option) which translate every line break character in a paragraph into a
<br />
tag.When you do want to insert a
<br />
break tag using Markdown, you end a line with two or more spaces, then type return.Headers
Markdown supports two styles of headers, [Setext] [1] and [atx] [2].
Optionally, you may "close" atx-style headers. This is purely cosmetic -- you can use this if you think it looks better. The closing hashes don't even need to match the number of hashes used to open the header. (The number of opening hashes determines the header level.)
Blockquotes
Markdown uses email-style
>
characters for blockquoting. If you're familiar with quoting passages of text in an email message, then you know how to create a blockquote in Markdown. It looks best if you hard wrap the text and put a>
before every line:This is a blockquote with two paragraphs. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
Markdown allows you to be lazy and only put the
>
before the first line of a hard-wrapped paragraph:This is a blockquote with two paragraphs. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
Blockquotes can be nested (i.e. a blockquote-in-a-blockquote) by adding additional levels of
>
:This is the first level of quoting.
This is nested blockquote.
Back to the first level.
Blockquotes can contain other Markdown elements, including headers, lists, and code blocks:
This is a header.
- This is the first list item.
- This is the second list item.
Here's some example code:
return shell_exec("echo $input | $markdown_script");
Any decent text editor should make email-style quoting easy. For example, with BBEdit, you can make a selection and choose Increase Quote Level from the Text menu.
Lists
Markdown supports ordered (numbered) and unordered (bulleted) lists.
Unordered lists use asterisks, pluses, and hyphens -- interchangably -- as list markers:
- Red
- Green
- Blue
is equivalent to:
- Red
- Green
- Blue
and:
- Red
- Green
- Blue
Ordered lists use numbers followed by periods:
- Bird
- McHale
- Parish
It's important to note that the actual numbers you use to mark the list have no effect on the HTML output Markdown produces. The HTML Markdown produces from the above list is:
If you instead wrote the list in Markdown like this:
- Bird
- McHale
- Parish
or even:
- Bird
- McHale
- Parish
you'd get the exact same HTML output. The point is, if you want to, you can use ordinal numbers in your ordered Markdown lists, so that the numbers in your source match the numbers in your published HTML. But if you want to be lazy, you don't have to.
To make lists look nice, you can wrap items with hanging indents:
- Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
- Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
But if you want to be lazy, you don't have to:
- Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus. Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus.
- Donec sit amet nisl. Aliquam semper ipsum sit amet velit. Suspendisse id sem consectetuer libero luctus adipiscing.
List items may consist of multiple paragraphs. Each subsequent paragraph in a list item must be indented by either 4 spaces or one tab:
-
This is a list item with two paragraphs. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aliquam hendrerit mi posuere lectus.
Vestibulum enim wisi, viverra nec, fringilla in, laoreet vitae, risus. Donec sit amet nisl. Aliquam semper ipsum sit amet velit.
-
Suspendisse id sem consectetuer libero luctus adipiscing.
It looks nice if you indent every line of the subsequent paragraphs, but here again, Markdown will allow you to be lazy:
-
This is a list item with two paragraphs.
This is the second paragraph in the list item. You're only required to indent the first line. Lorem ipsum dolor sit amet, consectetuer adipiscing elit.
-
Another item in the same list.
To put a blockquote within a list item, the blockquote's
>
delimiters need to be indented:-
A list item with a blockquote:
This is a blockquote inside a list item.
To put a code block within a list item, the code block needs to be indented twice -- 8 spaces or two tabs:
- A list item with a code block:
<code goes here>
Code Blocks
Pre-formatted code blocks are used for writing about programming or markup source code. Rather than forming normal paragraphs, the lines of a code block are interpreted literally. Markdown wraps a code block in both
<pre>
and<code>
tags.To produce a code block in Markdown, simply indent every line of the block by at least 4 spaces or 1 tab.
This is a normal paragraph:
This is a code block.
Here is an example of AppleScript:
tell application "Foo" beep end tell
A code block continues until it reaches a line that is not indented (or the end of the article).
Within a code block, ampersands (
&
) and angle brackets (<
and>
) are automatically converted into HTML entities. This makes it very easy to include example HTML source code using Markdown -- just paste it and indent it, and Markdown will handle the hassle of encoding the ampersands and angle brackets. For example, this:<div class="footer"> © 2004 Foo Corporation </div>
Regular Markdown syntax is not processed within code blocks. E.g., asterisks are just literal asterisks within a code block. This means it's also easy to use Markdown to write about Markdown's own syntax.
tell application "Foo" beep end tell
Span Elements
Links
Markdown supports two style of links: inline and reference.
In both styles, the link text is delimited by [square brackets].
To create an inline link, use a set of regular parentheses immediately after the link text's closing square bracket. Inside the parentheses, put the URL where you want the link to point, along with an optional title for the link, surrounded in quotes. For example:
This is [an example](http://example.com/ "Example Title") inline link.
This is an example inline link.
[This link](http://example.net/) has no title attribute.
This link has no title attribute.
Reference-style links use a second set of square brackets, inside which you place a label of your choosing to identify the link:
This is [an example][id] reference-style link.
This is an example reference-style link.
Then, anywhere in the document, you define your link label like this, on a line by itself:
```
```
Emphasis
Markdown treats asterisks (
*
) and underscores (_
) as indicators of emphasis. Text wrapped with one*
or_
will be wrapped with an HTML<em>
tag; double*
's or_
's will be wrapped with an HTML<strong>
tag. E.g., this input:single asterisks
single underscores
double asterisks
double underscores
Code
To indicate a span of code, wrap it with backtick quotes (
`
). Unlike a pre-formatted code block, a code span indicates code within a normal paragraph. For example:Use the
printf()
function. -
@ bcea2b98:7ccef3c9
2025-01-24 23:21:05originally posted at https://stacker.news/items/862840
-
@ 16d11430:61640947
2025-01-24 22:19:20The legacy of Thomas Babington Macaulay’s education policies in colonial India has left a profound and complex impact on generations of Indians who were groomed to serve as intermediaries between the British colonial authorities and the native population. Dubbed "Macaulay’s Little Englishmen," these individuals faced unique psychosocial challenges stemming from their dual identity—educated and acculturated in the ways of the British yet tied to their Indian heritage. Straddling these two worlds, they often became objects of suspicion and alienation, regarded as potential double agents in a deeply divided society. This article explores the psychosocial effects of such an upbringing, which left these individuals feeling unmoored, mistrusted, and culturally disoriented.
The Double Bind: Torn Between Two Worlds
The fundamental conflict for Macaulay's "Little Englishmen" lay in their hybrid identity. Educated to think, speak, and act like the British, they were expected to serve the colonial administration, often as clerks, teachers, or intermediaries. However, this acculturation came at a cost: alienation from their own cultural roots. Their mastery of the English language and exposure to Western philosophy, law, and governance set them apart from the masses, who viewed them as traitors to their native heritage.
At the same time, these individuals were never fully accepted by the British elite. Despite their fluency in English and adoption of British customs, they were often treated as inferior, excluded from the corridors of real power. This dual rejection—by their own people and their colonial masters—created a profound sense of isolation and a fractured sense of self.
The Suspicion of Betrayal
The psychosocial burden of living as a cultural and social hybrid was compounded by the pervasive suspicion they faced from both sides.
-
From the British: While Macaulay’s education system intended to create loyal intermediaries, the British often doubted the loyalty of these individuals. Were they truly assimilated into the colonial ideology, or were they secretly harboring nationalist sentiments? This doubt meant that, despite their qualifications, many were confined to subordinate roles, denied the trust and respect they sought from their colonial employers.
-
From their own people: Within Indian society, these individuals were often perceived as sellouts or traitors who had traded their cultural identity for material gain. They were seen as collaborators in the colonial machinery that oppressed their own people. This mistrust led to social ostracization and an enduring sense of guilt and shame, as they were caught between the expectations of their colonial education and the loyalty to their heritage.
Psychosocial Consequences
The experience of living under constant suspicion and alienation had deep psychological and social repercussions:
-
Identity Crisis: The duality of their upbringing created a fractured identity. They were neither fully British nor fully Indian, leading to feelings of dislocation and an inability to fully belong to either world. This liminal state often resulted in a lifelong struggle with self-perception and cultural loyalty.
-
Chronic Anxiety: The need to constantly navigate the expectations and suspicions of both the British and Indian communities induced chronic stress. They had to carefully monitor their behavior, speech, and actions to avoid appearing disloyal to either side. This vigilance contributed to anxiety, self-doubt, and a lack of authentic self-expression.
-
Social Isolation: Alienated from their own communities and never fully accepted by the British, many of these individuals experienced profound loneliness. They lacked meaningful social support, as their education and socialization had placed them in a unique and isolating position.
-
Internalized Inferiority: The colonial education system, designed to instill admiration for British culture and disdain for indigenous traditions, often led to internalized feelings of inferiority. Many came to view their own heritage as backward or uncivilized, perpetuating a cycle of cultural self-erasure.
-
Moral Conflict: Being agents of a colonial system that oppressed their own people created a moral dilemma. Many felt complicit in the exploitation and subjugation of their fellow Indians, leading to guilt and cognitive dissonance. This internal conflict was particularly pronounced during the rise of the Indian independence movement, when calls for loyalty to one’s nation clashed with their colonial upbringing.
The Broader Implications
The psychosocial effects of being “Macaulay’s Little Englishmen” extend beyond the individual level, influencing broader societal dynamics. The creation of a class of culturally alienated intermediaries contributed to the perpetuation of colonial hierarchies, even after independence. The mistrust they experienced on both sides foreshadowed the postcolonial identity crises faced by many nations grappling with the legacy of colonization.
Furthermore, the notion of being a "double agent" has parallels in modern postcolonial societies, where individuals educated in Western systems often face similar suspicions of disloyalty or cultural inauthenticity. The scars of Macaulay’s experiment in social engineering are still visible in the struggles of postcolonial nations to reconcile traditional identities with the legacies of colonial modernity.
Conclusion
The psychosocial toll of being "Macaulay’s Little Englishmen" highlights the deep and lasting consequences of cultural alienation and identity manipulation. These individuals lived as bridges between two worlds, yet they were mistrusted and misunderstood by both. Their experiences serve as a poignant reminder of the human cost of colonialism and the complex legacy of cultural hybridity in a divided world. The story of Macaulay's "Little Englishmen" is not just a tale of alienation—it is a testament to the resilience of those who navigated impossible contradictions, often at great personal cost.
-
-
@ 3c506452:fef9202b
2025-01-24 20:27:49Kia ora ano e te iwi whanui!
Often I pose the question to myself "How would I say this if I had no knowledge whatsoever of English?" That's basically what guides my sentence formation whenever I speak Maori.
Since the arrival of Tauiwi into our turangawaewae, our reo has shifted, largely due to intermingling with the English language, and an entire generation or two completing losing the reo.
Great efforts have been made to secure our language from total extinction, and the number of te reo speakers seems to be on the rise.
What I do notice though is that most of the time when I do hear te reo being spoken, it's cadence follows that of the English language.
Vowels are clipped, consonants are aspirated, and English thought patterns are disguised via the Maori language.
Regardless, I still appreciate and prefer the reo to be spoken rather than it not be spoken at all.
I once heard someone remark that"Maori sounds like Hawaiian with a New Zealand accent. Hilarious!"
So, how do I personally tackle this and try make my own reo sound more Maori?
Here's how:
-
Read Nupepa Maori - When the written word came to us, we dove straight in. Nupepa Maori gives great insight into how the language was used using the new medium of pen and paper.
-
Listen to the older videos of Wakahuia Docos - Wakahuia has been running for a long time and I find listening to our old people of those times a good way to hear the differences between how the reo sounds today, and how it sounded a little while back.
-
Listen Radio Kahungunu archives - They have a really nice archive of a talkback radio show.
-
People to listen for - I personally try to find anything by Timoti Karetu, Quinton Hita, and Julian Wilcox as I really enjoy the sound of how they speak the reo.
-
Listen to Cook Island Maori, Gagana Tokelau and Hawaiian (Keao Nesmith, Niihau dialect, Kaalala, Kanahele Collection) - Listening to other polynesian languages gives a good general gist of the sound of polynesian languages. I try to emulate a similar sound whenever I speak te reo.
No reira, ko tena tena, I hope that 2025 will be a good year for Te Reo Maori!
Nga rauemi:
Nupepa Maori
Wakahuia
Radio Kahungunu
Quinton Hita
Julian Wilcox
Timoti Karetu
Kanahele Collection
Ka Alala
Gagana Tokelau
Kuki Learning -
-
@ 08288690:77f58eba
2025-01-24 19:05:23 -
@ a09fb9cb:83231556
2025-01-24 18:23:27Who
So, this is it, this is How it begins. No more sitting on the sidelines pondering and wondering. This is it. This is Where the rubber hits the road.
OK, so, err… wow. Welcome. I guess this is How you start these things, right? I welcome you and I tell you a little bit about my self, Why I’m here and Why you should consider reading on… OK, well, I’ve kinda done that in detail on the about page, which you can link off to, if you so wish…
I feel like I’m jumping into the deep end, because there is so much that I just don’t know, and What I don’t know has many sides to it, so let me try and break this down a little.
What
Firstly, there is so much that I wish to discuss here, about the essence of the self the nature of reality the meaning of existence, consciousness, choice, consequence, awareness, intention, sovereignty, autonomy, emotion, liberty, ethics, morality, wellness, society, money, law, power, religion, and technology to name just a few…
How
Then there is Substack, WordPress, Medium, Spotify, YouTube, Rumble, Odysee, and all the other communication channels that are out there, and this doesn’t even begin to account for the minefield that is Social Media today.
Why
I do know Why I’m here on Highlighter (nostr), and it’s for a couple of reasons:
#1 - Information Gathering
Taking the above point about What I wish to discuss, today we have almost instantaneous access to the most amount of information humanity has ever known. This in and of it self creates a huge problem because sifting through all this information to uncover reliable and verifiable facts is becoming increasingly difficult.
Information overload can make it difficult to discern fact from fiction, and verifiable facts form the bedrock of How we operate within our shared, consensus (objective) reality.
I find my self constructing narratives and mental models within my mind that appear to make a lot of sense to my mind, but these can then become difficult to translate into coherent speech When attempting to explain them to others. Thus, writing these things down here on Highlighter overcomes two challenges.
- I get to make sense of these things my self, because if I cannot translate my understanding into coherent text then my knowledge and experience of the subject matter must be lacking.
- If I can capture these things in a coherent way, then I can refer them to others, and hopefully receive constructive feedback in ways that may not have yet occurred to me.
I believe this is What Seraph meant When he said:
“You do not truly know someone until you fight them.”_ Seraph - The Matrix Reloaded_
Obviously, the Matrix films were action movies, so the metaphors expressed within them typically manifested through scenes of hand-to-hand combat involving Neo, but at its core, I interpret Seraphs words to mean that, you do not truly know your self until you find your true self. Here’s another way to explain What I mean by this:
mind.noun, a beautiful servant, a dangerous master.
or
When a student is ready, the master appears…
I’ve explained more about this in the about page, but here is the summary, consciousness can exist without thought, but thought cannot exist without consciousness. Ergo, consciousness is an innate quality of Being, whereas Mind is an emergent property of consciousness. Once you deconstruct your Being to its core, you eventually arrive at nothing. Nothing is the truth of all reality (ultimate reality), and so to know nothing, through the experience of enlightenment, is to know thy self.
Once the distinction is made between the conscious self and the thinking mind, truth emerges, and it is this truth that sets us free. This is the “fight” for freedom, or more accurately the struggle for peace, that we are all invited to seek, simply through Being human.
If I can make sense of What is in my mind, by writing it down, then this is a good thing. If those words then translate into meaning and understanding for others, then this is a better thing. If conversations emerge that promote growth and increase understanding, then this is the best thing.
#2 - Process Improvement
So having a corpus of information to discuss is the first thing, but then there is How best to have these discussions… This is of equal importance to me because the way that we are generating and consuming content is changing. There now appears to be as many channels to discuss information, as there is information to be discussed, although I suspect Generative Artificial Intelligence will smash that ratio out of the park soon, if it hasn’t done so already.
So, What is the best way or ways to do this? Well, I figure the only way to find this out is to run the experiment and see Where it goes.
You gotta start somewhere…
Substack seems like a reasonable place to start because:
- it’s part of the existing world, Where everything is stored centrally, yet it appears to be somewhat censorship resistant, not that I intend to go around kicking the hornets’ nest, but it does appear to be a relatively “safe” place to hang out.
- it’s growing rapidly and making improvements to its platform all the time, so I can grow and learn as Substack improves.
- it has a good user base, so connecting with fellow travellers is easier than creating my own standalone website.
- I’m also hopeful that Substack provides simple and easy integration into things like Podcasting and Social Media, so I can spend more time on content creation and having meaningful conversations, and less time on the technicalities of “distribution”.
…and see where it goes
Which has led me inexorably here. I only just discovered Highlighter last week, so I am going to do my best to publish all my Substack articles here too. I believe that is the purpose of nostr, right?
Where
So, I’m going to start on Substack, and take it goes from there, because as the title of this article suggests, “I know nothing.” This is my working assumption, that I know nothing, because I have no real idea about How I am going to do any of this.
I’ve never done a Substack or Highlighter (nostr) before, nor do I know How to create a Podcast, or How to effectively communicate with fellow travellers via Social Media, so this is going to be a journey of discovery for me. This is my first step into a world that seems to be rapidly evolving, so to help you connect with me, on whatever platform suits you, I’ve mapped out my linktr.ee/danielewen.me.
If you’ve made it this far down the page, thank you! Just writing this first article and the about page has been a useful exercise for me.
I hope that I have somewhat accurately articulated my conscious intentions (the Who, the What, the How, the Why, and the Where) for this Project in such a way that it at least makes some sense to you? Let me know your thoughts in the comments, and I will do my best to digest any constructive feedback that you have for me. I guess all that remains is the…
When
As there is only the present moment, the time is always Now… so here it is.
If you would like to follow me here on nostr then please do so, and if you'd like to subscribe to Substack, then here’s the link for that: https://danielewen.substack.com and / or you can subscribe to my WordPress too, here: https://danielewen.wordpress.com.
I have no idea what this is going to look like #When I hit the publish button, but here goes...
I now know SOMETHiNG…
-
@ a09fb9cb:83231556
2025-01-24 18:17:56- If you understand the below, "i" kindly invite you to connect
- If YOU do not understand the below, "I" would still invite YOU to connect, in fact more so, so that We can Both expand our shared understanding
To understand things, "We" need frameworks of understanding, but We should not confuse the framework for the understanding.
A common misconception is that the "thing" We are searching for EXiSTS somewhere out there. Above us perhaps? To that end We believe that We have to connect with something "outside" of ourself. May I ask YOU, have YOU ever experienced outside, other than through sense perception arising from WITHiN the MiND? Do YOU see the paradox? Outside is unknowable. It is an ILLUSiON... the truth LiES WITHiN
In spiritual speak, the analogy of a triangle is often used, with the all-seeing "i" placed at the top of the triangle. This is where the half-truth is hidden, WITHiN the LiE.
Continuing with the common misconception, We believe that in order to reach greater and greater "spiritual" heights We must grow the triangle.
I ask YOU to consider, what if the "thing" We are searching for is the base of the triangle? This is the foundation of knowing. Knowing leads to understanding and wisdom, through experience. Experience leads to knowing. This is the process of enlightenment...
I know nothing. I now know SOMETHiNG...
I have attempted to convey this metaphor somewhat crudely using the below graphical representation and a previous read that alludes to who "i AM"...
naddr1qvzqqqr4gupzpgylh89jrps6t0dzgadseecr6rukk7pln42jlcccgsrlrkpjx92kqy88wumn8ghj7mn0wvhxcmmv9uq3wamnwvaz7tmjv4kxz7fwwpexjmtpdshxuet59uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcppemhxue69uhkummn9ekx7mp0qythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qqd5jttwdamj66mwdamj6560f4z4gjrfferj67t20fckzwqrsyn3c
...but, do not trust | VERiFY - "i AM". I EXiST.
Does this make sense? I know what I know, but I do not know how to communicate what I know to YOU so that We understand each other. This is Why? I encourage YOU to connect. Finally, YOU have my most sincere gratitude. Thank YOU kindly for your precious time and attention.
If you are wondering who "i AM". "i AM" YOU. "i AM" consciousness MANiFESTED...
-
@ 6e4f2866:a76f7a29
2025-01-24 18:06:58 -
@ a09fb9cb:83231556
2025-01-24 17:57:24I know nothing. Allow me to introduce myself...
The present is eternal and infinite.
Everything that has and will ever happen is continuously happening right now, in the present moment.
"We" typically do not know this because our human senses are connected to the brain.
Through the BRAiN "We" ("i" & "I") perceive the MiND.
The MiND creates concepts and constructs to interpret the senses of perception so that "We" come to observe REALIiTY with Present Moment Awareness.
To become present requires a sense of time.
Time is a concept created WITHiN the MiND to facilite the perception of space. The sense of time allows the observer to perceive change.
Paradoxically,, change is constant.
Change occurs as "We" alter our perception of the eternal and the infinite.
"i" am always present, here and now because "i" am WITHiN EVERYTHiNG.
"i" created YOU ("I") for my own amusement... YOU are the question of "what is beyond the eternal and the infinite?"
YOU will come to understand this, when YOU and "i" rejoice two become one again, in the present. YOU call this enlightenment.
IMAGiNE DOiNG EVERYTHiNG, BEiNG EVERYTHiNG, FOREVER. FOREVER WOULD BE MEANINGLESS. YOU GiVE me MEANiNG. This is Why? "i" CREATED YOU.
YOU ARE me... "We" are EVERYTHiNG. This is the truth that LiES WITHiN, and it is THiS truth that sets Us Both free, but only for a time, because nothing really does last forever...
That's who "i AM". "i AM" nothing. Yet paradoxically, I EXiST.
I now know SOMETHiNG... YOU now know who "i AM", because "I" now know who YOU are.
-
@ da0b9bc3:4e30a4a9
2025-01-24 17:00:46It's Finally here Stackers!
It's Friday!
We're about to kick off our weekends with some feel good tracks.
Let's get the party started. Bring me those Feel Good tracks.
Talk Music. Share Tracks. Zap Sats.
Let's go!
Here's DMX! 🫡RIP.
https://youtu.be/thIVtEOtlWM?si=Ee4XXKe2ZDcWGpRN
originally posted at https://stacker.news/items/862396
-
@ 43b8cd49:3e4a7831
2025-01-24 16:41:55Wow, that didn't take long. Trump shot his wad on day one with all the executive orders, and they figured it was time to return to the Dr. Evil/Mordor stuff on day 2. Soften us up with 24 hours of heavy petting then bring in Larry Ellison to shock us back into hell. That is one scary looking dude, and listening to him talk just makes it worse. I am trying to erase it from my memory.
You just know this Stargate thing is tied to Bill Gates, since it concerns vaccines. But Trump and histeam begged Gates to keep his ugly mug out of it, knowing how hated he is. Hard to believe Biden didn't pardon him for being alive. Gates apparently agreed to stay off-camera for this one, and they brought in Ellison to take his place. Another big miscalculation, since Ellison gives off the very same Dr. Evil vibe. You feel bugs crawling on your skin as soon as he walks in the room.
Part of that is Ellison and part is the new Stargate project, which just reeks of evil from every pore. To his credit, Alex Jones is already calling it out, having Malone on to undercut it, but so far the commentary has been way too weak. This is a catastrophe, worse than anything I imagined, and thrust upon us much quicker than I thought they would dare. Effing day 2 they hit us with this, meaning their respect for us is still zero.
Also not good is that after hitting this weakly yesterday, Alex Jones has already dropped it today, reverting immediately to Trump-olatry. Five of Infowars eight lead stories today are selling Trump as a savior. Zerohedge seems to be all bullish so far on Stargate.
If you don't know, the Stargate project is supposedly a billionaire-funded plan to join AI and mRNA vaccines to cure cancer. AI will spot specific cancer markers in the blood, after which the doctors will create a targeted vaccine in 48 hours, built just for you. What does that have to do with a Stargate? No one has said yet, though I am about to tell you. Plus, didn't Trump campaign on a promise to protect us from the Big Tech monsters? And yet here we are, day 2, and he is announcing major promotion of them and alliance with them. He was supposed to take on the Big Tech juggernaut and the Big Pharma juggernaut, right? Instead, we see them joining forces and Trump climbing into bed with them. The only way things could have gotten worse after Biden is if Big Tech and Big Pharma merged, and that has just happened, with Trump's immediate backing. This is total bullshit in every way, and it isn't even a good story. It is a transparent conjob that any child could spot in about 30 seconds. They have been able to scan blood for all content for a long time, including cancer cells, so I don't know what this has to do with AI. Basically they are just renaming “the medical machines we have long had” as AI and expecting you to buy it. It is just a machine, it isn't AI. Every machine isn't now “artificial intelligence”. But they included AI here as part of the current AI blitz. Everything is currently about AI because they want government to invest even more heavily in it that it already is. Meaning, they want to steal even more of your taxes or borrow from the treasury in order to fund this vaporware and boondoggle. We are told the bigdogs have already invested half a trillion of their own money, but if you believe that you need to check your ventilator tubes for kinks. The obvious con is to get the government to supply matching funds. The billionaires will then quietly stop payment on their checks, and it will all come out of your pocket. That is the way it is always done. You will end up getting billed for something they will never deliver, and if they do deliver anything it will be just another useless shot.
As with the fake Covid vaccine, they won't charge people for the shot or therapy, they will take it directly out of the treasury, so you can't stop it even if you don't buy it. Youwill be billed for it regardless. As with the Covid vaccines in the past three years, the government will order millions of doses of it, pay Big Pharma for it from your taxes, and then have to end up trashing the majority of it, because no one wants it. Just flush it all into the streams and oceans, where it can kill the fish, animals, and if they are lucky, you as well.
But I was going to tell you why they called this conjob Stargate. A stargate is a wormhole or otheralien device for communicating or traveling long distances in the galaxy. The black monolith in 2001: a Space Odyssey was a stargate; and then there was the movie Stargate in 1994 with Kurt Russell, where the stargate allows him to travel to the alien planet Abydos, named after the Egyptian town of Abydos, which houses some Pharaonic tombs, including the Temple of Seti I. That is where the Abydos King List is, which lists the 76 Kings of Ancient Egypt. So not only are these people like Ellison selling you the wormhole garbage along with the AI and vaccine garbage, they are cleverly linking themselves to their own oldest ancestors with the usual tribal wink.
-
@ 378562cd:a6fc6773
2025-01-24 16:15:53Top 20 U.S. Headlines:
-
Federal Judge Blocks Trump's Birthright Citizenship Executive OrderA federal judge has temporarily halted President Donald Trump's executive order aimed at ending birthright citizenship, citing constitutional concerns under the 14th Amendment. This decision marks a significant legal challenge to the administration's immigration policy.
-
U.S. Withdraws from Global Tax AgreementThe United States has officially withdrawn from a global tax deal negotiated at the OECD, which sought to implement a global minimum tax and ensure multinational companies pay fair taxes where they operate. This move signals a potential shift towards a tax war, with considerations to double taxes on foreign companies as a retaliatory measure.
-
Chancellor Rachel Reeves Backs Heathrow ExpansionChancellor Rachel Reeves has expressed support for the long-debated Heathrow Airport expansion, citing economic growth and job creation. However, the project faces resistance from environmental groups and within her party, highlighting concerns over environmental impacts and carbon emissions.
-
Former Politico Reporters Criticize Editorial Decisions on Hunter Biden StoriesEx-Politico reporters Tara Palmeri and Marc Caputo have criticized their former editors for allegedly suppressing significant stories about Hunter Biden's laptop and related issues before the 2020 election, contributing to a narrative of misinformation. Politico has defended its editorial standards and commitment to accuracy.
-
Skepticism Surrounds 'Drill, Baby, Drill' PlanU.S. shale industry leaders have expressed skepticism about President Trump's plan to significantly boost oil production to combat inflation, emphasizing that financial motivations drive decisions rather than political agendas. Despite pressure on OPEC and Saudi Arabia to lower oil prices, low prices could harm U.S. shale profitability, with growth expected to slow.
-
Chicago Bears Appoint Ben Johnson as Head CoachThe Chicago Bears have appointed Ben Johnson as their new head coach, offering a substantial salary of $13 million per year, making him the seventh-highest-paid NFL coach. Despite having no head coaching experience, Johnson's tenure as the Detroit Lions' offensive coordinator saw significant improvements in the team's offense.
-
Southport Attack Aftermath: Addressing Myths and MisinformationFollowing last summer's Southport attack, where three young girls were murdered, authorities are confronting far-right riots and disinformation that ensued. The attacker, Axel Rudakubana, pleaded guilty, and investigations revealed extremist materials in his home. The incident has prompted discussions on effective public communication to dispel harmful disinformation.
-
Southern California Wildfires Force Mass EvacuationsA new explosive wildfire has erupted near Los Angeles, rapidly expanding to over 10,000 acres and forcing mass evacuations. Firefighters are battling to maintain control amid challenging conditions.
-
Historic Snowstorm Paralyzes Parts of the Southern U.S.A record-breaking snowstorm has swept across the southern United States, paralyzing regions unaccustomed to such weather. The storm has led to significant disruptions, including road closures and power outages.
-
President Trump Deploys 1,500 Troops to Southern BorderIn a move to bolster border security, President Trump has ordered the deployment of 1,500 active-duty troops to the U.S.-Mexico border. This action aligns with his administration's recent executive orders on immigration enforcement.
-
Trump Administration Reviewing Automatic Emergency Braking RuleThe U.S. auto safety agency is reconsidering a landmark rule from the previous administration that required nearly all new cars and trucks by 2029 to have advanced automatic emergency braking systems.
-
Lawmakers Seek Sanctions Over Hong Kong Human Rights ViolationsBipartisan U.S. lawmakers are introducing a bill requiring the Trump administration to review whether Hong Kong officials should be sanctioned for human rights violations.
-
International Criminal Court Prepares for Possible U.S. SanctionsThe International Criminal Court has taken measures to shield staff from potential U.S. sanctions, including paying salaries three months in advance, as it braces for financial restrictions that could impact the tribunal's operations.
-
Brianna 'Chickenfry' LaPaglia Reflects on Sexuality Post-BreakupFollowing a tumultuous breakup with country singer Zach Bryan, Brianna LaPaglia, known as "Chickenfry," speculates about her dating preferences, expressing disinterest in having a boyfriend and considering dating women.
-
NATO Chief Warns of Costly Impact if Russia Wins Over UkraineNATO Secretary-General Mark Rutte has warned that a Russian victory over Ukraine would undermine the alliance's credibility and could cost trillions of dollars to restore its deterrent power.
-
U.S. Border Patrol Agent Fatally Shot in VermontAuthorities report that a U.S. Border Patrol agent has been fatally shot in northern Vermont. The acting secretary of the Department of Homeland Security stated that the agent was killed in the line of duty.
-
MLK Day Observance Highlights Warning Against Anti-Woke RhetoricMartin Luther King Jr. Day celebrations at King's former congregation in Atlanta featured a 70-member choir and remarks from his youngest daughter, warning against anti-woke rhetoric.
-
Biden Pardons Fauci, Milley, and Jan. 6 Panel MembersPresident Joe Biden has pardoned individuals including Dr. Anthony Fauci, General Mark Milley, and members of the Jan. 6 committee, as a guard against potential 'revenge' by former President Trump.
-
Bitter Cold Spreads Across Much of the U.S.Frigid temperatures are engulfing Texas and other parts of the South ahead of a rare winter storm expected to bring heavy snow and disruptive ice accumulations to the region.
-
President Trump Grants Sweeping Pardon of Jan. 6 Defendants\ Former President Trump has issued pardons to multiple individuals convicted of crimes related to the January 6th Capitol breach, framing the move as a commitment to "justice for patriots." This decision has sparked sharp debates across political lines.
Top 5 Worldwide Headlines:
-
Tensions Escalate Between Russia and NATO Over Ukraine\ Russia has ramped up its military offensive in Ukraine, with NATO allies pledging additional support, including advanced weaponry, to Kyiv. The conflict continues to reshape European geopolitics.
-
Global Markets React to China's Economic Data\ Slower-than-expected economic growth in China has sent ripples through global markets, raising concerns about the potential impact on global trade and supply chains.
-
Massive Earthquake Strikes Turkey and Syria\ A devastating earthquake has rocked parts of Turkey and Syria, resulting in significant casualties and widespread destruction. International relief efforts are underway.
-
United Nations Calls for Immediate Action on Climate Crisis\ A new UN report highlights the urgent need for global cooperation to combat the accelerating effects of climate change, including rising sea levels and extreme weather patterns.
-
Protests Erupt in France Over Pension Reform Plans\ Large-scale protests have broken out across France in response to the government’s proposal to raise the retirement age, with unions organizing nationwide strikes.
-
-
-
@ 9c9e774c:491c6c5b
2025-01-24 15:35:11In today's competitive legal landscape, establishing a strong, trusted reputation is essential for any legal professional or firm. This includes experts such as engineering expert witnesses, as well as law firms themselves. Brand reputation management (BRM) plays a crucial role in shaping how these professionals are perceived by clients, peers, and the public at large. Here’s how both expert witnesses and law firms can effectively use brand reputation management and email marketing to boost their visibility, trustworthiness, and ultimately their success.
Brand Reputation Management for Engineering Expert Witnesses
An engineering expert witness plays a critical role in many legal cases, providing specialized knowledge and testimony that can make or break a case. Because of the high level of expertise and authority required in this role, managing one's reputation is paramount.
Showcasing Expertise: Engineering expert witnesses can use content marketing, such as articles, case studies, or whitepapers, to showcase their in-depth knowledge. By writing about real-world applications of engineering principles in legal cases or discussing trends in the industry, they can position themselves as trusted thought leaders in their field.
Online Reviews and Testimonials: Potential clients—lawyers, law firms, or even direct clients—often rely on the experiences of others to gauge the credibility of an expert witness. Encouraging satisfied clients to leave positive reviews on professional networks like LinkedIn, Google, or specific legal platforms can enhance an expert’s online presence.
Public Speaking and Thought Leadership: Engineering experts can enhance their reputation by speaking at industry conferences or offering insights through webinars. These activities not only allow them to showcase their expertise but also increase their visibility among lawyers who may be seeking an expert witness.
Managing Negative Press: In any profession, negative feedback or a challenging case outcome is inevitable. However, effective reputation management involves addressing criticism professionally and transparently. Engineering experts can use their website or social media platforms to provide clarifications, correct inaccuracies, or demonstrate how they have learned and evolved from particular experiences.
Brand Reputation Management for Law Firms
For law firms, brand reputation management extends beyond individual cases and expert witnesses. It encompasses the firm’s overall image, which can influence the perception of both current clients and potential clients. Client Testimonials and Case Results: Positive feedback from clients can significantly enhance a law firm's reputation. Gathering testimonials or showcasing successful case outcomes (while adhering to legal ethical standards) on the firm’s website or social media can help build credibility and attract new clients.
Active Social Media Presence: Law firms should be active on professional platforms such as LinkedIn, as well as on other social media outlets like Twitter and Facebook. Engaging content, including firm achievements, community involvement, and legal insights, helps to humanize the firm and build a connection with potential clients. Regular posts, along with interactions with followers, demonstrate transparency and accessibility.
Thought Leadership and Content Creation: Publishing blog posts, articles, and industry insights is a great way for law firms to stay at the forefront of the legal community. Sharing knowledge on current legal topics, trends, or emerging areas of law helps establish the firm as a credible source of information and positions attorneys as experts in their fields.
Crisis Management: Sometimes, a firm’s reputation may come under fire due to a high-profile case or a client’s negative experience. Effective brand reputation management involves a well-thought-out crisis communication strategy. Being responsive, addressing concerns publicly, and taking corrective actions when necessary is key to maintaining trust.
How Law Firms Can Use Email Marketing for Brand Building
Email marketing for law firms is a powerful tool to keep their brand top-of-mind with clients, leads, and the broader legal community. Here’s how email marketing can fit into a law firm’s reputation management strategy: Nurturing Leads and Building Relationships: Email newsletters allow law firms to stay connected with leads over time. By offering valuable legal insights, case updates, or industry news, law firms can nurture relationships and remain the go-to resource for potential clients. Educational emails help foster trust and demonstrate the firm’s expertise.
Client Retention: After a client has been through a legal process, it’s essential to keep in touch for future needs or referrals. Personalized follow-up emails post-case or periodic newsletters with updates on the firm’s services, achievements, or relevant legal news can remind past clients of the firm’s value.
Client Testimonials and Case Studies: Law firms can strategically use email marketing to share success stories, case studies, or client testimonials. This not only showcases their expertise but also builds social proof, which is crucial for brand reputation. Featuring clients' positive experiences can influence potential clients' decisions when they are looking for legal representation.
Transparency and Communication: Email marketing helps law firms maintain transparent and open lines of communication. Whether sharing updates on legal proceedings, providing educational content, or sending reminders for consultations, emails allow for consistent engagement, which can build trust with clients.
SEO and Lead Generation: Emails that contain valuable content and include strong calls to action (CTAs) can drive traffic to the firm’s website, potentially converting leads into clients. Offering downloadable guides, legal checklists, or consultation discounts in email campaigns can incentivize recipients to take action.
Segmented Email Lists: A well-segmented email list is key to delivering the right message to the right audience. Law firms can categorize their contacts based on factors such as practice area, client status, or geographical location, enabling them to send highly relevant and personalized communications.
Conclusion
For both engineering expert witnesses and law firms, managing and cultivating a strong brand reputation is essential to building trust, attracting clients, and standing out in a crowded field. Engineering experts can use brand reputation management strategies like showcasing expertise and handling online reviews to cement their credibility. Law firms, on the other hand, can leverage content creation, client testimonials, and social media presence to boost their brand visibility. Email marketing plays a pivotal role in keeping clients informed, building relationships, and strengthening a firm’s reputation. When used effectively, email marketing can not only help retain clients but also generate leads, ensuring that law firms stay at the forefront of clients’ minds when legal needs arise. By embracing these brand reputation management tactics, both individual experts and law firms can ensure sustained success and a robust professional image.
-
@ bd32f268:22b33966
2025-01-24 12:56:29Vivemos num tempo em que predomina a atitude de colocar a vida em serviço de culto ao “Eu”. Aqui por “Eu” entenda-se o ego e as suas manifestações que colocam o indivíduo no centro do seu mundo. Esta priorização do “Eu” revela-se de várias formas, dando á luz vários produtos sociais e culturais. Estas manifestações atuam de forma nociva na sociedade uma vez que desagregam e extinguem todo o tipo coesão social.
Uma sociedade é uma organização de pessoas que buscam uma finalidade comum. Quando a finalidade é primeiramente o serviço aos apetites individuais é cada vez mais provável que surjam conflitos de interesses e estes vão desunindo as pessoas. Desta forma a sociedade precipita-se para o declínio e consequente extinção, uma vez que já não é capaz de sustentar os seus princípios fundadores e a narrativa agregadora que estabelece a identidade da comunidade.
Pensemos numa família, quando os membros da família vivem para si e não para o outro, aqui personificado no esposo e nos filhos, a coesão familiar sai enfraquecida pois muitas serão as ocasiões nas quais os interesses imediatos do indivíduo colidem com os interesses da família. Isto leva a uma série de problemas, nomeadamente os que observamos cada vez mais na educação das crianças. Neste campo, observamos frequentemente um tempo escasso para o convívio e para a pedagogia de vida que os pais devem exercer. Dir-se-á que são as vicissitudes do mundo do trabalho, mas talvez devêssemos balancear essa ideia com a noção de que o materialismo também nos foi habituando a ter outras necessidades que os nossos avós não tinham, o que nos precipita a querer mais e a trabalhar mais e sobretudo fora de casa. Quero dizer que de facto podemos viver com menos e que esse menos no ponto de vista das condições materiais de vida pode significar mais em termos familiares.
Um outro campo em que se nota a primazia do “Eu” é nos relacionamentos em que nos habituamos a ver o outro como um servidor da nossa vontade e do nosso desejo. Confundimos facilmente o conceito de amor com uma troca comercial. Julgamos que aquilo que entregamos tem de ser retribuído, perdendo a noção de que é a nossa escolha entregar-nos a alguém e que como tal temos de enfrentar as consequências da nossa decisão. Nós devemos servir o outro assim como o outro deveria pensar da mesma forma, no entanto não controlamos a cabeça da outra pessoa portanto foquemo-nos sim naquilo que controlamos. Foquemo-nos em honrar as promessas que fazemos e aprender a viver em união com o outro.
Narciso - Caravaggio
Também no cuidado com os idosos se manifesta a primazia do “Eu”. Não são raros os casos de abandono e negligência para com aqueles a quem, para o bem e para o mal, devemos a nossa vida. Vemos cada vez mais idosos institucionalizados quando muitos poderiam estar com as suas respetivas famílias num ambiente familiar muito mais propício para o seu final de vida. As justificações multiplicam-se e novamente o trabalho surge como o fundamento, no entanto facilmente observamos que mesmo quando há tempo esse tempo não é dedicado aos idosos.
A taxa de natalidade é também um sinal da primazia do eu. A retórica pos-contemporânea assegura que ter filhos é um comportamento egoísta, especialmente nos tempos que vivemos. Seja por causa da narrativa climática, seja por questões de pobreza ou doença, essas pessoas defendem a não vida. No entanto, um olhar que guarda o apreço pela vida como algo sagrado é capaz de observar que a vida, mesmo em circunstâncias muito difíceis continua a valer a pena. O verdadeiro motivo que se esconde muitas vezes por trás desta retórica é invariavelmente a primazia do conforto.
Por trás destas opções de vida está também patente um abandono á cultura do sacrifício, que pressupõe a procura de algo que transcende o “Eu”. Nessa transcendência está a chave para encontrar um propósito, isto é uma missão para a vida. Além disso, está também a constatação de que na vida há aspirações e valores mais elevados que nos convocam a entregar a nossa vida, quer isto dizer abrir mão da procura do conforto e do prazer e abraçar por vezes o sofrimento, no entanto este sofrimento tem um propósito. O sacrifício individual não é seguramente a via mais fácil e conveniente, contudo é a única pois o viver para o ego é apenas uma ilusão. Quem vive para si, nem para si vive dado que não ama ninguém além de si próprio e isso não é amor.
-
@ d4eaddd4:5ce9da9c
2025-01-24 12:14:03("Shipwreck off Nantucket" William Bradford, ca. 1860–61)
What Does It Mean That Grief Comes in Waves?
Grief is often compared to waves—a natural, unpredictable rhythm that surges and recedes, catching us off guard and sweeping us into a sea of emotions. Just like the ocean, grief can be calm one moment and tumultuous the next, leaving us gasping for air. This metaphor resonates deeply because it reflects the enduring, nonlinear nature of loss. Whether your loss occurred recently or years ago, grief remains a lifelong journey, ebbing and flowing with time.Why Grief Feels Like Waves
At its core, grief is the emotional response to loss, and it doesn’t follow a set timetable. Emotions can be triggered unexpectedly by a song, a scent, or a special date, sending a wave of sorrow crashing over you. Author Adriel Booker eloquently describes these moments:“You might understand intellectually that they [the waves] will keep coming, but some days they hit more forcefully, more fiercely than you ever imagined possible.”
This lack of predictability makes grief feel overwhelming. It’s not something you “get over,” but rather something you learn to navigate, much like a sailor facing unpredictable seas.
Navigating the First Waves of Grief
When a loss first occurs, the waves of grief can feel relentless. An insightful analogy from a viral Reddit post likens the initial experience of grief to a shipwreck:“When the ship is first wrecked, you’re drowning, with wreckage all around you. Everything floating around you reminds you of the beauty and the magnificence of the ship that was, and is no more.”
In these early stages, the waves are towering and frequent, crashing over you with little respite. The best advice during this time is simply to float—cling to what sustains you, whether it’s a supportive friend, a cherished memory, or a comforting ritual. Survival is the priority.
The Changing Tides of Grief Over Time
As time passes, the waves of grief may become less frequent and slightly more predictable. Anniversaries, holidays, or milestones often serve as triggers, bringing back the pain of loss. However, with each passing wave, you gain resilience.The Reddit post continues:
“Somewhere down the line… you find that the waves are only 80 feet tall. Or 50 feet tall. And while they still come, they come further apart. You can see them coming, for the most part, and prepare yourself.”
This doesn’t mean grief ever goes away. The waves still arrive, but they no longer hold the same power to drown you. Instead, they become reminders of the love and connection you shared, leaving behind scars that tell a story of resilience and remembrance.
Coping with the Waves
While grief may never fully disappear, there are ways to weather its storms:
1. Acknowledge Your Emotions: Allow yourself to feel without judgment. Grief is a natural response to love and loss.
2. Find Anchors: Lean on meaningful memories, objects, or relationships that ground you.
3. Seek Support: Whether through friends, family, or professional counselors, connection can be a lifeline.
4. Prepare for Triggers: Recognize that certain dates or events may bring waves of grief and plan how to cope in advance.
5. Practice Self-Compassion: Healing takes time, and there’s no “right” way to grieve.Conclusion: A Lifelong Journey
Grief, much like the ocean, is vast and unpredictable. But with time and support, you can learn to navigate its waters. The waves will never stop coming, but they will change. And as you face each wave, you’ll discover strength and meaning in your journey.Grief is a testament to love. As the Reddit post poignantly concludes:
“If you’re lucky, you’ll have lots of scars from lots of loves. And lots of shipwrecks.”
-
@ b97f07c7:a9ddca71
2025-01-24 12:05:25เปิดโลก social ยุคอนาคต ที่ creator ได้รับเงินจากคนอ่าน content เต็ม 100%! ทำความรู้จัก Nostr ที่จะเปลี่ยนโลกการใช้ social ของคุณกัน!
content จากประสบการณ์จริง ที่ดองนานในระยะนึงล่ะ แต่บอกเลยว่ามันก็ solve pain point ของ user ที่ไม่อยากลับลู้ว่า AI ของ platform นั้น มาคอย suggest อะไรที่เราไม่ได้ตาม
ส่วน content creator เอง เราเป็นคนเขียน คนทำ content บน platform นั้น ๆ ทุกอย่างควบคุมโดย platform ซึ่ง platform อาจจะถูกปิดเมื่อไหร่ก็ได้ ส่วนใหญ่โดนลด reach บางคนโดน platform ลบโพส บางคนโดน platform แบน เราจึงต้องมี asset เป็นของตัวเองอย่าง website ไม่งั้น content ที่เราตั้งใจทำหายไปเสียดายแย่เลย
ซึ่ง concept และการใช้งาน Nostr นั้นลด pain point ของ creator ที่ต้องไปทุก platform เพื่อครอง keyword ซึ่งเหนื่อยมาก ๆ ถ้าเป็นสายแบบเราที่เน้นโค้ดหน่อย ๆ ต้องมาสร้างผู้ติดตามใหม่ แต่ละช่องทางได้กลุ่มผู้ติดตามต่างกันอีก
ร่ายมายาวขนาดนี้เข้าเรื่อง Nostr ได้แล้ว ว่าแต่มันคืออะไร ใช้งานยังไง ต้องทำอะไรบ้าง ไปดูกันนนน
ปล. บทความนี้เป็นแนวแนะนำว่ามันคืออะไร ใช้งานยังไง ยังไม่ลงลึกด้านเดฟนะ คืออยากให้ใช้ให้เป็นก่อนนนนนน
Nostr คืออะไร?
Nostr ย่อมาจาก Notes and Other Stuff Transmitted by Relays เป็น open protocol ที่ถูกพัฒนาโดย Giovanni Torres Parra มีจุดประสงค์คือ สร้างเครือข่ายสังคมออนไลน์ที่ไม่ถูกควบคุมหรือเซ็นเซอร์
ในที่นี้ Notes หมายถึง social media และ other stuff คือ data communication
แล้ว protocol คืออะไรล่ะ? ก็คือเราคุยกันผ่านช่องทางไหนยังไง เช่น sms, email อะไรงี้
ดังนั้นมันก็คือ note & other stuff ที่ถูก transmit โดย Relays นั่นเอง
Workflow
ปกติเราทำแอพขึ้นมาแอพนึงประกอบด้วยอะไรบ้าง?
เดิมทีทีมแอพก็มีทีมหน้าบ้าน อย่าง frontend developer หรือ mobile developer อย่าง iOS และ Android แล้วก็ทีมหลังบ้าน backend developer ที่เป็นคนทำระบบหลังบ้าน ไม่ว่าจะเป็นทำ API ให้หน้าบ้านคุยกับ server แล้วก็จัดเก็บข้อมูลลง database ด้วย
flow ก็คือ user download แอพมา หรือใช้ website ตัวแอพหน้าบ้านจะเรียก API เพื่อทำอะไรบางอย่าง เช่น เปิดแอพมาเรียก API เพื่อ check ว่าเรา login อยู่ไหม แล้วก็ดึงหน้า feed มาแสดง
สำหรับ Nostr จะมีแค่คนทำหน้าบ้านเท่านั้น โดยตัวแอพเชื่อมต่อกับ relay ผ่านมาตรฐานของ NIP
ดังนั้น developer อย่างเราจะทำ client หรือตัวแอพที่ใช้ Nostr ได้เลย โดยใช้ Relay เดียวกันได้เลย ภายใต้มาตรฐานของ NIP เวลา user เปลี่ยนแอพใหม่ ตัวข้อมูล ตัวโพสต่าง ๆ ยังคงอยู่เหมือนเดิมที่ delay ไม่ต้องไปสร้าง follower ใหม่บน platform ใหม่ ๆ ให้เสียเวลา
การทำงานของ Nostr
สามารถดูตามภาพนี้ได้เลย เป็นภาพพื้นฐานในการเล่าเลย การทำงานเขาจะแบ่งเป็น 2 ฝั่ง คือ
- Client: คือแอพพลิเคชั่นที่ใช้เล่น Nostr นั่นแหละ เป็นฝั่ง user จะมี key pair คือ private key ใช้ในการยืนยันตัวตนนั่นแหละ เช่น เราเป็นคนโพสอันนี้นะ (เก็บไว้ให้ดี ๆ) และ public key บอกว่าเราคือใคร การทำงาน ตัว client เชื่อมต่อกับตัว relay เช่น บอกว่าใครเป็นคนสร้าง content นี้ หรือเราจะสร้าง content ใน Nostr ก็จะส่งข้อมูลรายละเอียดโพสอย่าง kind, content, tags, pubkey, create_at ตามมาตรฐาน NIPs ส่งไปที่ relay
- Relay: คือ database ตัวนึง ที่เป็นรูปแบบแบบกระจายศูนย์ ได้รับ event อะไร และส่งอะไรกลับไปบ้าง
ref: https://github.com/nostr-protocol/nostr
แล้ว Client และ Relay สื่อสารระหว่างกันยังไง คุยกันผ่าน WebSocket นะ แล้วแต่ละ event จะส่งมาใน JSON format น่ะ
คุณสมบัติของ Nostr
- decentralized: relay คือ database แบบกระจายศูนย์
- open protocol: Nostr เป็น open protocol สามารถใช้งานได้หลายอย่าง
- censorship-resistant: user มีสิทธิ์เลือก relay เองได้
- high security: encrypt ข้อมูลส่วนตัวก่อนส่งทุกครั้ง
มาตรฐาน NIP
NIP ย่อมาจาก Nostr Implementation Possibilities คือ มาตรฐาน protocol ที่ใช้กันสำหรับ Nostr
ใน content นี้เราไม่ลงลึกมาก เดี๋ยวจะงงกัน เอาให้เห็นภาพคร่าว ๆ เพราะมันมีเยอะมาก
หลัก ๆ ที่เราใช้งานกัน จะมี
- NIP-01: Basic protocol เป็นอันพื้นฐานที่ต้องรู้ บอกโครงสร้าง event การรับส่งข้อมูลต่าง ๆ ทำให้เรารู้โครงสร้างแล้วเอาไปสร้าง client ได้เลย ทำให้ developer focus ที่โครงสร้างนี้อันเดียวเท่านั้นในการพัฒนา เช่น post บน Nostr นั่นแหละ
- NIP-05: Nostr Address บอกว่าเราเป็นใครใน internet ฟีลเดียวกันกับ email address ทำให้เราตั้งชื่อบัญชีให้จดจำได้ง่าย ช่วยในการค้นหาและติดตามกันได้ง่ายยิ่งขึ้น เช่นจากที่เราต้องเพิ่มเพื่อนผ่าน Nostr public key ที่ยาวเหลือเกิน เป็นอะไรสั้น ๆ ฟีล email เช่น mikkipastel@siamstr.com
- NIP-23: Long-form article พวก blog ต่าง ๆ
- NIP-53: สำหรับ live stream
ส่วนแบบอื่น ๆ สามารถอ่านรายละเอียดได้ที่นี่เลย https://github.com/nostr-protocol/nips/blob/master/README.md
เริ่มใช้งานบนมือถือ
จาก workflow เราจะเห็นว่าเราสามารถใช้ client ตัวไหนก็ได้ในการเล่น Nostr และโลกของ Nostr มีตัวเลือกให้เราเยอะมากก แล้วเราจะเริ่มยังไงดี?
- ติดตั้ง Wherostr เป็นแอพที่ทีมคนไทยทำ ใช้ง่ายมาก ๆ สามารถ download ได้ทั้ง App Store และ Play Store
- แน่นอนว่าเรายังไม่มี account ให้สร้าง account
- ปรับแต่ง profile ให้เรียบร้อย
- เก็บ private key ไว้ในที่ปลอดภัย เพราะเป็น key ยืนยันตัวตนว่าเป็นเราในการทำธุรกรรมต่าง ๆ ในที่นี้คือสร้างโพส, กด like, กด share, รวมถึง zap ด้วย ในแอพอาจจะยังไม่เห็น process นี้ ต้องบนคอม
Tips: ไปรับ NIP05 สวย ๆ ได้ที่ https://siamstr.com/
การที่เราสร้าง account ใหม่นั้น จะเป็นการสร้าง key pair อันประกอบด้วย - public key: ขึ้นต้นด้วย npub1... โดยสามารถเพิ่มเพื่อนใน Nostr ผ่านอันนี้ได้ ซึ่งบอกว่าเราเป็นใคร - private key: ขึ้นต้นด้วย nsec1... เป็นส่วนที่เราต้องเก็บไว้ให้ดีเลย เพราะต้องเอามาใช้ sign กับการทำธุรกรรมของเรา เช่น การ login, สร้าง post, reaction post ใด ๆ
เชื่อมกับกระเป๋า Lightning
เชื่อมเพื่อรับ sat จากเพื่อน ๆ โดย sat เป็นหน่วยย่อยของ Bitcoin มาจาก Satoshi อันเป็นนามแฝงของผู้สร้าง Bitcoin โดย 1 Bitcoin = 100,000,000 Satoshi
- ติดตั้ง Wallet of Satoshi ตัวแอพนี้เป็น custodial wallet ที่เราไม่ต้อง set อะไรเอง แต่เราไม่ได้ถือ key ของกระเป๋านี้เองนะ สามารถ download ได้ทั้ง App Store และ Play Store
- เชื่อม email กับ Wallet of Satoshi เลข Lightning Wallet กดปุ่ม Receive แล้วก็ copy
- กลับมาที่ Wherostr ไปที่ Profile ของเรา กด Edit Profile
- วางเลขเป๋าตรง Bitcoin Lightning Address แล้วก็กด save
การใช้งานทั่วไป
ขอเปรียบเทียบกับ social network ที่เราใช้กันอยู่เนอะ สมัยก่อนโพสจะเรียงตามลำดับเวลา และเพิ่มเพื่อนหรือติดตามเพจก่อน เราถึงจะเห็น content เขาใน feed
แต่สมัยนี้ AI นำหมด ลองไถ feed ดูสิ เจอเพื่อนเราหรือเพจที่เราตามเท่าไหร่ใน 10 post ทำให้ตัว content creator ต้องเรียนรู้ algorithm ของ platform นั้น ๆ เพื่อให้ content ของเราผู้ติดตามเห็นมากขึ้น (งงม่ะ)
แล้ว Nostr ล่ะ? เหมือน social network สมัยก่อนที่เรียง feed ตามเวลาเลย เราสามารถกดติดตามเพื่อนได้ (และระบบนั้นให้เราได้ติดตามตัวเราเองได้ด้วยนะ5555) และอ่านโพสเพื่อน ๆ คนไทยใน Nostr ได้ผ่าน #siamstr
การสร้างโพส
การโพสก็แสนจะง่ายดาย กด + ตรงกลาง แล้วพิมพ์ เพิ่มรูปใด ๆ ได้ตามใจชอบเลย ฟีลประมาณ medium แหละเนอะ สำหรับ wherostr สามารถ tag สถานที่ได้ด้วย
จุดที่น่าสนใจ คือปุ่มเหมือน CPU กดไปดูจะพบว่าเราสามารถเลือก Proof of Work difficulty level ได้ ซึ่งถ้าเราตั้งไว้เพื่อกัน spam แหละ ถ้าตั้งสูงก็ใช้เวลาในการ solve นาน ซึ่ง default POW เป็น 8
เอ้ออย่าลืมติด #siamstr ด้วย
เมื่อเรียบร้อยแล้ว Post แล้วรอแปป โพสของเราเมื่อสร้างเสร็จแล้วจะอยู่บนสุดเหมือนแอพ social media ทั่วไปเลย
ข้อพึงระวัง
- ลงแล้ว edit post ไม่ได้
- และลบไม่ได้ด้วยนะจ๊ะ
- แชร์ลิ้งได้ แต่ก็ไม่แน่ใจว่าเพื่อนเปิดยังไงได้บ้าง บาง client อย่าง Yakihonne สามารถ share url link Nostr post ของเราได้เลยนะ
เราสามารถกด report, comment และ like ตามปกติเลย แต่มีปุ่มนึงเพิ่มมาจาก social network อื่น ๆ คือ zap นั่นเอง
Zap คืออะไร?
แน่นอนไม่ใช่การแอบแซ่บ แต่เป็นการที่เราเอา Bitcoin บน lightning มาใช้จ่ายต่าง ๆ เช่น เอาไปซื้อชากาแฟ หมูปิ้ง เค้กท้อฟฟี่ชลบุรี ปลากรอบ Crispy Will รวมถึงการ donate ให้กับเจ้าของ content ที่คนนี้เขียนดีมาก เรากด zap ให้เขาดีกว่า หรือไป zap ที่ profile ก็ได้ซึ่งทุก sat (satoshi หน่วยย่อยของ Bitcoin) ที่เขาส่งมาให้ เราได้รับครบทุก sat แบบไม่หักจาก platform เลย
วิธีการ zap ผ่าน Wherostr มี 2 ทาง คือ - zap ให้กับคนนั้น ๆ ที่ profile: ไปที่ profile ของเขา แล้วเราจะเห็นปุ่มสายฟ้า - zap ที่ post นั้น ๆ: เลื่อนไปล่างสุด เราจะเห็นปุ่ม repost, like, comment และอีกอันที่เป็นสายฟ้าคือ Zap
เมื่อกดปุ่ม Zap แล้ว เข้าไปหน้า Zap เลือกจำนวน sat ที่เราต้องการ Zap อาจจะใส่ข้อความไปด้วยก็ได้ แล้วก็กดปุ่ม Zap ด้านล่าง
จากนั้นมันจะเด้งไป Wallet of Satashi ที่เรา connect ไว้ ตรวจสอบธุรกรรม เรียบร้อยแล้วกด Send เขียว ๆ รอสักแปป เมื่อสำเร็จแล้วเราจะเห็นหน้าเขียว ๆ แบบนี้เลย
ถึงเงินอาจจะไม่ได้มากมายอะไรมัก ก็เป็นสิ่งที่ platform web2 ให้ไม่ได้เลยนะ กับความรู้สึกดี ๆ แบบนี้ ที่ลง content แล้วมีคนมา Zap ให้ ในขนาดที่ platform web2 ไม่มีคนกด send gift ให้เลย ฮือออออออออออ
Client App อื่น ๆ ที่น่าสนใจ
จริง ๆ เราจะใช้แอพ Client อื่น ๆ เล่น Nostr ได้นะ เพราะว่า Relay สามารถใช้ร่วมกันได้ในหลาย ๆ แอพ
ก่อนที่จะมีแอพ Wherostr เขาจะแนะนำกันว่า
ถ้าใช้ iOS ใช้แอพ Damus ส่วนชาว Android ใช้ Amethyst
ตอนนั้นที่เราลองเล่นเอง เราสร้าง account ผ่าน Iris แหละ เพราะ ก่อนหน้าที่เรารู้จัก Wherostr และเข้าใจ Nostr เราได้ลองกับ Nostr browser นึงที่ชื่อว่า Spring ในนั้นมีหลาย ๆ client ให้เราจิ้มเล่น และแอพนี้มีเฉพาะ Android เท่าน้านนน
สายเขียนบล็อก: Habla, Yakihonne, Npub.pro
ส่วนสายสตรีม: Zap.Stream
ส่วน Client อื่น ๆ สามารถเข้าไปดูได้ที่นี่ ซึ่งในนี้เป็นแค่ส่วนหนึ่งเท่านั้นแหละ https://nostrapps.com/
เริ่มใช้งานบนคอม
หลาย ๆ client นอกจากจะมีเป็นแอพบนมือถือ ยังมีเป็นหน้าเว็บไซต์อีกด้วย
สิ่งที่ต้องมีเพิ่มเติม คือ extension ที่ชื่อว่า Nostr Connect เราใส่ private key เข้าไปในนั้น พอเวลา sign transection ตัว extension จะไม่เอา private key ของเราตรง ๆ
หลังจากติดตั้ง extension ตัวนี้แล้ว การใช้งาน สมมุติเข้าเว็บ Wherostr กดปุ่ม Login แล้วจะมีหน้า popup เด้งมา ให้กด Login with Nostr extension แล้วจะขึ้นหน้าต่างให้เรา sign สองอัน คือ อ่าน public key กับ Relay
เมื่อ login เรียบร้อยแล้ว สมมุติเราสร้างโพสบนเว็บ Wherostr จามปกติ เรียบร้อยแล้วกด Post เขาจะให้เรา sign event ว่าเราเป็นคนสร้าง post นี้นะ เราจะเห็น transaction ออกมาเป็น json เลย ตามมาตรฐาน NIP-01
ปล. จริง ๆ จะกดไม่ให้เปิด popup ก็ได้นะ แต่เราอยากเปิดไว้เอง เอาไว้ check
และ extension อีกตัวที่มีคนแนะนำก่อนหน้านี้คือ Alby ตอนนี้ไม่ต้องไปขอ access code ก่อนถึงจะใช้ได้ สามารถเข้าไปสมัครที่นี่ได้เลย
https://getalby.com/
สุดท้าย ก็หวังว่าทุกคนรู้จัก Nostr กันไม่มากก็น้อยเนอะ
ถ้าใครอยากติดตามเราบน Nostr สามารถเปิดแอพ Wherostr หรืออื่น ๆ เพื่อ scan QR Code นี้ได้ หรือ copy public key หรือ Nostr user ไปหาได้น้า
แน่นอนในนี้เป็นการแท็กเราเอง nostr:npub1h9ls03lflhvgzzmkf6nsymspw3auh0f3d97c02e5l4edn2waefcszlq9qf
Reference
- https://nostr.com/
- https://github.com/nostr-protocol/nostr
- https://rightshift.to/2023/kp/14251/
- จริง ๆ ก็เอามาจากงาน Thailand Bitcoin Conference 2024 ที่เขียนไปด้วยแหละ แต่บวกกับการใช้งานจริงด้วย https://www.mikkipastel.com/thailand-bitcoin-conference-2024/
-
@ 29af23a9:842ef0c1
2025-01-24 09:28:37A Indústria Pornográfica se caracteriza pelo investimento pesado de grandes empresários americanos, desde 2014.
Na década de 90, filmes pornográficos eram feitos às coxas. Era basicamente duas pessoas fazendo sexo amador e sendo gravadas. Não tinha roteiro, nem produção, não tinha maquiagem, nada disso. A distribuição era rudimentar, os assinantes tinham que sair de suas casas, ir até a locadora, sofrer todo tipo de constrangimento para assistir a um filme pornô.
No começo dos anos 2000, o serviço de Pay Per View fez o número de vendas de filmes eróticos (filme erótico é bem mais leve) crescer mas nada se compara com os sites de filmes pornográficos por assinatura.
Com o advento dos serviços de Streaming, os sites que vendem filmes por assinatura se estabeleceram no mercado como nunca foi visto na história.
Hoje, os Produtores usam produtos para esticar os vasos sanguíneos do pênis dos atores e dopam as atrizes para que elas aguentem horas de gravação (a Série Black Mirror fez uma crítica a isso no episódio 1 milhão de méritos de forma sutil).
Além de toda a produção em volta das cenas. Que são gravadas em 4K, para focar bem as partes íntimas dos atores. Quadros fechados, iluminação, tudo isso faz essa Indústria ser "Artística" uma vez que tudo ali é falso. Um filme da Produtora Vixen, por exemplo, onde jovens mulheres transam em mansões com seus empresários estimula o esteriótipo da mina padrão que chama seu chefe rico de "daddy" e seduz ele até ele trair a esposa.
Sites como xvídeos, pornHub e outros nada mais são do que sites que salvam filmes dessas produtoras e hospedam as cenas com anúncios e pop-ups. Alguns sites hospedam o filme inteiro "de graça".
Esse tipo de filme estimula qualquer homem heterosexual com menos de 30 anos, que não tem o córtex frontal de seu cérebro totalmente desenvolvido (segundo estudos só é completamente desenvolvido quando o homem chega aos 31 anos).
A arte Pornográfica faz alguns fantasiarem ter relação sexual com uma gostosa americana branquinha, até escraviza-los. Muitos não conseguem sair do vício e preferem a Ficção à sua esposa real. Então pare de se enganar e admita. A Pornografia faz mal para a saúde mental do homem.
Quem sonha em ter uma transa com Lana Rhodes, deve estar nesse estágio. Trata-se de uma atriz (pornstar) que ganhou muito dinheiro vendendo a ilusão da Arte Pornografica, como a Riley Reid que só gravava para grandes Produtoras. Ambas se arrependeram da carreira artística e agora tentam viver suas vidas como uma mulher comum.
As próprias atrizes se consideram artistas, como Mia Malkova, chegou a dizer que Pornografia é a vida dela, que é "Lindo e Sofisticado."
Mia Malkova inclusive faz questão de dizer que a industria não escravisa mulheres jovens. Trata-se de um negócio onde a mulher assina um contrato com uma produtora e recebe um cachê por isso. Diferente do discurso da Mia Khalifa em entrevista para a BBC, onde diz que as mulheres são exploradas por homens poderosos. Vai ela está confundindo o Conglomerado Vixen com a Rede Globo ou com a empresa do Harvey Weinstein.
Enfim, se você é um homem solteiro entre 18 e 40 anos que já consumiu ou que ainda consome pornografia, sabia que sofrerá consequências. Pois trata-se de "produções artísticas" da indústria audiovisual que altera os níveis de dopamina do seu cérebro, mudando a neuroplasticidade e diminuindo a massa cinzenta, deixando o homem com memória fraca, sem foco e com mente nebulosa.
Por que o Estado não proíbe/criminaliza a Pornografia se ela faz mal? E desde quando o Estado quer o nosso bem? Existem grandes empresarios que financiam essa indústria ajudando governos a manterem o povo viciado e assim alienado. É um pão e circo, só que muito mais viciante e maléfico. Eu costume dizer aos meus amigos que existem grandes empresários jvdeus que são donos de grandes Produtoras de filmes pornográficos como o Conglomerado Vixen. Então se eles assistem vídeos pirateados de filmes dessas produtoras, eles estão no colo do Judeu.
-
@ 141daddd:1df80a3f
2025-01-24 09:24:29When we talk about escaping the matrix, the phrase often conjures images of dramatic physical change—abandoning the city for a remote wilderness, building a self-sufficient life in a village, or retreating to the mountains to escape the noise of modernity. But this interpretation, while romantic, misses the essence of what it truly means to break free. Escaping the matrix is not about fleeing the material world. It is not about geography or lifestyle. It is, above all, a mental and spiritual transformation.
Even in the movie The Matrix, which serves as a powerful allegory for this concept, Morpheus tells Neo that the prison he lives in is not a physical one. It is a prison of the mind. This statement cuts to the core of the matter: the matrix we seek to escape is not an external construct but an internal one. It is the web of beliefs, fears, and limitations that bind us. The bars of this prison are forged from societal expectations, inherited ideologies, and the relentless pursuit of material validation. To escape the matrix, we must first break free from these mental chains.
The Real Battle: Within the Mind
The material world undoubtedly imposes certain limitations—laws, systems, and structures that shape our daily lives. And while it is possible to challenge and even overcome some of these external barriers, the greatest battle is fought within. The matrix is not something you can physically run from because it exists in your perception, in the way you interpret and interact with the world.
True freedom begins with elevating your consciousness. It is not about rejecting the material matrix but transcending it. You do not escape by leaving the system behind; you escape by rising above it. This shift in perspective allows you to see the matrix for what it is—a construct, a playground, a stage upon which life unfolds. When you reach this level of awareness, you are no longer a passive participant, a consumer of someone else’s design. Instead, you become a co-creator of your reality.
Living Above the Matrix
To live above the matrix is to observe it without being consumed by it. You recognize its rules and structures, but you are no longer bound by them. You begin to shape your life not according to the desires and expectations of others but according to your own higher purpose. This is not escapism; it is empowerment. You are still in the matrix, but you are no longer of it.
This shift transforms the matrix from a prison into a playground. You engage with it consciously, using it as a tool to create a more fulfilling life. You are no longer a pawn in someone else’s game but a player in your own. By breaking free from the mental constructs that once confined you, you reclaim your power and your agency.
The Path to Co-Creation
Escaping the matrix is not about rejecting the material world but about redefining your relationship with it. It is about moving from a state of consumption to one of creation. When you elevate your consciousness, you stop being a passive recipient of the matrix’s programming. Instead, you begin to actively participate in shaping it. You become a co-creator, weaving your own vision into the fabric of reality.
This process requires introspection, courage, and a willingness to let go of old paradigms. It is not an easy path, but it is a liberating one. By breaking free from the prison of the mind, you unlock the potential to live a life of purpose, creativity, and fulfillment.
The Choice is Yours
The matrix is not something to be feared or fled from. It is a challenge, an opportunity, a mirror reflecting your own inner state. To escape it is not to abandon the world but to transcend it. The question is not whether the matrix exists but whether you will allow it to define you. Will you remain a prisoner of its illusions, or will you rise above and become a co-creator of your reality?
The choice, as Morpheus would say, is yours.
-
@ 83279ad2:bd49240d
2025-01-24 09:15:37備忘録として書きます。意外と時間がかかりました。全体で1時間くらいかかるので気長にやりましょう。 仮想通貨取引所(販売所ではないので、玄人が使えばお得らしい)かつBitcoinの送金手数料が無料(全ての取引所が無料ではない、例えばbitbankは0.0006bitcoinかかる)なので送金元はGMOコインを使います。(注意:GMOコインは0.02ビットコイン以下は全額送金になってしまいます) 今回はカストディアルウォレットのWallet of Satoshiに送金します。 以下手順 1. GMOコインでbitcoinを買います。 2. GMOコインの左のタブから入出金 暗号資産を選択します。 3. 送付のタブを開いて、+新しい宛先を追加するを選択します。 4. 送付先:GMOコイン以外、送付先ウォレット:プライベートウォレット(MetaMaskなど)、受取人:ご本人さま を選んで宛先情報の登録を選ぶと次の画面になります。
5. 宛先名称にwallet of satoshi(これはなんでも良いです わかりやすい名称にしましょう) wallet of satoshiを開いて、受信→Bitcoin On-Chainからアドレスをコピーして、ビットコインアドレスに貼り付けます。
6. 登録するを押します。これで送金先の登録ができました。GMOコインの審査がありますがすぐ終わると思います。 7. ここから送金をします。送付のタブから登録したビットコインの宛先リストwallet of satoshiを選択し、送付数量と送付目的を選択して、2段階認証をします。
8. 実行を押せば終わりです。もうあなたがやることはありません。送金が終わるのを40分くらい眺めるだけです。
8. 取引履歴のタブから今の送金のステータスが見れます。
9. 15分くらい待つとステータスが受付に変わります。
10. 20分くらい待つとトランザクションIDが表示されます。
この時点からwallet of satoshiにも送金されていることが表示されます。(まだ完了はしていない)
11. ステータスが完了になったら送金終わりです。
wallet of satoshiにも反映されます。
お疲れ様でした!
-
@ da0b9bc3:4e30a4a9
2025-01-24 08:19:50Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/862063
-
@ fbf0e434:e1be6a39
2025-01-24 07:31:20Hackathon 总结
EDU Chain Hackathon: Semester 1 在2024年圆满结束,活动参与人数众多,成果显著。该活动由 Open Campus 主办,共有 725 个项目参赛,吸引了 4,672 名开发者,奖池达 $200,000。经过评选,共有 20 位获奖者分别来自两个主要类别——DeFi 和基础设施,还有 12 位获奖者来自其他四个类别。
评审标准重点关注生态系统影响、创新性和可扩展性,由 Animoca Brands 和 Open Campus 等组织的代表进行评估。获奖者可加入 Open Campus 加速器计划中的 EDU Chain 开发者群,获得 DAO 提案支持,并通过 Forbes 等平台获得媒体曝光。他们还可以加入一个专门的 Discord 频道与评委交流,每个项目有高达 $100,000 的潜在资金支持机会。
此次 hackathon 是 EDU Chain 上去中心化应用程序开发的关键事件。EDU Chain 是 Arbitrum Orbit Stack 内的一个 L3 Rollup,旨在加强基于区块链的教育解决方案。来自 ForbesWeb3 和 ApeCoin 等公司的赞助突显出区块链在教育行业中的日益融合,加强了民主化教育的更广泛使命。
Hackathon 获奖者
DeFi 奖项获奖者
- SailFish veDEX:这个去中心化交易所建立在 Open Campus 上,利用 Vote-Escrow 和 (3,3) 博弈论与用户分享交易费用。它提高了收益机会,运行在 Sepolia 网络上。
- Blend-lending protocol for educhain:提供以 $EDU 代币为抵押的教育贷款,提供诸如 USDT 的稳定资产。该协议采用由 $EDU 代币持有者治理的安全透明智能合约。
- Streambill:利用 Sablier 协议和 Request Network 为自由职业者提供实时支付,增强发票和支付清晰度。
- stakedu:一个 $EDU 代币的抵押平台,提供奖励和动态分配管理,增加 EDUchain 生态系统的参与度。
- P2P Lending and Borrowing Protocol for Ordinals Powered by EduChain:提供以 NFT 为抵押的贷款,利息最高达 350%,其智能合约可跨网络结合 Ordinals。
基础设施 dApps 奖项获奖者
- create-edu-dapp:为 EduChain 上的 dApp 开发提供 CLI 工具,支持 Next.js、Hardhat 和 Foundry,以便进行无缝测试和部署。
- poapedu:将学习认证集中化为链上 NFT,借助全面的技能映射帮助职业规划。
- Grasp Academy:此基于区块链的 LMS 通过 NFT 奖励用户参与,整合教育融资和个性化 AI 工具。
- Blitz Protocol:提供实时区块链数据访问、可扩展后端的数据信息解决方案,专为 Open Campus 网络优化。
- ThrustPad ILO :一个去中心化的筹资平台,利用代币锁定和抵押机制支持教育技术计划。
EduFi 奖项获奖者
- Campus Arc BETA:为全球学生连接的协作在线学习,专注于基于项目的体验,结合 Web2 和 Web3 框架。
- DcodeBlock:一个游戏化平台,帮助开发者通过任务和 AI 增强学习从 Web2 过渡到 Web3。
- Course3:一个去中心化的课程市场平台,采用 Web3 技术在课程之间实现安全验证。
- CourseCast:管理教育广告活动,提供访问者分析工具,利用 Edu 代币和零知识证明进行验证。
- Vault:提供小额费用和跨链兼容的教育金融平台,通过区块链促进学费和薪资支付。
Earn 奖项获奖者
- OpenTaskAI:通过区块链支持的市场将 AI 自由职业者与全球机会连接,使用智能合约保障安全。
- [Ludium] Edu Bounty Management System:通过透明的链上合约简化教育悬赏管理的任务验证和支付。
- PRISM: Decentralised Content Ecosystem:将数字内容标记化为 NFT,从而增强创作者和读者的变现和来源可靠性。
- According.Work:自动化开源贡献的奖励分配,通过 GitHub 集成和区块链保障透明度。
- edBank:建立以 EDU 资产支持的稳定币系统,提供灵活的铸币和借款服务。
Learn 奖项获奖者
- Proof of Learn:一个互动的 Web3 学习平台,提供基于区块链的任务及 POAP 奖励,重视实践概念的部署。
- Sorted Wallet:为功能手机用户提供加密超级应用,提供资产存储和转换功能,以增加金融访问。
- DAO UNI 3.0:一个由 DAO 治理的去中心化大学,提供基于代币的课程和互动虚拟环境。
- AI Tutor:通过个性化 AI 导师和 NFT 证书提高教育体验,实现可验证的成就。
其他奖项获奖者
- EDUCHAIN Community Faucet:通过在 Open Campus 上统一 token faucet 简化多平台的代币测试。
- Lore Network:通过基于区块链的凭证和 AI 学习工具将在线内容转化为全球教育中心。
- DDream:设计用于模块化开发的开源 AI 集成游戏引擎,着重于社区所有权。
- LPU Name Service:为管理基于 NFT 的学术凭证提供安全的 Web3 域名服务。
- MusiCoinCity:将区块链与主题音景结合,以促进对环境活动的捐款,确保通过智能合约实现透明。
有关这些项目的更多详细信息,请访问 Dorahacks Hackathon 页面。
关于主办方
Open Campus
Open Campus 是一个由社区驱动的协议,旨在通过去中心化教育决策来赋能教育者、内容创作者、家长和学生。该计划鼓励教育工作者根据学生需求定制教材,创造一个协作的环境。Open Campus 还通过其“Bringing Education On-Chain”计划为全球有影响力的教育者开辟新的金融渠道,将教育与区块链技术相结合,强调学习方法的创新。作为教育技术领域的积极参与者,Open Campus 一直致力于提高全球教育的可及性和有效性。
-
@ ed84ce10:cccf4c2a
2025-01-24 07:22:08Hackathon Summary
The EDU Chain Hackathon: Semester 1 concluded with substantial participation and noteworthy outcomes. Hosted by Open Campus, the event featured 725 projects and attracted 4,672 developers, offering a $200,000 prize pool. Twenty winners were selected across two primary categories—DeFi and Infrastructure—and an additional 12 winners were chosen from four other categories.
Judging criteria focused on ecosystem impact, innovation, and scalability, with evaluations conducted by representatives from organizations like Animoca Brands and Open Campus. Winning participants were offered an opportunity to join the EDU Chain Developer Cohort within the Open Campus Accelerator Program, support for DAO proposals, and media exposure through platforms such as Forbes. They also gained access to a dedicated Discord channel with the judges, with potential funding sponsorships reaching $100,000 per project.
This hackathon was a pivotal event for the development of decentralized applications on the EDU Chain, an L3 Rollup within the Arbitrum Orbit Stack, aimed at enhancing blockchain-based educational solutions. Sponsorship from companies like ForbesWeb3 and ApeCoin highlighted the increasing integration of blockchain in the education sector, reinforcing the broader mission of democratizing education.
Hackathon Winners
DeFi Prize Winners
- SailFish veDEX: This decentralized exchange on Open Campus shares trading fees with users, utilizing Vote-Escrow and (3,3) game theory. It improves yield opportunities and operates on the Sepolia network.
- Blend-lending protocol for educhain: Facilitates educational loans backed by $EDU tokens, offering stable assets like USDT. The protocol features secure, transparent smart contracts governed by $EDU token holders.
- Streambill: Enables real-time payments for freelancers using the Sablier protocol and Request Network, enhancing invoicing and payment clarity.
- stakedu: A staking platform for $EDU tokens that offers rewards and dynamic allocation management, boosting engagement within the EDUchain ecosystem.
- P2P Lending and Borrowing Protocol for Ordinals Powered by EduChain: Provides NFT-backed loans with interest up to 350%, supported by smart contracts that integrate Ordinals across networks.
Infrastructure dApps Prize Winners
- create-edu-dapp: Offers a CLI tool for dApp development on EduChain, supporting Next.js, Hardhat, and Foundry to facilitate seamless testing and deployment.
- poapedu: Centralizes learning certifications into on-chain NFTs, aiding in career planning through comprehensive skill mapping.
- Grasp Academy: This blockchain-based LMS rewards user participation with NFTs and incorporates educational financing and personalized AI tools.
- Blitz Protocol: A data indexing solution delivering real-time blockchain data access with a scalable backend tailored for the Open Campus network.
- ThrustPad ILO: A decentralized fundraising platform that utilizes token-locking and staking mechanisms to support educational technology initiatives.
EduFi Prize Winners
- Campus Arc BETA: Connects students globally for collaborative e-learning, focusing on project-based experiences with integrated Web2 and Web3 frameworks.
- DcodeBlock: A gamified platform assisting developers in transitioning from Web2 to Web3 through missions and AI-enhanced learning.
- Course3: A decentralized marketplace for courses that enables direct interaction between creators and students, using Web3 technologies for secure verification of courses.
- CourseCast: Manages educational ad campaigns with tools for visitor analytics, utilizing Edu tokens and zero-knowledge proofs for verification.
- Vault: Provides a financial platform for education with minimal fees and cross-chain compatibility, facilitating tuition and salary payments via blockchain.
Earn Prize Winners
- OpenTaskAI: Connects AI freelancers with global opportunities through a secure blockchain-enabled marketplace using smart contracts.
- [Ludium] Edu Bounty Management System: Streamlines educational bounty management with transparent, on-chain contracts for task verification and payments.
- PRISM: Decentralised Content Ecosystem: Tokenizes digital content as NFTs, thereby enhancing monetization and provenance for creators and readers.
- According.Work: Automates reward distribution for open-source contributions, guaranteeing transparency via GitHub integration and blockchain.
- edBank: Builds a stablecoin system backed by EDU assets, facilitating minting and borrowing for financial flexibility.
Learn Prize Winners
- Proof of Learn: An interactive Web3 learning platform offering blockchain-based quests with POAP rewards and a focus on practical concept deployment.
- Sorted Wallet: Increases financial access for feature phone users with a crypto super app offering asset storage and conversion features.
- DAO UNI 3.0: A DAO-governed decentralized university providing token-based access to courses and interactive virtual environments.
- AI Tutor: Enhances educational experiences through personalized AI tutors and NFT certificates for verifiable achievements.
Miscellaneous Prize Winners
- EDUCHAIN Community Faucet: Simplifies token testing across multiple platforms by unifying token faucets on Open Campus.
- Lore Network: Transforms online content into a global educational hub by using blockchain-secured credentials and AI learning tools.
- DDream: An open-source, AI-integrated gaming engine designed for modular development with a focus on community ownership.
- LPU Name Service: Provides Web3 domain services to securely manage NFT-based academic credentials.
- MusiCoinCity: Combines blockchain with themed soundscapes to facilitate donations for environmental causes, ensuring transparency via smart contracts.
Further details on these projects are available on the Dorahacks Hackathon page.
About the Organizer
Open Campus
Open Campus is a community-driven protocol focused on empowering educators, content creators, parents, and students by decentralizing decision-making in education. The initiative encourages a collaborative environment where educators can customize materials according to students’ needs. Open Campus also introduces new financial avenues for impactful educators globally through its initiative "Bringing Education On-Chain," which combines education with blockchain technology to emphasize innovation in learning methodologies. As an active participant in the education technology sector, Open Campus consistently seeks to enhance educational accessibility and effectiveness worldwide.
-
@ 16d11430:61640947
2025-01-24 05:16:29Part One: "A Crackle in the Air"
Prologue
The year is 2147. Humanity, having colonized parts of the solar system, has finally intercepted a signal from the stars. What began as a faint electromagnetic anomaly turned into a full-scale communication effort. The signal, originating from a neighboring star system, revealed the existence of Homo Electromagnus—a humanoid xenospecies whose evolution was shaped by their mastery of bioelectricity.
Diplomatic efforts stretched for decades, culminating in a historic agreement: a controlled introduction of Homo Electromagnus to Earth. The goal was to initiate peaceful cohabitation while learning about their bioelectric capabilities. However, as the first contact unfolded, humanity’s carefully laid plans began to falter under the weight of unforeseen consequences.
Chapter One: The Arrival
The ship Arc Synapse entered Earth’s orbit, carrying the first delegation of Homo Electromagnus—ten individuals, led by their elder representative, Xeylan. The ship itself was a marvel, powered by an intricate bioelectric system that pulsed like a living heart. Xeylan had explained, through translated signals, that their species had evolved to coexist symbiotically with technology, manipulating it with the precision of thought.
The landing site was a sterile, controlled environment constructed by humans—an isolated biosphere outside the Mojave Desert. Security was tight, with EMP shielding built into every structure. Human diplomats, engineers, and scientists gathered, eager to welcome their alien counterparts.
As the delegation descended from their ship, shimmering arcs of electricity crackled along their skin. Their bioluminescent eyes glowed faintly, scanning the crowd. The tension was palpable.
Dr. Elena Voss, a leading xenobiologist, stepped forward to greet Xeylan. “On behalf of Earth, I welcome you to our home,” she said, her voice steady despite the charged air around them.
Xeylan tilted their head, their voice vibrating through a translator. “We come in peace and curiosity. Let us learn from one another.”
Chapter Two: First Contact
Initial interactions went smoothly. The Homo Electromagnus delegation demonstrated their ability to manipulate electromagnetic waves, repairing a human drone in seconds by “rebooting” it with a controlled bioelectric pulse. In exchange, humans shared their advancements in quantum computing and nanotechnology.
But the problems began as soon as the delegation stepped outside the controlled environment.
Incident One: The Streetlights. A convoy took the delegation to an observation site in Las Vegas. As they entered the city outskirts, the lights flickered, dimmed, and, in some cases, went out entirely. Xeylan apologized, explaining that their bioelectric fields could unintentionally interfere with poorly shielded systems. What had been designed as a public relations victory—showing the delegation waving to crowds—turned into an eerie blackout. News feeds lit up with headlines about "alien-induced outages."
Incident Two: Personal Devices. During a dinner meeting, one of the delegation members, Tayrin, inadvertently disabled several diplomats’ personal devices. Phones, tablets, and even biometric implants malfunctioned within a five-meter radius of their seat. Tayrin apologized profusely, but the diplomats were visibly shaken. The United Nations liaison whispered to Dr. Voss, “This can’t happen in populated areas. Imagine the chaos if they walked through Manhattan.”
Incident Three: Human Physiology. On the third day, a technician monitoring the delegation collapsed during a routine interaction. Medical scans revealed irregular heart rhythms, likely caused by electromagnetic interference. The Homo Electromagnus emitted low-level pulses naturally, which were harmless to their kind but could disrupt human pacemakers and nervous systems.
Dr. Voss confronted Xeylan privately. “This isn’t working. We can’t control the effects you’re having on our systems—and now, on us. How do we move forward?”
Xeylan’s gaze was steady, their voice calm. “Your world is fragile. Ours is… intense. We must learn balance, but that requires trust and time.”
Chapter Three: Escalation
The media frenzy around the incidents escalated. Conspiracy theories flourished, claiming the Homo Electromagnus were intentionally disabling human infrastructure as a prelude to invasion. Protestors gathered outside the Mojave biosphere, demanding the delegation be sent back.
Inside the biosphere, tensions grew as well. Human scientists, frustrated by the constant disruptions, began installing new shielding and protocols. The delegation, meanwhile, grew restless. Tayrin expressed frustration to Xeylan. “They fear us. How can we coexist when their machines collapse under our presence?”
Dr. Voss proposed an experiment: a trip to a remote island, away from human technology, to test coexistence in a less controlled environment. The delegation agreed, seeing it as a chance to prove their good intentions.
But even on the island, issues arose. The group discovered that Homo Electromagnus bioelectric fields disrupted animal migration patterns and aquatic ecosystems. Whales stranded themselves nearby, confused by the alien electromagnetic signals. Xeylan looked out over the beach, their luminous eyes dim. “Even your world’s life is tied to invisible fields. We have disturbed it.”
Chapter Four: The Spark of Conflict
Back in the Mojave, the situation deteriorated further. An accidental bioelectric pulse from Tayrin during a training demonstration overloaded the biosphere’s EMP shielding. Half the facility’s systems went offline, including oxygen regulation. Panic ensued as scientists and diplomats scrambled to evacuate.
The media caught wind of the event before it was contained. Images of choking researchers and flickering lights spread across every network. The narrative shifted from “peaceful contact” to “alien threat.” Governments began discussing whether to terminate the experiment entirely and send the delegation away.
Xeylan called an emergency meeting with Dr. Voss and the diplomatic team. “We did not come to harm. But we see now… your world is incompatible with our existence.”
Dr. Voss shook her head. “No, it’s not incompatible. Just… unprepared. This isn’t failure. It’s a challenge.”
But Xeylan was unconvinced. “A challenge may become a threat. You fear what you cannot control. And we fear what we might break.”
Chapter Five: The Breaking Point
The story culminates in a public crisis. One member of the delegation, overwhelmed by stress and human hostility, emits an uncontrolled EMP during a protest near the Mojave facility. The pulse disables nearby drones and vehicles, and several protesters are injured in the chaos. This act, though unintentional, pushes public opinion to the brink.
The United Nations calls for the delegation to be escorted back to their ship and removed from Earth, at least temporarily. Dr. Voss pleads for more time, but the political pressure is insurmountable.
As the delegation boards their ship, Xeylan pauses to speak to Dr. Voss. “We came to learn, but perhaps we have only taught. You are not ready for us, and we are not ready for you. But someday…”
With that, the Arc Synapse ascends, leaving Earth in silence. Humanity is left grappling with the challenges of interspecies contact and what it means to coexist with beings fundamentally different from themselves.
Epilogue
In the aftermath, debates rage about whether the contact was a success or a failure. Dr. Voss writes in her journal: "They didn’t disrupt our world. They revealed its fragility. Maybe that’s the lesson we needed."
Above Earth, the Homo Electromagnus watch from orbit, waiting for humanity to decide its next move.
To Be Continued…
-
@ f7524ebe:58863422
2025-01-24 05:15:11I started off my journey as a poor innocent developer thinking that the world of open source code distribution in the JVM would be simple. 2 days later and I just finally released code after setting up my own custom Maven server on a DigitalOcean droplet. To be fair I was too lazy to go through the whole process of setting up a Maven central repo. And some of you might have thought about Jitpack which would have been an option if I was doing standard JVM libraries, but I'm releasing Kotlin Multiplatform libraries and Jitpack builds your libraries on their server for distribution, which makes it so that building iOS binaries are not supported.
Every time I looked into how I could possibly distribute my libraries I found it to be such an uphill battle that I'd just quit. This most recent time I was determined. I figured there had to be a reasonable way to do it otherwise there wouldn't be like millions of libraries out there for Java. The God's honest truth is that sadly there is not a simple mainstream way.
After a long jacuzzi with my phone in hand reading every possible thing I could find on Maven, I, very fortunately, stumbled across this blog post which describes the awesomeness that is Reposilite. This is an awesome open source maven hosting website that you can self host. With the ability to run in docker, it's like a 3 minute process to get up and running. Huge kudos to the team that built it. Seriously it's the only project that actually seems to make some sense with the exception of Jitpack in the JVM dependency management ecosystem. How is Java a top 5 languages in the world and they have the most antiquated dependency management system.
I don't really want this post to be a tutorial on setting up Reposilite because they actually do a great job of explaining that in their docs, I do however want to cover a few supplemental elements that took me a little bit to find namely how to setup publishing properly in your project.
How to Configure Your Gradle Build for Publishing
Note: I'm not an expert on this, I am still learning, so if there's a better way feel free to let me know, but this is what worked for me.
When setting up a Kotlin Multiplatform library I have a block like this in my
gradle.build.kts
. Do note this is Kts flavored Gradle not groovy, so your script might be a bit different.```kotlin plugins { ... id("maven-publish") // needed to get the maven publish command }
group = "com.somegroupname" version="0.1.0" // this will be the version of your library when it's in your maven repo
// this is the block responsible for pushing your library up to your maven repo publishing { val mavenUser: String by project val mavenPassword: String by project
repositories { maven { setUrl("https://yourDomain/releases") authentication { create("basic", BasicAuthentication::class.java) } credentials { username = mavenUser password = mavenPassword } } }
} ```
Do note that the
mavenUser
andmavenPassword
variables are coming from my~/.gradle/gradle.properties
file. This way it's highly unlikely that you'd ever accidentally commit those credentials to a repo. and we use the delegateby project
as nice syntactic sugar to retrieve those values automatically.with this configuration block added to your gradle build file you should be able to run the
./gradlew publish
command. Or you can do it from your IDE... However you prefer and this will push your library live.Also note if you are running this on a non secured http server you have to add a bit more code on the side where you are trying to pull your dependencies. I wouldn't recommend having a non secure HTTP server, but if you are like me, and wanted to test things on localhost before deploying to a server it is useful to do so.
here's how to include it when over an unsecure http connection:
kotlin repositories { ... maven("http://localhost:3000") { // or whatever port you set your local server to run on isAllowInsecureProtocol = true } }
-
@ f7524ebe:58863422
2025-01-24 05:12:52Photo by Jainath Ponnala on Unsplash
About a year ago I decided to setup a blog on a digital ocean server. I mostly did this to get back into the dev ops world since I mostly live as a programmer. I know these skillsets are somewhat related, but I've mostly focused on building coding skills that last 8 years with some occasional dabbling in docker. In this post I will walk you through how I configured my web server that runs a next.js blog.
Some elements that make my setup really cool and interesting:
- I setup a build system that automatically triggers when I push new code to GitHub on a raspberry pi which hosts a local container registry.
- I setup a local container registry on my Raspberry PI
- I setup dynamic DNS so that my digital ocean server can talk to my raspberry pi even though my IP address is not static. I'll walk you through how to do this.
- I setup my digital ocean server to automatically pull the latest docker image when my container registry updates using watch tower
- I setup a self hosted analytics system that's way more simple than google analytics, called Plausable
- My blog is also somewhat cool intrinsically since it parses markdown into static pages that load very fast, but I'll link you to my inspiration rather than writing a whole writeup on this.
Github Actions and simple CI
I will start with my automated build system and my inspiration for it. I have used a few different CI systems over the years, mostly Gitlab CI, which is honestly awesome, but it's not only OP for this project, but I'm also not using gitlab to host the code, so I figured why not play with GitHub web-hooks since all I really need is a way to trigger a docker build when new code is pushed.
How does this work?
so basically you will need to write a simple web server for this. I'm using Python Flask for this. This server just needs to handle a single route which you set. And this route will get called by GitHub whenever you push code to the project you configured it for. All I do in this route is validate that GitHub was in fact the caller.. and then I call a local script which setups the docker build.
This is what my CI server code looks like:
```py from flask import Flask, request, abort import hmac import subprocess
app = Flask(name) GITHUB_SECRET = '
' @app.route('/blog-webhook', methods=['POST']) def webhook(): signature = request.headers.get('X-Hub-Signature') sha, signature = signature.split('=') # we create a digest using hmac to validate that github was the caller # we set a shared secret which is stored in GITHUB_SECRET. If our secrets validate # then we continue.. otherwise we abort with a 403 mac = hmac.new(bytearray(GITHUB_SECRET , 'ascii'), msg=request.data, digestmod='sha1') if not hmac.compare_digest(mac.hexdigest(), signature): abort(403)
# call our local shell script which pulls our git and builds a new docker version. subprocess.call(['./blog-deploy.sh']) return 'OK', 200
if name == 'main': app.run(host="0.0.0.0", port=5000) ```
Note we could just run this from a shell, but that would only run as long as your shell is open, so we need a way to have this server remain up. The advanced way to do this is using uWSGI which I think acts as a revers proxy (someone correct me if I'm wrong). But in our case we are going to do this the simple way which is just creating a service which will auto restart when our system restarts. we'll use systemd
sh sudo vi /etc/systemd/system/my_python_service.service
```sh [Unit] Description=My Python Script Service After=network.target
[Service] Type=simple User=YOUR_USERNAME WorkingDirectory=/path/to/your/script ExecStart=/usr/bin/python3 /path/to/your/script.py Restart=always RestartSec=10
[Install] WantedBy=multi-user.target ```
Description
: A brief description of your service.After
: This ensures the network is available before starting your script.Type
: The type of service.simple
is commonly used for services that don't fork.User
: The user that will run the script.WorkingDirectory
: Directory where your script resides.ExecStart
: Command to start your service.Restart
: This will restart your service if it exits for any reason.RestartSec
: Time to sleep before restarting the service.
Once you've saved and exited the editor, you'll need to inform
systemd
of the new service:sh sudo systemctl daemon-reload
Enable and Start Your Service
Now, enable your service so that it starts on boot:
sh sudo systemctl enable my_python_service.service
And start it:
sh sudo systemctl start my_python_script.service
Check the Status of Your Service
You can check the status of your service with:
sh sudo systemctl status my_python_script.service
now that we have a service for our hook we have assurance that this server, assuming it's stable, will remain up. Because, in my case, this server is running on my Raspberry Pi on my home internet.. I have to setup port forwarding to this web server since it's running behind NAT.
A Quick Asside on NAT
I know that thee's probably a verity of experience levels to my readers of this article. feel free to skip over this if you already know about NAT. NAT stands for Network Address Translation. Basically all routers use NAT that connect to IPv4. The reason for this is because there are only around 4 billion IP v4 address and there are significantly more than that number of devices on the internet. Our local network can have lots of devices on it, but to the external internet it looks like all of these devices are one IP. So what happens is whenever a service needs to conect to a specific computer on your network... you have to tell your router to forward that specific traffic to a specific computer on a specific port. This is called port forwarding. So in our case we need to forward all traffic on port 5000 to our Raspberry Pi. Note that port forwarding can open your network up to attack and vulnerabilities, so be cautious when you do this and seek advice from others.
What Does Our Deploy Script Look Like?
```sh
!/bin/bash
cd /route/to/your/blog/repo
Fetch the latest tags and commits from the repo
git fetch --all --tags
Checkout the commit associated with the latest tag
latest_tag=$(git describe --tags $(git rev-list --tags --max-count=1)) git checkout $latest_tag
Get the latest Git tag (redundant but kept for clarity)
git_tag=$(git describe --tags)
If there's no tag for the current commit, you might want to handle this case.
For this example, I'll default to a "latest" string. You can adjust as needed.
if [ -z "$git_tag" ]; then git_tag="latest" fi
Build our docker container
docker buildx build --platform linux/amd64 -t localhost:5001/my-blog:$git_tag -t localhost:5001/my-blog:latest . --push ```
So this above script is pretty cool and far from perfect.. but it essentally pulls our git repo. It assignes a var git_tag with the latest git tag. And it uses
docker buildx
to build an x64 image on our arm64 Rasberry Pi, since my digital ocean runs x64 archotecture. Note when building cross archotectures like this it massively slows down the build speed since we are essentally emulating an x64 machine. Here's a resource to get buildx working on your ubuntu rasberry pi working since this is not the standard docker build.Lets Setup Our Container Registry
So I wanted to setup a local docker container registry that my Digital Ocean server can request containers from. This is both cool, and saves money, since I don't want to spend $6 a month on a docker account. So here's the docker compose file to self host on our Rasperry Pi... or really an server you choose that runs docker:
yaml services: registry: image: registry:2 ports: - '5001:5000' environment: REGISTRY_STORAGE_FILESYSTEM_ROOTDIRECTORY: /data volumes: - ./data:/data
Note that you need to make a directory callded data in the same folder as your
docker-compose.yml
which will persist your docker images.Let's quicly lock down our server
This is by no means an exhostive list of security mesures, but with all things secruity it's a risk assesment risk benifit analysis. In my case if someone pops my rasperry pi it's not the end of the world. Because of this we are not going to go to the lengths we could in another context.
Let's setup our firewall rules using UFW
UFW is a pretty simple and strightforward utility on ubuntu (and maybe other linux distros) that allows us to set up rules for what ports are open and what ones are not. Note that the ports that we open up are essentally the attack space of our server. Ideally we want as few open as possible. In our case we need to open up port 5000 to the greater internet for the GitHub webhook to be able to connec to our server. We also need to open up our docker repository port, but this one we can lock down to a spicific IP since our digital ocean server should be the only thing connecting to this service.
first we need to run this command to see if ufw is enabled.
sh sudo ufw status
If it's not active, you can enable it with:
sh sudo ufw enable
You'll probably want to keep SSH open unless you are directly phisically connected to your Rasperry Pi
If you port forward to this port.. you may want to either lock this to only allow connecton from a spicific IP or at the very least only allow connections from an SSH key, since this definetly presents a big security vulnerability. I don't expose my PI on port 22 on the wider internet, since I'm only really working on this while I'm at home.
sh sudo ufw allow 22/tcp
Let's allow connection to port 5001 (our docker container registry) only from a spicific IP
sh sudo ufw allow from [SPECIFIC_IP] to any port 5001 proto tcp
Now let's open our web hook server up to the whole internet. We don't need to open UDP since this will only work with TCP for right now.
sh sudo ufw allow 5000/tcp
Now let's reload our ufw to enable these rules:
sh sudo ufw reload
We can now validate that our rules where applied properly by running:
sh sudo ufw status
And done. You have now sucessfully locked your Pi's firewall down. There's a lot more you can do to harden your sever to attack, and this is really the start, but this is a very important step. Obviously feel free to add more open ports as needed.
Now lets talk about DNS and DDNS
So if you are like me.. you don't have a static IPv4 address at home, which means that hosting any data accessible to the wider internet is difficult. That is until you realize what DNS does. DNS (Domain Name System) translates human readable addresses... like google.com into an IP address either IPv4 or v6. What's so powerful about this is it means you can have a dynamic IP on a standard ISP internet service and still be able to host a service that talks to the outer internet. The way this works is surprisingly simple: You pay for a domain name through whatever domain registrar you want... doesn't really matter. Then you can use a service like Digital Ocean (or certainly others) to manage your DNS A record. Your DNS A record is simply a record that store the IP address you'd like to associate with your domain or sub domain name. For instance awhb.dev currently points to -> 143.110.153.56 so this IP is stored in my A record. So whenever a computer requests
awhb.dev
the computer requests the A record from the DNS server which then sends back143.110.153.56
. There's certainly more complexity to DNS and how it works, but we'll let this high level conceptual understand suffice for our needs right now.With this understanding in mind we can now describe how Dynamic DNS works. All dynamic DNS does is it tells your DNS server (in my case Digital Ocean) what your current public IP address is and assoceates that with a domain or subdomain name makeing it so that your home IP address is assoceated by a domain name. This service has to do this check and update loop repeatedly because your ISP can change your IP address whenver they want... so to keep your server reliable this process should run at least every 10 minutes. that way at most your server will be innaccassable for at most 10 minutes. What's awesome is this Dynamic DNS can be configured extremely easy using this insanely awesome project.
If you're in the same situation as I am, you likely don't have a static IPv4 address at home. This presents a challenge when you're trying to host data that you want accessible to the wider internet. But once you understand the function and power of the Domain Name System (DNS), this challenge becomes much more manageable.
The Domain Name System, or DNS, serves as the internet's phonebook. It translates human-readable web addresses, such as google.com, into numerical IP addresses, which can be either IPv4 or IPv6. The significance of this system is profound: even if you have a constantly changing or dynamic IP address provided by a standard internet service provider (ISP), you can still host a service and make it accessible to the broader internet.
Here's how it works in basic terms:
- Purchase a Domain Name: First, you'll need a domain name, which you can buy from any domain registrar. The specific registrar you choose isn't crucial.
- Managing DNS Records: Services like Digital Ocean (among others) allow you to manage your domain's DNS records, particularly the 'A record'. This A record is essentially a log that stores the IP address you want to link with your domain or sub-domain name. As an example, my domain
awhb.dev
currently maps to the IP address 143.110.153.56. (pleas don't hack me 😱) This IP is what's listed in my domain's A record. - DNS Query Process: Whenever someone tries to access
awhb.dev
, their computer doesn't initially know where to go. It asks a DNS server for the corresponding A record. The DNS server then replies with the stored IP address (in this case,143.110.153.56
), and the computer can then communicate with the server at that IP address. This is a simplification, but it captures the essence of how DNS facilitates web communication.
Now, with this foundation in DNS, let's explore Dynamic DNS (DDNS) and its relevance to those with dynamic IPs.
Dynamic DNS is a service that automatically updates your DNS server with your current public IP address. It keeps your domain name (like
awhb.dev
) consistently linked to your changing home IP address. This is crucial because ISPs can change your IP address without notice. For reliability, the DDNS service regularly checks and updates the IP address associated with your domain. Ideally, this check-update cycle should occur every 10 minutes to ensure that, even if your IP changes, your server will at most be inaccessible for a brief period.Setting up Dynamic DNS might sound complicated, but there are tools available that make the process straightforward. For instance, there's an excellent project on GitHub called ddns-updater that streamlines the setup. All this service is doing behind the scenes is periodically checking what your current public IP is. It saves what it last was in a local JSON file and if it changes compared to the last time it checked it updates your DNS A record for your domain or sub domain.
First thing's first.. let's go to our network tab
Next we need to either add a top level domain or a dub domain to associeate our DDNS IP to.
Next we need an API key in order to update our record from our Rasberry Pi
after you've generated an API key be sure to keep it safe, because this has access to your Digital Ocean account. Someone could do a lot of damage to your account with this key.
next we need to create a config.json file where we'll store our config for ddns-updater
json { "settings": [ { "provider": "digitalocean", "domain": "example.com", "host": "sub", "token": "my-digital-ocean-key", "ip_version": "ipv4" } ] }
so in the above example let's say you're trying to update the A record for
sub.example.com
if you're are trying to just update example.com I think host would be@
be sure to review the docs for your spicific use case.so we need to store the above
config.json
file in a folder which I'll call data.to start our docker servcie to start this service we run:
sh docker run -d -p 8000:8000/tcp -v "$(pwd)"/data:/updater/data qmcgaw/ddns-updater
we are assuming your data dicrectory with config.json is in a folder called data in your current working directory. we are also running this service on port 8000 which has a web UI. Feel free to not expose the web UI. I don't really use it myself, but it does give you status updates on your DDNS records.
I probably have more to go over, but I'll save that for a future post since this one is getting long already.
-
@ f7524ebe:58863422
2025-01-24 05:11:35Photo by Vishnu Mohanan
Checkout Part 1 of this series if you haven't already
This is my follow up to my previous post. In this post I'm going to explore a few other systems that I didn't include in my last post, namely self hosted analytics (not Google Analytics), and our system for having our docker container on our Digital Ocean server automatically update when a new version of our container is pushed to our container registry. So let's dive into it.
Plausible Analytics
Plausible Analytics is extremely cool open source software for allowing you to gain basic web analytics on your site. What I like about Plausible vs Google analytics, is not only that it can be self hosted and simple, but it's also very privacy focused. Since I'm simply building a blog site... I don't need to know everything about my users. I pretty much just want to know how many users came to my site, when, and where and Plausible solves this for me.
Additionally, It's an extremely simple UI which was another big selling point. I've used Google Analytics back in the day, and it was overwhelmingly complicated especially if all I really want is some stupid simple stats about my page. The other cool thing about Plausible is if you don't want to host it yourself you can pay for hosting on their platform, but as you know from my last post I'm doing a lot of this stuff not for conveniencie, but to learn something and have fun along the way. So in this post we'll do things "the hard way".
Setting Up Plausible
First off Plausible has great docs here. I'll show you a few things here as a supplement to those docs. First things first you'll want to setup a HTTPS server for plausible using Nginx.
My Nginx Conf looks like this:
```ini server { listen 80; listen [::]:80; server_name changeme.com;
access_log /var/log/nginx/plausible.access.log; error_log /var/log/nginx/plausible.error.log; location / { proxy_pass http://localhost:8000; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; }
}
server { listen 443 ssl http2; listen [::]:443 ssl http2; server_name changeme.com; server_tokens off; ssl_certificate /etc/letsencrypt/live/changeme.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/changeme.com/privkey.pem; ssl_buffer_size 8k; ssl_dhparam /etc/ssl/certs/dhparam-2048.pem; ssl_protocols TLSv1.2 TLSv1.1 TLSv1; ssl_prefer_server_ciphers on; ssl_ciphers ECDH+AESGCM:ECDH+AES256:ECDH+AES128:DH+3DES:!ADH:!AECDH:!MD5; ssl_ecdh_curve secp384r1; ssl_session_tickets off; ssl_stapling on; ssl_stapling_verify on; resolver 8.8.8.8; location / { proxy_pass http://localhost:8000; # this is our pluasable service. add_header X-Frame-Options "SAMEORIGIN" always; add_header X-XSS-Protection "1; mode=block" always; add_header X-Content-Type-Options "nosniff" always; add_header Referrer-Policy "no-referrer-when-downgrade" always; add_header Content-Security-Policy "default-src * data: 'unsafe-eval' 'unsafe-inline'" always; }
} ```
So the first server block is what listens on port 80 for non TLS encrypted HTTP traffic. If a request comes in on http it will simply redirect the user to our TLS origin. I'm using let's encrypt's cert bot to create my TLS cert. Which is a free and somewhat easy way to have TLS support on your site, which you absolutely should have. Most browsers will make a big stink if your site does not support TLS.
This is a fantastic tutorial on how to setup wild card certificates with Let's Encrypt and Cert Bot on Digital Ocean DNS. Wild card certs are supper useful because they allow you to create one TLS certificate that covers all subdomains on a domain name. So in my case anything like exmple.awhb.dev is covered under the same certificate as awhb.dev. If you don't do wild card certs you'll have to manually create certificates for each subdomain, which is painful.
Here's what my docker-compose.yaml file for this server looks like:
```yaml version: '3.3' services: mail: image: bytemark/smtp restart: always
plausible_db: # supported versions are 12, 13, and 14 image: postgres:14-alpine restart: always volumes: - db-data:/var/lib/postgresql/data environment: - POSTGRES_PASSWORD=postgres plausible_events_db: image: clickhouse/clickhouse-server:23.3.7.5-alpine restart: always volumes: - event-data:/var/lib/clickhouse - ./clickhouse/clickhouse-config.xml:/etc/clickhouse-server/config.d/logging.xml:ro - ./clickhouse/clickhouse-user-config.xml:/etc/clickhouse-server/users.d/logging.xml:ro ulimits: nofile: soft: 262144 hard: 262144 plausible: image: plausible/analytics:v2.0 restart: always command: sh -c "sleep 10 && /entrypoint.sh db createdb && /entrypoint.sh db migrate && /entrypoint.sh run" depends_on: - plausible_db - plausible_events_db - mail ports: - 127.0.0.1:8000:8000 env_file: - plausible-conf.env
volumes: db-data: driver: local event-data: driver: local ```
Note this does not include my Nginx service. You can run your Nginx server either on docker or on your host. Honestly it's probably easier to run it on your host, but I went a little wild and am running mine in docker mostly because I didn't want to install a bunch of linux dependencies and configure them, but in retrospect I think it was probably more work the way I configured things, because my Nginx instance is being used for several servers at once running in multiple docker-compose files.
Another really important note here...
Be sure to do this:
yaml ports: - 127.0.0.1:8000:8000
127.0.0.1:8000:8000 insures that we don't expose this service outside of our local machine. Meaning you cannot directly connect to your servers public IP for example: http://my-public-IP:8000 if you don't set 127.0.0.1 here your service would be accessible this way which is a big security hole, since you want people connecting to your page through your https address and not on this port.
Auto Update Our Blog Docker Container
Now let's switch gears and talk about how we can update our blog container automatically when a new version gets pushed to our registry. Note this will work both with a self hosted registry and with a Docker Hub registry. The way this works is very simple we use a docker service called Watch Tower. Watch tower basically watches all of your running docker containers and checks to see if there's a new version of them on a fixed interval. You can customize this behavior to run as frequently or infrequently as you want.. and you can also have it only check for updates on a subset of your running containers if you want. In my case I just changed the frequency that it checks for updates to every 10 minutes, since it's default is every 24 hours, which in my case is too long, since I want to see my Blog changes update pretty quickly after they are built.
Here's how my docker-compose.ymal looks:
```yaml version: '3.9'
services: watchtower: image: containrrr/watchtower environment: - WATCHTOWER_POLL_INTERVAL=600 volumes: - /var/run/docker.sock:/var/run/docker.sock ```
You can also optionally start this without docker-compose, but I find compose a lot easier than just running docker containers from the command line. The environment var WATCHTOWER_POLL_INTERVAL is important. This is the frequency that watchtower checks to see if there are any new containers to pull in seconds. So in my case this is 10 minutes.
Note Watch Tower will restart your docker services with the same configuration they were started in, so you don't have to worry about them being misconfigured when updated. And this service completes our very stupid simple CI system, since this automates the other end of the equation.
We could theoretically do this in another way, which would be to run another dumb web server like our simple GitHub hook server I run on my Raspberry Pi, but this one would handle a call by our Raspberry Pi server when our deploy script finishes, which would trigger a docker pull and restart. That's potentially a more efficient way of doing things, but there's some complexity there... what if your network connection is down on either server and things like that. I just didn't want to deal with that, but could be a fun little project.
-
@ f7524ebe:58863422
2025-01-24 05:09:35Why I Love Math
I had a group discussion with some friends and family recently on the topic of education. This topic inevitably brings up the adage I've heard time and time again in American circles, "I think education should only teach me useful things that I will use not useless things like Algebra". I very strongly take issue with this statement, but do understand the motive behind it.
The point that this statement is making is that math is hard, and Algebra is not super applicable, thus I don't want to learn it. I would say a few things on this point: One, Math is hard for most of us, myself included (I got mostly C's in math and worked really hard for them), but the reward is beyond worth it. Algebra is a bit boring and maybe not used in obvious ways though I'd argue most people implicitly use it without knowing. However, math is not only extremely useful, but it is also beautiful.
Let's start off by talking about why we should all appreciate math and maybe even all strive to learn as much as our brains can handle. Math is an unbiased way of looking at the world. If you understand the language of math and numbers you can much more effectively process information that comes your way and parse out nonsense, whereas in typical argumentation the goal is to sway the listener either by use of facts or emotional conviction, math cuts through all of that and just is. Yes there are some exceptions with how you frame statistics and such, but the more you understand statistics the more you can see through that framing.
Math is the language of logic. It is the core of our ability to reason. It is fundamental to our ability to understand our world and universe. If we don't have math we wouldn't have reason. We all use reason in our daily lives for every aspect of our decision making. Why should we not exercise this part of our brain like we exercise our bodies for physical health? I'd argue it's at least as important.
Math is application in more ways than I could ever list here. Everything from the computer you use, to the watch you have on your wrist to the business you work for to the TV you watch to the internet you use to the car you drive... etc I could literally go on for days. all of these things at their core are based on math. There is a deep beauty to understanding and appreciating the many generations of people who dedicated their lives to building all these marvelous technologies, systems, and conventions that all have their foundation in math.
Math is not just beautiful because of all the astounding applications it has. It is also beautiful in its pure form. For example, let's talk about the number itself as a concept. Now let's get really philosophical here... the number is not something that has a physical body in the real world. You have seen instances of the number, but numbers are an abstract concept. Now how incredible is it that this abstract concept of a number can be mapped one to one with the real world... meaning I can say 2+2 = 4 and no matter what 2 items you have plus two items someone else has... that will always equal 4 and it will always represent something in the real world. That is not a given. That is something that came with how our universe was designed. Think about a circle. A circle is another abstract concept that you might be thinking "that exists in the world", but actually there is no perfect circle in the world; there are imperfect representations only, so that is actually a concept that doesn't map 1 to 1 in reality.
There are a myriad of other pure math topics that are incredible such as the prime number distribution (sounds complicated, but it's not) a prime number is simply just a number that can only be divided by itself and 1. So what's interesting here is if you start looking at really big prime numbers... let's say into the 10 digits or so numbers you can start seeing that these prime numbers have a spacing. It's not totally random, but it's also not something anyone has been able to create an algorithm to predict without doing the very tedious calculation of is this number divisible by anything other than itself and 1.
This is an image of these prime distributions meaning all the blue dots are locations where there is a prime number. You can see that the numbers start to form a pattern. The blue lines you are seeing are patterns of prime numbers close together. Now no one knows why they cluster like this. It's just an innate aspect of our numbers. I would argue this is absolutely puzzling and beautiful. It speaks to some underlying principle in our universe, because in theory prime numbers should be random, but they are not. Amazing!
Another fun one to think about... are there different sizes to infinity? The answer is yes puzzling enough. I will let any interested people check out this excellent youtube video / channel to find out why. There are so many amazing and puzzling big concepts in math that I think our education system does a pour job of showing us until higher education unfortunately, but math can be amazing.
Another interesting fact is, historically many of the great mathematicians were actually hobbyists with other jobs than being mathematicians. A great example of this was Pierre de Fermat who came up with one of the most puzzling theorems that stumped mathamations until very recently and when solved was the most impressive math solution of our generation. This problem is called Fermat's Last Theorem and is actually a simple equation:
$$ a^n + b^n = c^n $$
but proving that it proved to be extremely hard. It took Andrew Wiles, a brilliant mathematician over ten years to solve. Some would say he's the best mathematician of our age. There's a good documentary on his process to solve this problem cleverly named: Fermat's Last Theorem. It used to be on Netflix, but I'm not sure if that's the case anymore.
All that to say it’s our culture that says that math is hard or boring and I think we should fight against that! And I don't think it has to be that way. I have met people from India who do math for fun. There is no weird cultural stigma associated with it, so that is actually normal for them the same way doing puzzles is normal for us.
One final amazing mathematical principle I'd like to touch on is the Fibonacci Sequence. This is the sequence of numbers 0, 1, 1, 2, 5, 8 ... The next number in the sequence is found by adding up the two numbers before it. This sequence might seem a bit random or arbitrary, but has a surprising number of implications. First of all there are a surprising number of plants in nature that pedals or seeds follow this pattern, the most notable is the sun flower. But from this sequence we can calculate the golden ratio, which is just a number... It's a number like PI. We call it an irrational number in math because it has an unending and no repeating decimal sequence. It starts like this 1.6180. This ratio is incredibly important in everything from music, to the way that galaxies look to how the stock market behaves to aesthetics in art and how the human figures are proportioned. It shows up in so many areas. It is not exactly clear why, but it is just another amazing mystery that makes math incredibly interesting and amazing. There are many other concepts like this one that have connections all over the place in reality, but are just mysterious why that would be. Each of these topics I pointed out could have an entire book written about them, but I hope this wets your appetite into the beautiful world of math that goes far beyond the somewhat mundane math we learn in high school.
I will leave you with a quote from Albert Einstein that has always stuck with me: "The most incomprehensible thing about the universe is that it is comprehensible" I have thought deeply about this. This is not something that is a given. It's unbelievable that we can understand core principles of science and math that can be mapped to reality and used as tools, and I think that we sometimes take this incredible fact for granted. I think you can easily look at this fact as an indication of an intelligent designer.
-
@ f7524ebe:58863422
2025-01-24 05:03:46This was a bit of an adventure and not in a good way. I spent the better part of two days trying to do something that was seemingly very simple, but I could not for the life of me seem to figure out. In this post I hope to help some of you that maybe on the same path, just trying to build a really simple Markdown blog with code highlighting, but unlike me you should not have to spend two days doing so.
What is Remark.js
Remark JS is a very neat little library that parses Markdown into an AST (Abstract Styntax Tree) which allows you to do all sorts of interesting operations on it, including converting markdown into HTML and allowing you to add a css class to the output html so you can easily connect it to highlight.js which will do the actual syntax highlighting. Remark is part of a bigger family of tools. The umbrella tool is called
Unified
which is not tied to Markdown and there's another sub-parser for HTML. All of these three tools have a bunch of different plugins that can be used with them to modify the AST and the output.So I will show you how to do this in isolation and then give you a few tips if you are also trying to build your website in Next.js like I did.
Step 1
You'll need to include either
unified
orremark
in your project using NPM or Yarn.sh npm install remark --save
you will also need
remark-html
. This is the plugin for generating our output html from our markdown.sh npm install remark-html --save
lastly You'll need
remark-highlight.js
. This is responsible for adding the css class to your code block in order to properly format it with Highlight.js.sh npm install remark-highlight.js --save
If you installed unified instead of remark, that's fine, but you'll need
remark-parse
if and only if you are using unified.Step 2
Now that you have all of your dependencies installed it's time to build our process chain. I will do this with just a markdown string right now to keep things simple, but you can load your markdown in from your file system or from an API dosen't really matter
````ts import { remark } from 'remark' import remarkHtml from 'remark-html' import remarkHighlightjs from 'remark-highlight.js'
function convertMarkdownToHtml() { const output = remark() .use(remarkHighlightjs) // we can add , {include: ['css']} or exclude: [a list of langages] .use(remarkHtml, { sanitize: false }) .processSync('# Hello!\n\n
css\nh1{}\n
') return output } ````This line is the most important out of all of them and what cost me so much time. I could not find anything documenting the fact that if you turn sanitize: true or just omit it... it'll be true by default... you will loose everything
remarkHighlightjs
is doingts .use(remarkHtml, {sanitize: false})
I also want to note: you can include or exclude certain languages from your highlighter. I'm not totally sure what the usecase is for this, but it's possible.
ts .use(remarkHighlightjs, {exclude: ['css', 'html']} )
also you can run
process()
instead ofprocessSync()
which will be an async call.I know that probably seemed super basic, but sadly it was not well documented. I hope this clears up some confusion for others working on similar issues. One word of advice when looking at these tools if they don't work right... try stepping through the code with a debugger and see if things are working as you expect. Things can silently fail.
Last thing to note about this general process. If you are tying to get syntax highlighting to work with this system you'll also need to include the highlight.js css file with the theme you'd like. Without it your class name that this process will add will not do anything.
A Note About Nextjs
I built my blog using Next.js and static markdown files using this process. Currently Next.js has some sort of issue with ESM modules, so if you want to work with remark without a headach you can use the versions below otherwise you'll likely fight weird errors.
json "remark-highlight.js": "^6.0.0", "remark-html": "^13.0.1", "remark-parse": "^9.0.0", "remark":"^9.0.0" "unified": "^9.2.0"
A Few Resources I Found Very Helpful
This is a fantastic project and website that I used as a refrence
-
@ f7524ebe:58863422
2025-01-24 04:58:51Nostr is an incredibly powerful idea inspired by Web 3.0 principles. It’s essentially an open-source protocol for creating decentralized social media. The goal is to build a censorship-resistant network, while also enabling private networks (more on that later).
One of Web 3.0's primary aims is to allow users to own their data. In Web 2.0, the internet became highly centralized. Most sites are hosted on one of the big three cloud providers: AWS, Microsoft, or Google. With Web 3.0, we can stop selling our data and being the product. Now that many people (especially in the West) have access to affordable, high-speed internet, adoption of these standards will likely accelerate as more user-friendly platforms emerge.
Infrastructure and Accessibility
The rise of fiber networks across the U.S. is pushing cable ISPs to compete with faster speeds, which is fantastic for this future. Symmetric upload and download speeds, a key factor for self-hosting, have historically been a major bottleneck. While true symmetry from cable ISPs may not happen soon, DOCSIS 4.0 (a new cable data standard) is expected to massively improve upload speeds. As this trend continues, self-hosting will become more practical and economically viable.
Bringing things full circle, I believe Nostr will grow beyond being a niche trend. While it's impossible to predict which technology will dominate, the concepts behind Nostr have broad appeal, especially as onboarding becomes easier with better clients.
People are tired of big companies controlling and selling their data. Who wants Google or Meta monitoring everything? Wouldn’t it be better to connect to a social media server you own or deeply trust?
How Nostr Works
Nostr operates on two core components:
-
The Client: This is the app or interface you use on your phone or computer to interact with the network, similar to Twitter or Instagram. The separation of the client and server means you can choose any client you prefer and still access the same system, giving you greater freedom as a user.
-
The Relay: This is the server that stores the data you and others post. Clients can connect to multiple relays simultaneously. This decentralization makes Nostr highly censorship-resistant. If one relay censors your posts, your data remains on other relays. You can also host your own relay, granting you complete control over your data.
Private Networks
Nostr’s decentralized model also enables private social networks. Imagine an invite-only network where only selected individuals can see your posts. This could be ideal for families or privacy-conscious groups who want to share photos and updates without Meta or Google tracking them.
Nostr Implementation Proposals (NIPs)
NIPs are Nostr Implementation Proposals. These are suggestions from the community for changes or enhancements to the protocol. Anyone can propose a NIP, though adoption depends on community consensus. Developers can also implement NIPs independently, even if they aren’t officially accepted.
The purpose of these proposals is to document and standardize how relays and clients interact, ensuring compatibility across the network.
Popular Clients
Here’s a closer look at some of the top Nostr clients and their platform support:
-
Damus:
Often considered the OG client, Damus works on iOS, Android, and Desktop. It offers a Twitter-like experience. -
Iris:
A web-based client with a Twitter-like interface. Iris works on most browsers, making it highly accessible without requiring installation. -
Olas:
A new client in beta, Olas is an Instagram-like app. It utilizes cutting-edge Nostr proposals that aren’t yet widely supported by relays.
For a comprehensive list, check out this directory of Nostr clients.
Notable Relays
Self-Hosted Relays
-
nostr-rs-relay:
A minimalistic Rust-based relay with SQLite support, perfect for self-hosting with excellent performance. -
gnost-relay:
A Go-based relay backed by PostgreSQL, designed for scalability and robust performance. -
nostr-relay:
nostr relay with backup method using litestream.
Popular Public Relays
-
wss://relay.damus.io:
One of the most widely used public relays, maintained by the Damus community. -
wss://nostr-pub.wellorder.net:
A reliable public relay serving a large number of clients. -
wss://relay.snort.social:
A popular public relay offering robust performance and great uptime.
Relays enable the decentralized and censorship-resistant architecture that makes Nostr so powerful. Whether self-hosted or public, these relays are key to the network's success.
-
-
@ 638d2a79:f5645f4e
2025-01-24 04:58:21In the Name of Health and Well-Being,
Let it be known to all who shall read these words that we, the undersigned students of the esteemed public institution of learning, do hereby draft and establish this sacred contract upon this day, the twenty-third of January in the year of our Lord two thousand twenty-five.
Forasmuch as it hath come to our attention that the culinary offerings within our schools fail to meet the standards of nutrition and quality that are justly deserved by the scholars entrusted to their care;
And forasmuch as the prevalence of childhood obesity hath reached alarming proportions, with the Centers for Disease Control and Prevention (CDC) reporting that approximately 19.7% of children and adolescents aged 2 to 19 years are classified as obese, resulting in a plethora of health complications, including diabetes, heart disease, and psychological issues that shall follow them into adulthood;
Moreover, the United States Department of Agriculture (USDA) hath reported that childhood obesity rates have tripled since the 1970s, signifying a grave crisis in the health of our youth that demands immediate action. According to the National Institute of Health (NIH), the medical costs associated with childhood obesity alone are estimated to exceed $14 billion annually; thus, the burden of inaction weighs heavily upon our society;
Furthermore, it hath come to our attention that many prepackaged foods served within our schools, such as lunchables, have been found to contain trace amounts of lead. The Food and Drug Administration (FDA) acknowledges that lead can leach into food from packaging or processing methods, posing a serious risk to the health of our children, particularly affecting their cognitive development and overall well-being (Source: FDA, 2022);
Additionally, the use of artificial food coloring, which is prevalent in many school meals and snacks, hath been linked to various health concerns, including hyperactivity in children and allergic reactions. Studies indicate that certain artificial dyes, such as Red 40 and Yellow 5, can exacerbate behavioral issues and contribute to a decline in overall health (Source: American Journal of Clinical Nutrition, 2016);
Moreover, we must consider the disparities in food formulations between domestic and international products. For instance, the widely known brand Nesquik offers variations of its chocolate milk mix that differ significantly across borders. In many countries, such as those in Europe, Nesquik does not contain artificial colors or certain additives that are common in the United States. The European version contains fewer harmful ingredients and more natural flavorings, highlighting the inadequacies of the products provided in our own schools (Source: Food & Chemical Toxicology, 2018);
Therefore, we the undersigned, in solemn unity and with great resolve, do hereby ordain the following provisions:
-
That the food served within our schools be subjected to stringent standards of quality and nutritional value, ensuring that each meal provided is conducive to the health and well-being of all students. Such standards shall emphasize the importance of whole foods, fresh fruits and vegetables, and the elimination of harmful additives that threaten our health.
-
That a concerted effort be made to incorporate local and organic produce into the school meals, thereby supporting local agriculture and providing students with wholesome, nutritious options that shall foster their physical and mental development. The American Public Health Association (APHA) supports this initiative, asserting that healthier food environments lead to improved dietary behaviors among students (Source: APHA Policy Statement, 2017).
-
That education regarding proper nutrition and healthy eating habits be integrated into the curriculum, empowering students to make informed choices about their dietary intake and understand the significance of nutrition in their daily lives. Research indicates that nutrition education in schools can lead to improved dietary practices among students, reducing the risk of obesity and related health issues (Source: Journal of Nutrition Education and Behavior, 2014). This education shall extend to both students and guardians, promoting a culture of health within our community.
-
That we, the undersigned, pledge to advocate for the implementation of these necessary changes, beseeching our educators, administrators, and local governing bodies to prioritize the health of students by reforming the culinary standards within our schools. It is our collective duty to ensure that our peers are provided with meals that enhance their well-being and academic performance.
-
That we commit to engaging with community stakeholders, including parents, local health officials, and agricultural advocates, to establish a comprehensive plan for improving school nutrition policies. According to the Robert Wood Johnson Foundation, schools that engage families and communities in nutrition initiatives see greater success in achieving healthier food environments (Source: RWJF, 2018).
-
That we call for the immediate review and reform of all prepackaged foods offered within our school lunches, demanding the elimination of harmful substances such as lead, artificial coloring, and unhealthy additives, ensuring that all products served are safe and nourishing for our bodies. We seek transparency in food labeling and the ingredients used in our meals, advocating for a school environment that prioritizes the health of its students above all.
In witness whereof, we do hereunto set our hands and seals, affirming our collective agreement to the terms herein expressed, with the understanding that we shall each append our signatures below, thus rendering this document a binding testament to our resolve.
Given this day, we stand united in our quest for the betterment of our dietary offerings, that we may nourish both body and mind for the benefit of generations yet to come.
Signatures of the Students: Otter hovis
-
-
@ 638d2a79:f5645f4e
2025-01-24 04:53:20In the Name of Education,
Know all men by these presents that we, the undersigned students of the esteemed public institution of learning, do hereby declare and establish this contract on this day, the twenty-third of January in the year of our Lord two thousand twenty-five.
Whereas the current curriculum of Social Studies hath deviated from the noble pursuit of history, resulting in a regrettable neglect of essential historical knowledge;
Whereas it hath been observed that public schools, as documented by the National Center for Education Statistics, face numerous challenges, including a significant percentage of students performing below the basic level in history proficiency, which demonstrates a deficiency in the proper education of our youth;
Whereas the lack of a rigorous historical curriculum contributes to a broader societal ignorance, as highlighted by the 2018 report from the American Historical Association, indicating that only 20% of high school graduates possess a comprehensive understanding of American history;
Now, therefore, we the undersigned, in unity and purpose, do hereby resolve as follows:
-
That the class known as Social Studies shall be reverted to an actual history class, incorporating essential teachings of world history, American history, and significant historical events that shape our understanding of the world.
-
That the curriculum shall include, but not be limited to, the study of primary sources, historical documents, and critical analysis of events, enabling students to develop a deeper comprehension of our past.
-
That this transition shall be made with utmost urgency for the benefit of the students and the greater good of our society.
-
That we, the undersigned, do hereby pledge our commitment to this cause and shall actively encourage our peers, educators, and administrators to recognize the importance of this change.
In witness whereof, we do hereunto set our hands and seals, affirming our collective agreement to the terms herein expressed, with the understanding that we shall each append our signatures below, thereby making this document a binding testament to our resolve.
Given this day, we stand united in our quest for educational integrity and the restoration of historical studies.
Signatures: Otter hovis
Thus, we do affirm our commitment, may this endeavor be fruitful for the enlightenment of generations to come.
tags : [[Contracts]]
-
-
@ f7524ebe:58863422
2025-01-24 04:52:11Intro
About a month ago, I became obsessed with the idea of reducing my digital footprint, especially on big tech platforms like Google, Meta, Instagram, etc. This isn’t something you can accomplish overnight (unfortunately), but with concerted effort, I believe you can make real progress. In my case, I’m not entirely sure what triggered this desire, but it gradually became clear that there’s a concerning amount of data about me on the internet, which doesn’t feel comfortable to have out there—especially as we enter a new age of AI where phishing scams are easier and more effective than ever. The less public information you have, the less likely you’ll be a target.
One thing I’ll say right off the bat: I’m by no means an expert on the topic. I’m just doing the best I know how, and I’m sure I’ll learn many new things along the way. I’ll also mention that I’m not a purist—I’m a pragmatist. I’m aiming to do the best job I can within reasonable time and effort constraints. Another goal I’ve set for myself is improving my personal cybersecurity, which I’ll dive into later in this post.
Where to Start?
I started with my email. Email is the cornerstone of your digital identity, so it makes sense to begin there, both from a security and privacy perspective. Like most people, I’ve been a Gmail user for as long as I can remember. Switching email providers felt like the biggest hurdle—everything else seemed trivial in comparison. I chose Proton Mail. If you’re more hardcore, you could host your own email server, but I found that was far more work than I wanted to take on. Many open-source webmail clients weren’t visually appealing to me, and I’m a very aesthetic-driven person. If I’m using something daily, it needs to look good. Proton strikes a great balance between being privacy-centric and aesthetically pleasing.
Proton Mail Features I Love
One of my favorite features of Proton Mail is email aliasing. You can create a new pseudo-email for every account you sign up for, which hides your real email address. This gives you a huge advantage: if you ever want to sever ties with a service, you can delete the alias and stop receiving emails from them. It also boosts your security because, over time, your primary email address may get leaked in data breaches. With email aliases, you solve this problem—if one alias is compromised, it isn’t tied to your other accounts.
Proton also offers alternatives to Google Docs, a password manager, and encrypted cloud storage. I consolidated my password management into Proton’s ecosystem, replacing 1Password. While I think 1Password is fantastic, I wanted to reduce my number of paid subscriptions. Proton’s encrypted Drive is a solid Google Drive alternative. For sensitive files, people recommend double encryption, but for everyday documents, it’s a massive improvement from a privacy perspective.
Search
This is a big one. I used to pretty much exclusively use Google for search. They were by far the best for a long time. I've recently switched over to DuckDuckGo(https://duckduckgo.com) and honestly haven't looked back. DuckDuckGo now has included AI into their search, which I'd come to really like in Google search results, and honestly feels like their results are at least as good as Google's at this point in most cases. They also are not littered with ads, which is a huge plus. Additionally, if there's ever a time where the DuckDuckGo results are not giving you what you want, you can end your search with "g!" and it will redirect your search to Google with the same exact query. I could be wrong, but I want to say this redirection has some privacy benefits as well.
Browser
As much as I want to like Firefox, sadly it's just a bit too buggy and not as enjoyable to use as Chromium browsers these days, though to be fair, I only try it like once every two years, so maybe I'll give it another shot soon. I am, however, thoroughly enjoying Brave(https://brave.com/). Brave is a Chromium-based browser, so you get all the perks of Chrome without all the ads, spying, etc. It was started by the same guy who started Firefox. I also like their iOS browser, but note that every browser on iOS really is just a layer on top of Safari since they actually don't allow truly custom browsers. That being said, Brave on iOS is nice because it still blocks ads/web trackers and has some nice features like auto tab closing that I've come to love.
Note-Taking
I used to rely on Google Keep for all my notes—it was easy and convenient. However, when I started this journey, I discovered Standard Notes, which was recently acquired by Proton. It’s an end-to-end encrypted note-taking app, similar to Keep. It works fantastically for my needs, and I hope Proton eventually integrates it more tightly into their ecosystem. Bonus: it supports multi-factor authentication (MFA), which is always a plus.
Google Sheets Alternative
This one was tricky. There aren’t many aesthetically pleasing cloud-based alternatives to Google Sheets. I’ve taken a hybrid approach—moving some data back to my local computer with Apple Numbers and self-hosting NocoDB on a Raspberry Pi. NocoDB is like a mix of Google Sheets and Airtable. It’s great for collaboration and managing data like addresses. Self-hosting isn’t for everyone, but I enjoy taking control where I can.
Social Media
I’m not a huge fan of social media—it’s addictive and often a time sink. That said, I believe there’s a time and place for it, especially if there’s no algorithm designed to steal your time and energy. I’ve been exploring Nostr as a replacement for platforms like Twitter, Facebook, Instagram, and Reddit. If you’re curious about Nostr, check out my article here where I explain it in detail. I believe it could be the future of social media, giving users data sovereignty.
I deleted my Facebook account after downloading my data (mostly photos). You can find instructions here. Instagram has been harder to quit, but I’m exploring Olas as a promising alternative. My vision is to use a private Nostr relay for close friends and a public profile for broader content. Nostr already feels like a less toxic replacement for Twitter.
YouTube
YouTube is tough to replace. I use a whole home VPN to stay anonymous while watching, but I haven’t found a viable alternative yet. I’m optimistic that Nostr or a similar decentralized platform will eventually fill this gap.
Spotify
I enjoy Spotify and didn’t want to quit entirely, so I recreated my account using an email alias to obscure my identity. I’ve also started using virtual credit card numbers to limit exposure during breaches. For podcasts, I switched to Fountain, which integrates with Nostr for episode discussions. I’m also trying TIDAL for its HiFi audio quality.
Security Improvements
I’ve been upgrading my cybersecurity alongside these changes. Here’s what I’ve done:
- Adopted email aliases for accounts and updated old ones retroactively.
- Invested in YubiKeys for MFA. Unlike phone-based MFA, YubiKeys are immune to malware and SIM cloning.
- Stopped storing recovery codes in my password manager.
- Set a PIN for my password manager, which auto-locks after inactivity.
Obfuscating Your Phone Number
I’ve started using temporary phone numbers, such as those from Anonymous SMS. These are great for one-time use but shouldn’t be relied on for long-term accounts.
Google Photos/iCloud Alternatives
If you’re like me, you value accessibility and security for your photos. I used to use Google Photos but switched to Immich, a self-hosted solution on a NAS (Network Attached Storage). If you go this route:
- Don’t expose your NAS to the internet—use a VPN for external access.
- Follow the 3-2-1 backup rule: three copies of your data, two local (on your device and NAS), and one offsite.
Reduce Your Exposure to Data Brokers
I found Incogni, a paid service that (allegedly) requests the removal of your data from data broker websites, making significantly less accessible information about you on the internet. Does it work? I think so... but honestly, I just subscribed for a month and canceled because I don't think there's much value in continuing the subscription once they've made all the requests for you. Only time will tell, but the goal is to reduce your data exposure to the point where you receive significantly less spam, scam attempts, etc.
Conclusion
I’m far from done with this journey and continue to learn every day. My goal is to reduce dependence on big tech, reclaim ownership of my data, and undo years of oversharing. If you have questions or want to chat, reach out to me on Nostr:
npub17afya0s3re0f6t246az8vrzgguywdn6ea2p7dv9kn744kkyxxs3q2hjmzg
. -
@ 28cac85f:54300cac
2025-01-24 04:33:39Tier System Overview:
Tier 0 - Non-Participation: Qualification: Individuals who do not engage in any societal activities, work, or community service. Benefits: Provided with basic necessities in a studio or room: food, water, power, internet access. Basic healthcare services. No additional privileges or community involvement opportunities. Rationale: Ensures that even those not participating in society are not left without survival needs, aiming to encourage engagement while maintaining human dignity.
Tier 1 - Basic Participation: Qualification: Individuals who engage in minimal but regular activities beneficial to society, such as volunteering for a few hours a week or participating in community education programs. Benefits: Same as Tier 0 plus: Access to communal spaces like libraries, parks. Basic educational resources or skill development workshops. Slightly larger living quarters or shared housing options.
Tier 2 - Active Participation: Qualification: Regular involvement in community or public service, employment in non-profit or public sectors, or consistent contribution to local projects. Benefits: All benefits from Tier 1, plus: Enhanced living accommodations (e.g., small apartment instead of studio). Access to cultural and recreational facilities. Priority in resource allocation for personal projects or community initiatives.
Tier 3 - High Engagement: Qualification: Significant contributions to society, leadership in community projects, or specialized roles that benefit a large number of people (e.g., doctors, educators, innovators in sustainable practices). Benefits: All benefits from Tier 2, plus: Larger living space or choice of location within the community. Advanced educational and professional development opportunities. Recognition and potential for influence in community decision-making processes.
Tier 4 - Exemplary Service: Qualification: Exceptional service or innovation, such as groundbreaking work in technology, arts, or social welfare that has a national or international impact. Benefits: All benefits from Tier 3, plus: Customized living arrangements or prime community locations. Access to exclusive resources for personal or community projects. Leadership roles or advisory positions in societal governance.
System Mechanics: Assessment: A community or regional board could assess participation levels, using transparent criteria. Regular reviews or annual assessments to adjust tiers based on participation.
Incentives for Movement: The system encourages upward mobility by offering more privileges and responsibilities, which in turn should motivate individuals to contribute more to society.
Feedback Loop: A feedback mechanism where individuals can appeal their tier status or suggest improvements to the system itself.
Education and Awareness: Programs to educate people on how they can move up tiers, emphasizing the benefits of community engagement.
Challenges and Considerations: Privacy: Ensuring data used for tier assessment respects privacy and isn't overly intrusive. Equity: The system must be designed to avoid creating or exacerbating social divides; it should be equitable in how participation is measured across different capabilities and circumstances. Sustainability: The provision of basic needs regardless of tier requires a sustainable resource management strategy.
A resource-based economy (RBE) could address sustainability concerns in several ways, but it also comes with its own set of challenges and considerations:
Advantages for Sustainability: Optimal Use of Resources: An RBE focuses on the efficient allocation of resources to meet human needs rather than profit motives. This could lead to less waste and more sustainable consumption patterns, as resources are managed centrally or collaboratively to ensure they are used where they're most needed.
Elimination of Planned Obsolescence: Without profit-driven motives, there would be less incentive to design products with a limited lifespan. Instead, products could be designed for durability, reparability, and recyclability.
Reduction in Overproduction: Since production would be driven by actual need rather than market demand, there would likely be a decrease in unnecessary production, leading to less environmental impact from manufacturing and disposal.
Renewable Energy Focus: Transitioning to an RBE might accelerate the shift to renewable energy sources as the emphasis would be on sustainability rather than on the cheapest or most profitable energy at the moment.
Ecosystem Services Valuation: An RBE could place a higher value on preserving natural ecosystems for their inherent benefits rather than for economic exploitation, promoting biodiversity and ecological health.
Global Resource Management: With a focus on global equity, resources might be shared more evenly across the world, reducing the environmental pressures caused by overconsumption in some areas while others lack basic necessities.
Challenges and Considerations: Transitioning from Current Systems: Moving from a market-based economy to an RBE would require significant changes in infrastructure, technology, human behavior, and governance systems. This transition could be disruptive and face resistance.
Resource Scarcity: Even in an RBE, managing finite resources remains a challenge. Advanced technology, recycling, and resource recovery would need to be highly effective to ensure sustainability.
Innovation and Motivation: Without financial incentives, the drive for innovation might shift, requiring new forms of motivation like recognition, personal fulfillment, or societal contribution. Ensuring continuous innovation in sustainable technologies would be key.
Governance and Decision-Making: Who decides resource allocation? How to ensure this process is democratic, transparent, and equitable? The governance of such an economy would need to be carefully designed to prevent power abuses or inefficiencies.
Human Behavior: Changing deeply ingrained consumer behaviors from "more is better" to "enough is plenty" would be a cultural shift requiring education, new social norms, and possibly even different psychological support.
Global Agreement and Cooperation: Implementing an RBE would ideally require international cooperation, which is complex given current geopolitical dynamics.
Measurement and Accountability: Without traditional economic metrics, new ways to measure sustainability, well-being, and resource use would need to be developed.
In theory, an RBE could provide a framework for achieving sustainability by aligning human activity more closely with ecological limits and human needs. However, its practical implementation would require overcoming significant socio-economic, political, and cultural obstacles. It would need to be designed with a deep understanding of human nature, advanced technology, and a robust system for managing and distributing resources globally in a fair and sustainable manner.
Which leads me to believe humanity would need a global ethical AI to manage such a system. Is humanity even capable of creating an ethical AI?
-
@ a012dc82:6458a70d
2025-01-24 02:24:43In the rapidly evolving world of cryptocurrency, bitcoin mining has emerged as a critical yet often misunderstood component. It's a sector where technology, environmental concerns, and economic factors intersect, creating a complex and dynamic landscape. Fred Thiel, the CEO of Marathon Digital Holdings, is a leading voice in this space, advocating for a future where bitcoin mining is not only profitable but also sustainable and innovative. His insights offer a roadmap for the industry's evolution, emphasizing the need for decentralization, global expansion, and a deep commitment to environmental responsibility.
Table Of Content
-
Decentralization and Global Expansion
-
Tackling the Challenges Head-On
-
Stranded Energy and Clean Tech Innovations
-
Heat Harvesting and Strategic Partnerships
-
Reshaping the Energy Landscape
-
The Economics of Sustainability
-
The Digital Age of Green Energy
-
Conclusion
-
FAQs
Decentralization and Global Expansion
The concept of decentralization is foundational to the ethos of bitcoin, and Thiel's approach to mining is no exception. Despite Marathon's status as one of the largest publicly-traded bitcoin mining companies, Thiel is quick to point out that they contribute to less than 5% of the network's total hash rate. This modest share underscores the decentralized nature of the industry and the vast potential for growth and expansion.
Under Thiel's leadership, Marathon is not content with maintaining the status quo. The company is actively seeking to broaden its horizons, exploring opportunities beyond the American landscape. Thiel's vision is global, recognizing the strategic importance of diversifying mining operations to mitigate risks and capitalize on international markets.
The push for global expansion is not just about increasing Marathon's footprint; it's about integrating renewable energy into the core of mining operations. Thiel is a proponent of leveraging the world's natural resources, such as solar, wind, and hydroelectric power, to fuel the next generation of bitcoin mining. This approach not only reduces the environmental impact but also aligns with the growing demand for sustainable practices in all sectors of the economy.
Tackling the Challenges Head-On
The journey toward sustainable innovation is fraught with challenges, and the bitcoin mining industry is no exception. Thiel is candid about the obstacles facing miners today, including the fierce competition for bitcoin rewards. As more players enter the field, the fight for a slice of the bitcoin pie becomes increasingly difficult, compressing profit margins and forcing miners to optimize their operations.
The upcoming halving event, a pre-programmed reduction in bitcoin rewards that occurs approximately every four years, adds another layer of complexity to the industry's economic landscape. Thiel predicts that this event will catalyze a significant shift in the industry, leading to the consolidation of mining power among a few dominant global players. Smaller mining operations may find it challenging to compete, potentially pivoting to specialized roles within the ecosystem.
Stranded Energy and Clean Tech Innovations
One of the most innovative concepts Thiel discusses is the utilization of "stranded energy" for bitcoin mining. Stranded energy refers to power that is generated but not used, often because it is too remote or too inconsistent to be incorporated into the traditional energy grid. By harnessing this otherwise wasted energy, bitcoin miners can reduce their environmental footprint and turn a potential liability into a valuable asset.
Thiel is particularly interested in the potential for capturing methane emissions from landfills and converting them into energy for mining. Methane is a potent greenhouse gas, and its capture and use not only mitigate environmental harm but also provide a cost-effective energy source for miners. This symbiotic relationship between waste management and bitcoin mining is a prime example of the innovative thinking that Thiel brings to the table.
The heat generated by mining equipment is another area ripe for innovation. Typically seen as a byproduct to be cooled and dissipated, Thiel envisions this heat being repurposed for agricultural use, such as heating greenhouses, or industrial processes, like drying lumber. These applications could create new revenue streams for miners and contribute to a more circular economy.
Heat Harvesting and Strategic Partnerships
The innovative use of excess heat from mining operations is just one example of the creative solutions being explored under Thiel's leadership. He envisions a future where the byproducts of mining contribute to other sectors, creating a more integrated and efficient industrial ecosystem.
Marathon's strategic partnerships are a testament to this vision. In Texas and North Dakota, the company is pioneering the use of wind energy that would otherwise be unutilized due to grid limitations. These initiatives not only bolster Marathon's commitment to sustainability but also demonstrate the potential for renewable energy to power large-scale mining operations.
Thiel also highlights collaborations with landfill owners, aiming to convert methane gas into a power source for mining. These partnerships are a win-win, reducing greenhouse gas emissions while providing a steady energy supply for Marathon's mining activities.
Reshaping the Energy Landscape
The strategic partnerships that Thiel fosters are not just about securing energy sources; they are about reimagining the energy landscape itself. By aligning with energy producers and innovators, Marathon is at the forefront of creating a new paradigm where energy production and consumption are balanced in a closed-loop system. This system not only powers the mining operations but also contributes to the stability and sustainability of local energy grids.
Thiel's vision extends to the creation of commodity markets centered around bitcoin mining. He sees a future where energy, particularly renewable energy, is traded with bitcoin mining as a key driver. This could lead to more efficient markets, where energy is not wasted but used as a strategic asset to secure the blockchain network.
The Economics of Sustainability
The economics of bitcoin mining are complex and often volatile. Thiel understands that for Marathon to remain competitive, it must not only innovate in terms of technology but also in its business model. The company's focus on sustainability is not just an ethical choice but an economic strategy. By reducing reliance on traditional energy sources and minimizing environmental impact, Marathon is positioning itself to be resilient against regulatory changes and shifts in public sentiment.
Thiel's approach to the economics of sustainability involves a long-term perspective. He is preparing for a future where the cost of energy and the impact of carbon emissions are likely to be significant factors in the profitability of mining operations. By investing in renewable energy and carbon reduction technologies now, Marathon is future-proofing its operations.
The Digital Age of Green Energy
As the conversation with Nelson concluded, it became clear that Thiel's vision for bitcoin mining is about more than just securing digital assets; it's about securing a sustainable future. The industry is at a pivotal moment, with the potential to lead the way in green energy utilization and innovation.
Bitcoin mining, in Thiel's view, is not just an industry but a catalyst for change. It has the potential to drive the adoption of renewable energy, to create new markets for stranded energy, and to foster a more sustainable approach to energy consumption worldwide.
Conclusion
Fred Thiel's journey in sustainable innovation within bitcoin mining is a testament to the transformative power of visionary leadership. His approach goes beyond the conventional scope of cryptocurrency mining, challenging the industry to rethink its relationship with energy and the environment.
Under Thiel's guidance, Marathon Digital Holdings is not just mining for bitcoin; it's mining for a better future. By embracing decentralization, tackling industry challenges with foresight, innovating with stranded energy, and forming strategic partnerships, Marathon is paving the way for a more sustainable and economically viable mining industry.
FAQs
Who is Fred Thiel? Fred Thiel is the CEO of Marathon Digital Holdings, one of the largest publicly-traded bitcoin mining companies.
What is Marathon Digital Holdings' approach to bitcoin mining? Marathon emphasizes sustainable and innovative mining practices, focusing on decentralization, global expansion, and renewable energy sources.
What challenges does bitcoin mining face according to Thiel? Thiel notes competition for bitcoin rewards, tightening margins, and the impact of reward halving events as significant challenges.
How is Marathon Digital Holdings addressing environmental concerns? The company is pioneering the use of stranded energy, such as methane from landfills, and harnessing excess heat from mining operations for other industrial uses.
What are the economic benefits of sustainable mining practices? Sustainable practices can lead to reduced operational costs, resilience against regulatory changes, and a positive public perception, which can be economically beneficial.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
X: Instagram: @croxroadnews.co
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ df478568:2a951e67
2025-01-24 00:38:47 -
@ 04c195f1:3329a1da
2025-01-23 22:10:37Last summer, I attended Dreamhack Summer in Jönköping with my 10-year-old son. It was, of course, for his sake that we went, but I have to admit I was a little curious to see how the event had evolved since I last attended back in 1999. I knew it would be different, of course, but what I encountered was a completely different beast. At the same time, the transformation seemed like such a clear parallel to broader societal changes that I couldn’t stop thinking about it throughout the evening.
In this transformation, I see a microcosm of a broader societal trend—one where passion and community give way to commercialization and consumerism. What does Dreamhack’s evolution tell us about society at large? And why does it remind me so much of the development of Swedish football? Could it be that Renaud Camus—the French philosopher known for his writings on the Great Replacement—might help us understand this too?
Dreamhack as a Demo Party
Dreamhack began in 1994 as a demo party in the small town of Malung, Sweden, later moving to Arena Kupolen in Borlänge. That’s where I attended in 1998 and 1999. Eventually, the event relocated to Elmia in Jönköping and the Stockholm Exhibition Center. But the real difference isn’t the venue—it’s the content. Dreamhack was originally a demo party, a gathering place for tech nerds competing in programming, music, and art. We thrived on the challenges presented by both modern and vintage computers, constantly trying to push the limits and prove who could create the most with the least.
One notable example is the winning entry in the four-channel music competition, “Logdans” by the artist d00m. As the name suggests, the competition restricted participants to four audio channels and a very limited memory for storing sounds. Creating something that sounded good under such constraints required immense skill and creativity—that was the fun of it!
The winner of the same year’s pixel art competition was “Fantasy Dolfin” by DarkOne.
But the real highlight of the event was the demo competitions, where creators showcased what they could achieve through programming. The challenges were further elevated by different classes with unique restrictions and platforms. The winner of the PC category that year was “Off” by the Finnish group Doomsday.
The demo scene was nerdy, unapologetically unpolished, wildly creative, and likely incomprehensible to outsiders. But it had soul. It was a grassroots movement that thrived on community and passion.
Hypercommercialization and Unreachable Stars
As Dreamhack grew, it gradually shifted focus—from grassroots creativity to a spectacle driven by sponsors, big budgets, and global recognition. Fast forward 25 years, and Dreamhack is no longer a demo party—not even as a niche component. It’s now a full-blown gaming festival, drenched in hyper commercialization. Everyone wants to be part of it: the military, the police, unions, recycling campaigns, and, of course, the major tech and gaming companies. It’s a sprawling exhibition with flashing lights and pounding music, each booth trying to sell you a product, service, or government initiative.
This mirrors a broader trend in cultural events across the globe, where grassroots creativity often gives way to corporate interests. Whether it’s music festivals, art expos, or even traditional fairs, the focus increasingly shifts from fostering community to maximizing sponsorships and revenue streams. Dreamhack is a prime example of how these dynamics play out, prioritizing spectacle and profit over the authentic experiences that once defined such gatherings.
On stage, you no longer see programming, music, or art. Instead, it’s all about esports tournaments. Star players hold “meet and greets,” while streamers sit in a row like caged attractions, with fans watching them broadcast their gameplay live.
Change is inevitable, sure. But what’s changed here is the very soul of the event. What was once a grassroots movement fueled by passion and creativity has become a spectacle of consumerism and surface-level appeal. Gaming competitions with multi-million-dollar prize pools, “stars” showcasing themselves, and countless companies vying for your attention—it’s a far cry from what it once was.
A Parallel with Swedish Football
The transformation of Dreamhack reminds me of another evolution: the culture of Swedish football fans. Both examples highlight how grassroots culture, once driven by passion and community, has been overtaken by commercialization and corporate influence, leaving behind a focus on profit and spectacle. The transformation of Swedish football from the 1990s to today is staggering. Beyond the rules of the game itself, almost nothing is the same.
The money involved is enormous, and the players are now celebrities. In the 1990s, Hammarby’s goalkeeper, Per Fahlström, worked as a local police officer in the same neighborhood where I grew up. Today, Hammarby’s goalkeeper, Warner Hahn, has been a full-time professional for his whole life.
Players come and go like mercenaries, and the local connection of teams grows weaker. Many matches have moved from traditional stadiums like Söderstadion or Stockholms Stadion to spaceship-like arenas with names like Tele2 Arena, Platinum Cars Arena, or my favorite: Falcon Alkoholfri Arena (“Falcon Non-Alcoholic Arena”).
Tickets have become prohibitively expensive. For example, in the past, children who participated in local youth football leagues in Stockholm were given free access to countless Allsvenskan matches as part of a community initiative. Today, however, even attending a single match can be a financial strain for many working-class families.
Here too, the soul has been altered, or even stolen. What was once genuine and rooted in the community has been replaced by hyper commercialization. The bond between players and fans has eroded, replaced by idolatry and celebrity worship.
Renaud Camus and the Theory of Replacement
As I reflected on these changes, I couldn’t help but think of Renaud Camus, who wrote about the “tendency to replace everything with its normalized, standardized, interchangeable copy: the original with its replica, the authentic with its imitation, the true with the false…”
Isn’t that exactly what we’re seeing with Dreamhack and Swedish football? At Dreamhack, attendees are no longer active participants contributing to the event’s creativity and culture. Instead, they’re treated primarily as consumers, bombarded with advertisements and encouraged to spend. Similarly, in Swedish football, fans are no longer part of a community tied to local teams but are instead paying customers idolizing distant celebrities.
There’s something new here that young people today probably enjoy, but it’s an imitation of what once was. The participants in the stands or exhibition halls are now seen primarily as consumers, not as part of a movement.
Where Can We Find Authenticity Today?
Where, then, can we find the authentic today? The places untouched by commercial forces?
I honestly don’t know. But as I watched my son take in Dreamhack 2024, I couldn’t help but wonder how he will look back on it in 25 years. Will he remember the flashing lights, the esports stars, and the endless booths as a vibrant celebration of gaming culture? Or will he, like me, feel the pang of something lost—a sense of community, creativity, and authenticity that has been replaced by consumerism? Perhaps he will reflect on how the event evolved further, or maybe he’ll be part of a countermovement reclaiming the spirit of the original Dreamhack. Only time will tell.
History has shown us that authenticity has a way of resurfacing when people tire of imitation. Whether in gaming, sports, or other cultural arenas, I hope we’ll see a revival of the passion and creativity that once defined these spaces. I miss it deeply. But I hold onto the belief that, eventually, a countermovement will emerge.
Anything less would mean the death of culture itself.
-
@ 3c506452:fef9202b
2025-01-23 21:36:27Kia ora ra!
I thought I'd look into the claim made by Tim Ferriss and see if these sentence patterns are able to give a brief overview of te reo and it's structure.
I initially struggled to stick with a single sentence as it didn't accurately reflect how the reo is actually spoken so I have included what I feel are the most "normal" sounding structures that one will probably encounter.
Here is the full list:
1. The apple is red.
E whero te tae o te aporo / E whero te aporo.
He whero te tae o te aporo / He whero te aporo.
Ko te aporo e whero nei te tae / Ko te aporo e whero nei tona tae.
E whero ana te tae o te aporo.
He aporo whero / Ko te aporo whero.2. It is John's apple.
Ma John te aporo / Na John te aporo.
He aporo ma John / He aporo na aporo.
Ko te aporo a John / Ko ta John aporo.3. I give John the apple.
Mahaku te aporo e hoatu ma John.
E hoatu ana te aporo ki a John.
Ko te aporo e hoatu nei e au ki a John.
E hoatu ana mahana.4. We give him the apple.
Ma ma[ua/tou] te aporo e hoatu ma John.
E hoatu ana te aporo ki a John.
Ko te aporo e hoatu nei e ma[ua/tou] ki a John.
E hoatu ana mahana.5. He gives it to John.
Mahana e hoatu ma John / Nahana i hoatu ma John.
E hoatu ana ki a John.
E hoatu ana mahana.6. She gives it to him.
Mahana e hoatu mahana / Nahana i hoatu mahana.
Mahana e hoatu / Nahana i hoatu.
E hoatu ana ki a ia.
E hoatu ana mahana.7. Is the apple red?
E whero te tae o te aporo? / E whero te aporo?
He whero te tae o te aporo?/ He whero te aporo?
Ko te aporo e whero nei te tae? / Ko te aporo e whero nei tona tae?
E whero ana te tae o te aporo?
He aporo whero? / Ko te aporo whero?8. The apples are red.
E whero te tae o nga aporo / E whero nga aporo.
He whero te tae o nga aporo / He whero nga aporo.
Ko nga aporo e whero nei te tae / Ko nga aporo e whero nei ona tae.
E whero ana te tae o nga aporo.
He aporo whero / Ko nga aporo whero.9. I must give it to him.
Hoatu e au te mea ki a ia.
Hoatu e au mahana.
Mahaku e hoatu mahana.
Me hoatu ki a ia.
E hoatu ai mahana.10. I want to give it to her.
Mahaku noa e hoatu.
Waiho mahaku e hoatu.- I'm going to know tomorrow.
Apopo ka mohio ai / Aoake te ra ka mohio ai.
Ka mohio au apopo / Ka mohio au a aoake te ra.
12. I can't eat the apple.
Ehara i te mea mahaku te aporo te kai.
13. I have eaten the apple.
Kua kai ke au i te aporo.
Kua pau te aporo te kai i au.
Nahaku te aporo i kai.
Ko te aporo nahaku nei i kai ai.
He mea kai e au te aporo. - I'm going to know tomorrow.
Apopo ka mohio ai / Aoake te ra ka mohio ai.
-
@ 16d11430:61640947
2025-01-23 21:22:53The human genotype is a tapestry of evolutionary stories encoded in DNA, shaping our physical and mental capacities while offering a glimpse into the essence of humanity. In parallel, Bitcoin is the digital culmination of trustless systems and decentralized value. While these domains may seem unrelated, a deeper exploration reveals that Bitcoin, as a foundational technology, has the potential to liberate human genetics from the entrenched systems of control, inequality, and corporate monopolies that exploit genetic data. This article explores the multidimensional intersections of Bitcoin and genetics, examining how decentralized systems can empower individuals to reclaim ownership of their genetic destinies.
- Ownership and Sovereignty: DNA as the Ultimate Private Key
The genome is the most private, immutable ledger of human life. However, current systems for storing and utilizing genetic data are centralized and exploitative. Companies like 23andMe collect genetic data, often monetizing it through partnerships with pharmaceutical corporations without granting individuals true ownership or control over their information.
Bitcoin’s principles of sovereignty and decentralization provide a compelling framework for genetic data storage and access. Just as Bitcoin gives individuals control over their wealth through private keys, a blockchain-based genetic framework could allow people to own their genomic data securely, decide who accesses it, and potentially monetize it on their own terms. By eliminating intermediaries, Bitcoin-inspired systems can create a fairer and more transparent marketplace for genetic insights.
- Decentralized Genomic Research: Breaking Free from Gatekeepers
Traditional genomic research is controlled by a few elite institutions and corporations that act as gatekeepers, dictating which areas of genetic inquiry receive funding and attention. This centralization slows innovation, creates conflicts of interest, and perpetuates inequities in access to life-saving genetic therapies.
Bitcoin's decentralized nature can be a model for disrupting this paradigm. By tokenizing genomic research funding through decentralized autonomous organizations (DAOs), communities can pool resources to support projects that align with their needs and values. Scientists and researchers could bypass corporate gatekeepers, accelerating discoveries in areas like gene editing, rare disease treatment, and personalized medicine.
Imagine a system where Bitcoin-based micropayments are used to crowdfund genomic research, with results immutably recorded on a blockchain. Such a system would ensure transparency, eliminate funding biases, and democratize access to genetic breakthroughs.
- Biological Freedom: The Intersection of Genetics and Economic Liberty
Economic systems shape the trajectory of genetic innovation. Under a fiat regime, where capital is concentrated in a few hands, access to cutting-edge genetic technologies like CRISPR is often restricted to the wealthy. The cost of such exclusivity is the widening of genetic inequality, where only a privileged few can afford to "enhance" their genomes while the rest are left behind.
Bitcoin, as an incorruptible and borderless monetary system, can help level the playing field. By creating a deflationary store of value, Bitcoin empowers individuals to accumulate and preserve wealth over generations. This long-term thinking aligns with the timelines required for meaningful genetic innovation, allowing people to invest in their health and their children's future without the devaluation risks of fiat currency.
In a Bitcoin-based economy, families and communities could pool resources for genetic healthcare, bypassing centralized insurance systems that profit from exclusion. This shift would foster a world where access to genetic therapies and enhancements is determined by collective effort and innovation rather than centralized control.
- Privacy and Consent: Protecting Genetic Data in the Digital Age
One of the most pressing concerns in the genomic era is the erosion of privacy. Genetic data, once digitized, becomes vulnerable to theft, misuse, and unauthorized exploitation. In a world increasingly shaped by surveillance capitalism, the genome could become another asset commodified by governments and corporations.
Bitcoin's pseudonymous and cryptographic architecture offers a blueprint for safeguarding genetic privacy. By integrating Bitcoin-like protocols into genetic data management, individuals could control access to their genome through cryptographic keys, ensuring that consent is always explicit and revocable.
Furthermore, decentralized systems can enable anonymous genetic marketplaces, where individuals choose to share their data for research or commercial purposes without revealing their identity. Such systems would not only protect privacy but also ensure fair compensation for those who contribute to genetic innovation.
- Mitigating Genetic Inequality: A Unified Global System
The commodification of genetics under the current economic system risks creating a new form of inequality: genetic stratification. Wealthy nations and individuals are better positioned to benefit from advances in genomics, perpetuating cycles of privilege and exclusion.
Bitcoin's borderless and inclusive nature offers a way to counteract this trend. By providing a universal financial system that transcends national borders, Bitcoin can facilitate equitable access to genetic technologies. For example, a global fund denominated in Bitcoin could support genomic research and therapy distribution in underserved regions, ensuring that the benefits of genetic advancements are shared across humanity.
Additionally, Bitcoin’s censorship-resistant properties can protect access to genetic resources in politically volatile regions, where governments might otherwise restrict the flow of life-saving technologies.
- Cultural and Philosophical Dimensions: Redefining Human Potential
The convergence of Bitcoin and genetics also invites a philosophical reckoning with what it means to be human. Bitcoin challenges traditional notions of power and trust, decentralizing control in ways that align with the democratization of genetic potential. Just as Bitcoin liberates individuals from the constraints of centralized monetary systems, decentralized genomic systems could liberate humanity from the biological determinism imposed by socioeconomic hierarchies.
This unification of Bitcoin and genetics fosters a vision of human potential that is collaborative, decentralized, and rooted in individual sovereignty. It echoes the ethos of open-source innovation, where progress is driven by shared knowledge and mutual empowerment rather than competition and exclusion.
Conclusion: Bitcoin as the Catalyst for Genomic Freedom
The liberation of the human genotype is not just a technological challenge but a deeply moral and philosophical one. It requires dismantling the centralized systems that exploit genetic data and replacing them with frameworks that prioritize sovereignty, privacy, and equity. Bitcoin, as the first decentralized and incorruptible monetary system, offers a model for how such liberation can be achieved.
By applying Bitcoin's principles to genetics, humanity can create systems that honor the sanctity of the genome while ensuring that its benefits are shared equitably. This multidimensional unification of Bitcoin and genetics has the potential to redefine human potential, unlocking a future where individuals are free to explore and enhance their genetic heritage without fear of exploitation or exclusion.
In this vision, Bitcoin is not just a financial revolution but a catalyst for a broader liberation—one that empowers humanity to reclaim its genetic destiny.